Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Artificial Intelligence: a companion to fight loneliness AI of Things(I): Multiplying the value of connected things
  • Big Data
    • How to measure your data maturity? LUCA chooses Hortonworks from Hadoop as its platform to offer Big Data as a service for Spain
  • Cybersecurity
    • Five interesting own tools that you may have missed (and a surprise) We’re talking about technology, will you join the conversation?
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Cybersecurity for everyone

Photo: Christina / Wocintech / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 28 May – 3 June

Rapid evolution of the EnemyBot botnet Since its discovery last March by Securonix researchers, the botnet known as EnemyBot, focused on carrying out DDoS attacks, has continued to expand, thanks...
Photo: ThisIsEngineering / Unsplash
Diego Samuel Espitia

Vulnerabilities, threats and cyber-attacks on industrial systems

Cybercriminals have increasingly targeted industrial environments
Person working with a computer
Telefónica Tech

Cyber Security Weekly Briefing, 13–20 May

VMware fixes critical vulnerabilities in several of its products VMware has issued a security advisory to fix a critical authentication bypass vulnerability affecting several of its products. Identified as CVE-2022-22972...
Man working with a computer. Photo: Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 7–13 May

Vulnerability in BIG-IP exploited to erase data On May 4th, F5 fixed, among others, a vulnerability affecting BIG-IP devices (CVE-2022-1388 CVSSv3 9.8), which could allow an unauthenticated attacker with network...
Login screen for Instagram mobile
David García

The new end of passwords

Password, password, password... How many can you remember if you don't use a password manager? In fact, do you even use a password manager?
A computer and a coffee cup. Photo: Lauren Mancke / Unsplash
Marta Mª Padilla Foubelo

Dark Markets in the internet age

What are Dark Markets or Black Markets? This concept has been in the news for a long time as a consequence of clandestine sales. The markets for drugs and...
Laptop, cup of coffee, notepad and mobile on a desk
Telefónica Tech

Cyber Security Weekly Briefing, 24 April – 6 May

TLStorm 2 – Vulnerabilities in Aruba and Avaya switches Researchers at Armis have discovered five vulnerabilities in the implementation of TLS communications in multiple models of Aruba and Avaya switches....
Computer. Photo: Unsplash
Telefónica Tech

Cyber Security Weekly Briefing 22–29 April

New malicious RedLine distribution campaign Researchers at BitDefender have published a report on a new RedLine malware distribution campaign. According to the analysts, malicious actors are using the RIG Exploit...
A man using Chrome browser in a laptop
Sergio de los Santos

0days in numbers: Chrome, Windows, Exchange… What are attackers and manufacturers looking for?

Very interesting data from Google’s Project Zero, which tries to catalogue, find and disseminate 0days. They do not discover them directly, but “detect” them in any manufacturer when they...
Photo: Pexels
Telefónica Tech

Cyber Security Weekly Briefing 16–22 April

Fodcha: new DDoS botnet 360netlab and CNCERT researchers have discovered a new botnet focused on conducting denial-of-service attacks, and which is rapidly spreading on the Internet. This new botnet has been...

Navegación de entradas

Previous articles
1 … 6 7 8 … 33
More articles
  • Telefónica Tech

Popular

Florence Broderick
ElevenPaths announced its new strategic alliances in the third Security Day
In the third Security Day the new alliance with Fortinet and ElevenPaths’s new product integrations with Check Point and Spamina solutions to evolve their technologies were presented. Madrid, 26th May....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to use Metashield protector for Client and why using it
Metashield is an Eleven Paths product that allows to clean up metadata from most of office documents. It tries to cover a gap where there seems not to exist any...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration