Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • GeoGestión, the Internet of Mobile Workforces Telefónica Tech AI of Things made real
  • Big Data
    • Success Story: Using Big Data to improve Tourism with Iberostar What makes the Levi´s Commuter Jacket next level Wearable Tech?
  • Cybersecurity
    • APTualizator (II): Deconstructing Necurs Rootkit and Tools for Detecting and Removing It Bestiary of a Poorly Managed Memory (III)
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Cybersecurity

Cyber Security Report 30 July
Telefónica Tech

Cyber Security Weekly Briefing 24-30 July

PetitPotam: new NTLM relay attack Security researcher Gilles Lionel, also known as Topotam, has discovered a flaw in Windows systems with enabled Active Directory Certificate Services (ADCS) that would allow...
Telefónica Tech

Cyber Security Weekly Briefing 17-23 July

​​​​Global cyber-espionage investigation published A joint consortium of organizations and media outlets has published an investigation revealing the indiscriminate marketing and use of Pegasus spyware. According to the investigators, a...
People at the core of our technology
Telefónica Tech

People at the core of our technology

At Telefónica Tech we are passionate about technology, but there is something we love even more: people. It is people who give meaning to technology and not the other...
Card Gift Fraud
Saad Bencrimo

Understanding Gift Card Fraud

Following an internal investigation, carried out by Digital Risk Protection’s team of analysts at Telefónica Tech, where a fraudulent URL impersonating a retail company led to the discovery of...
Cyber Security Weekly Briefing 10-16 July
Telefónica Tech

Cyber Security Weekly Briefing 10-16 July

Kaseya VSA Incident Update After news of the attack by the REvil ransomware group using Kaseya VSA on July 2nd, on Sunday July 11th, Kaseya released the patch for its...
Telco cyberspace
Bechara Kaddoum

Telco’s: as a major player in the cyberspace

For over a decade, telecommunication companies have shifted their primary focus to the rapid expandability in the consumer market. This growth was mainly promoted by the wide cell phone...
Social Media blog
Telefónica Tech

We’re talking about technology, will you join the conversation?

It is increasingly common to come across concepts such as Big Data, Artificial Intelligence, Internet of Things, Cyber Security, Cloud or Blockchain in any field and any conversation, disruptive...
Telefónica Tech

Cyber Security Weekly Briefing 3-9 July

Kaseya VSA incident On Friday July 2nd, the Revil ransomware group compromised third party companies by exploiting a 0day vulnerability in Kaseya VSA. Kaseya VSA is a remote system monitoring...
printnightmare
Sergio de los Santos

Frequently Asked Questions About Printnightmare (CVE-2021-34527)

We are going to try to clarify some common doubts about this vulnerability, since it has turned up with some confusing data about whether it was patched or not,...
Cyber Security Weekly Briefing
Telefónica Tech

Cyber Security Weekly Briefing June 19- July 2

New activity of the threat actor Nobelium Microsoft has issued an update on the activities of the Russian threat actor known as Nobelium (aka APT29), which is credited with compromising...

Navegación de entradas

Previous articles
1 … 20 21 22 … 55
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration