Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Smart stores, the future of Retail Take control of your vehicles with Fleet Optimise
  • Big Data
    • The use of AI and Machine Learning in the beer industry Success Story: LUCA Transit and Highways England
  • Cybersecurity
    • The truth behind Libra, Facebook’s new cryptocurrency New report: Twitter botnets detection in sports event
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Cybersecurity

blog-ransomware-pilares
David García

Where does ransomware attack? Three main pillars

It all starts with a tweet from a researcher (Allan Liska from RecordedFuture) announcing that he is compiling a list of vulnerabilities currently being exploited by organised groups in...
Cyber Security Weekly Briefing 25 September - 1 October
ElevenPaths

Cyber Security Weekly Briefing 25 September – 1 October

​​​​Let’s Encrypt root certificate expires (DST Root CA X3) A few days ago, Scott Helme, founder of Security Headers, highlighted the 30 September as the date when Let’s Encrypt’s root certificate, DST...
David García

What’s new in the OWASP 2021 ranking?

OWASP, the foundation focused on web application security, has recently updated its ranking of the most prominent risks. Let’s take a look at the new reorganisation of the top,...
Cyber Intelligence Unit
Félix Brezo Fernández

The Work of a Cyber Intelligence Unit in The Context Of Incident Response

Besides the work carried out by our colleagues in the forensic analysis, malware analysis or Threat Hunting teams, which we have reviewed in the articles in this series associated...
Cyber Security Briefing 18-24 sep
Telefónica Tech

Cyber Security Weekly Briefing 18-24 September

Malware campaign using TeamViewer on websites under IIS Malwarebytes researchers have observed a malware distribution campaign since the beginning of September that makes use of previously compromised pages running on Microsoft’s...
Cyber Security
Diego Samuel Espitia

If you own any Apple devices, run to update them

On September 13, Apple surprised its users with a system update on iPhone, iWatch, iPad and macOS, something that doesn’t happen very often and less often comes with an...
DFIR
Víctor José González Arcos

DFIR services in a ransomware incident response

As we saw in the first post of the series, the IR (incident response) process in case of attacks using ransomware is fundamental, relying on the work of several...
Cristina del Carmen Arroyo Siruela

The human factor: a key element of cyber security

When it is said that a server needs to be bastioned, cybersecurity personnel have an idea of what it is and what it consists of. But what about securing...
Cyber Security Report
Telefónica Tech

Cyber Security Weekly Briefing 11-17 September

S.O.V.A. – New Android banking trojan Researchers at Threat Fabric have discovered the existence, at least since the beginning of August, of a new banking trojan for Android which they...
PackageDNA
Diego Samuel Espitia

PackageDNA Our Development Package Analysis Framework That Made Its Debut at Blackhat

After several months of research and development, during the BlackHat USA 2021 Arsenal event, you saw our deep analysis tool for development packages called PackageDNA, in the talk “Scanning...

Navegación de entradas

Previous articles
1 … 18 19 20 … 55
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration