Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Smart Agriculture: from the plow to the drone We apply quantum technology to real use cases of Blockchain and IoT
  • Big Data
    • AI of Things (VII): Better data, better decisions Artificial Intelligence: a “very human” technology
  • Cybersecurity
    • Securing your Cloud Native Applications in AWS in the New Normal Vulnerabilities, threats and cyber-attacks on industrial systems
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Cybersecurity

Photo: This is Engineering RAEng / Unsplash
Diego Samuel Espitia

What are operational technology (OT) security “Patch Tuesdays”?

In the cybersecurity world we are used to the release of packages that fix vulnerabilities detected in business software. One of the releases that has established a periodicity and...
Photo: Christina Wocintechchat.com / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 9 — 15 July

Rozena: backdoor distributed by exploiting Follina vulnerability Fortinet researchers have published an analysis of a malicious campaign in which they have detected the distribution of a new backdoor exploiting the...
Photo: Tyler Daviaux / Unsplash.
Sergio de los Santos

Hypocrisy doublespeak in ransomware gangs

The hypocrisy, doublespeak and even, we assume, sarcasm that ransomware gangs display on their websites has no limits. As an anecdote, we are going to show some of the...
Photo: Dan Nelson / Unsplash
Cristina del Carmen Arroyo Siruela

Understanding Digital Certificates

For ordinary citizens, digital certificates are those electronic files or documents that allow them to carry out thousands of legal actions, administrative actions, and they can dispense with having...
Photo: Christina Wocintechchat.com
Telefónica Tech

Cyber Security Weekly Briefing, 1 — 8 July

Raspberry Robin: worm detected in multiple Windows networks Microsoft has issued a private advisory to Microsoft Defender for Endpoint subscribers, informing about the detection of the Raspberry Robin malware in...
Photo: Persnickety Prints / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 25 June – 1 July

​​​Kaspersky investigates attacks on industrial control systems Kaspersky researchers have investigated an attack campaign targeting industrial control systems (ICS) of telcos and industrial companies in several countries on the Asian...
Photo: Ed Hardie / Unsplash
Aarón Jornet

How Lokibot, the malware used by Machete to steal information and login credentials, works

Machete is a group dedicated to information theft and espionage. It uses various tools, including LokiBot.
Photo: Lucian Novosel / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 18 – 24 June

​​Microsoft Office 365 and Cloudflare services went down worldwide Multiple web services were interrupted worldwide last Tuesday. The source of these incidents was Microsoft Office 365 on the one hand...
Photo: ThisIsEngineering / Unsplash
Cristina del Carmen Arroyo Siruela

Women’s Engineering Day: Building New Paths

The Women's Engineering Society (WES) launched the Women's Engineering Day initiative in the UK on June 23, 2014
Photo: Icons8 Team / Unsplash
Telefónica Tech

Attacking login credentials

An access credential is basically a username and password associated with a person and the access permissions granted to that person for an application, service or system. An access...

Navegación de entradas

Previous articles
1 … 10 11 12 … 55
More articles
  • Telefónica Tech

Popular

Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Android malware not only posing as Word documents… but Excel as well
China is a paradise for “SMS stealing malware” for Android. These programs steal your SMS inbox, notebook… The only “problem” for malware creators is to induce users to...
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration