Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • How do brands speak to you? What role will Data Governance play in the Digital Transformation after COVID-19?
  • Big Data
    • Designing an OOH advertising map in Brazil Using Data to Manage Emergency Situations
  • Cybersecurity
    • Analysis of APPs Related to COVID19 Using Tacyt (I) The risks of not having controlled exposure to information (II)

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Destacados: Global

Man working with a computer. Photo: Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 7–13 May

Vulnerability in BIG-IP exploited to erase data On May 4th, F5 fixed, among others, a vulnerability affecting BIG-IP devices (CVE-2022-1388 CVSSv3 9.8), which could allow an unauthenticated attacker with network...
Login screen for Instagram mobile
David García

The new end of passwords

Password, password, password... How many can you remember if you don't use a password manager? In fact, do you even use a password manager?
A computer and a coffee cup. Photo: Lauren Mancke / Unsplash
Marta Mª Padilla Foubelo

Dark Markets in the internet age

What are Dark Markets or Black Markets? This concept has been in the news for a long time as a consequence of clandestine sales. The markets for drugs and...
Laptop, cup of coffee, notepad and mobile on a desk
Telefónica Tech

Cyber Security Weekly Briefing, 24 April – 6 May

TLStorm 2 – Vulnerabilities in Aruba and Avaya switches Researchers at Armis have discovered five vulnerabilities in the implementation of TLS communications in multiple models of Aruba and Avaya switches....
Woman working on a computer. Photo: Unsplash
Diego Samuel Espitia

Where is your company on the cybersecurity journey?

Although the cybersecurity path is not linear and each company has its own characteristics, experience has allowed us to classify companies into five levels of cybersecurity evolution. The existence of...
Computer. Photo: Unsplash
Telefónica Tech

Cyber Security Weekly Briefing 22–29 April

New malicious RedLine distribution campaign Researchers at BitDefender have published a report on a new RedLine malware distribution campaign. According to the analysts, malicious actors are using the RIG Exploit...
A man using Chrome browser in a laptop
Sergio de los Santos

0days in numbers: Chrome, Windows, Exchange… What are attackers and manufacturers looking for?

Very interesting data from Google’s Project Zero, which tries to catalogue, find and disseminate 0days. They do not discover them directly, but “detect” them in any manufacturer when they...
Woman shoping in a mall
Mariano Banzo Martínez

AI of Things (IV): You can already maximise the impact of your campaigns in the physical space

Knowledge of customer profiles and the environment thanks to technology and big data makes possible to have an impact on the business
Photo: Pexels
Telefónica Tech

Cyber Security Weekly Briefing 16–22 April

Fodcha: new DDoS botnet 360netlab and CNCERT researchers have discovered a new botnet focused on conducting denial-of-service attacks, and which is rapidly spreading on the Internet. This new botnet has been...
Person working on Windows 11 computer
Sergio de los Santos

Windows 11 security improves and joins Zero Trust

We look at the security features included in Windows 11. Some of them are familiar but receive substantial changes and improvements.

Navegación de entradas

Previous articles
1 … 14 15 16 … 27
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration