Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Artificial Intelligence 2022: myths and realities Artificial Intelligence: a companion to fight loneliness
  • Big Data
    • Big Data: Revolutionizing Animal Conservation LUCA and the UN World Data Forum: 7 ways mobile data is being used to change the world
  • Cybersecurity
    • Cyber Security Weekly Briefing 18-24 September New Global DDoS Threat Report

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Destacados: Telefónica Tech

Cristina del Carmen Arroyo Siruela

The human factor: a key element of cyber security

When it is said that a server needs to be bastioned, cybersecurity personnel have an idea of what it is and what it consists of. But what about securing...
Cyber Security Report
Telefónica Tech

Cyber Security Weekly Briefing 11-17 September

S.O.V.A. – New Android banking trojan Researchers at Threat Fabric have discovered the existence, at least since the beginning of August, of a new banking trojan for Android which they...
Tech GobalData
Bernardo Campillo

Telefónica Tech at the top of the IoT and Big Data podium

Today we want to revisit with you some good news that we received in mid-June, a little before the holiday season in July and August, a little before summer,...
PackageDNA
Diego Samuel Espitia

PackageDNA Our Development Package Analysis Framework That Made Its Debut at Blackhat

After several months of research and development, during the BlackHat USA 2021 Arsenal event, you saw our deep analysis tool for development packages called PackageDNA, in the talk “Scanning...
D3FEND
David García

D3FEND, the other side of the ATT&CK coin

We are already familiar with the ATT&CK project of the MITRE corporation. It is a de facto standard that helps us to characterise threats based on the techniques and...
tbe-mujereshacker-en-02
ElevenPaths

Victory is on your ideas

Victory is not always a question of numbers. In order to win, you have to believe in what you do, rely on your team and always be willing to...
Weekly Briefing 4-10 September
Telefónica Tech

Cyber Security Weekly Briefing 4-10 September

Critical vulnerability in Zoho ADSelfService Plus The company Zoho has issued a security advisory warning of a critical vulnerability in ADSelfService Plus, an enterprise password and login management software. The...
Dani Aldea
Telefónica Tech

‘Choosing people to whom you can entrust is one of the biggest challenges for entrepreneurs’, Dani Aldea – Altostratus

Altostratus is a specialised company in software development and digital transformation processes. Tell us about its beginnings, how did the idea come about? The idea came about in 2009, when...
Little Red Riding Hood
José Vicente Catalán

What Little Red Riding Hood teaches us about cyber security

They say that a good fairy tale will be considered as such if it has many different readings and is able to convey hundreds of different messages. Little Red...
Cyber Security Weekly Briefing 28 August-3 September
Telefónica Tech

Cyber Security Weekly Briefing 28 August – 3 September

PoC available and scans detected for RCE in Confluence On Wednesday 25 August, Confluence published a security advisory to warn of a vulnerability in Confluence Server and Data Center in versions prior...

Navegación de entradas

Previous articles
1 … 31 32 33 … 36
More articles
  • Telefónica Tech

Popular

Florence Broderick
Participating in GSMA Mobile 360 LATIN AMERICA
Mobile 360 – Latin America brings market leaders from Central and South America across the mobile telecom ecosystem for a two-day thought leadership conference together with operator-led Working Groups...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration