Jorge Ordovás Blockchain Expectations and Realities From 2017 To 2021 And Beyond It has been several years since 2017 when Gartner first included Blockchain at the top of its “Hype Cycle” of emerging technologies. Back then he estimated that it would...
Antonio Pita Lozano ‘A Data-Driven Company’ the bedside reading for leading this transformation A Data-Driven Company is the name given to companies that use data as a fundamental asset in their decision-making in all their processes within the company. They do this...
David García The Malware Created in Go Is A Trend And Is Here To Stay Even though it cannot be said that Go is a new programming language (it is already more than ten years old), it does belong to that new batch of...
Telefónica Tech Cyber Security Weekly Briefing 31 July-13 August Vulnerabilities in DNS-as-a-Service Researchers Shir Tamari and Ami Luttwak, from the security firm Wiz, revealed at the Black Hat security conference multiple vulnerabilities that could affect DNS-as-a-Service (DNSaaS) services. They...
Álvaro Paniagua ArgoCD, the easy way to start implementing GitOps in your business GitOps practices are becoming especially relevant in 2021, boosted by the increasing use of Kubernetes in all types of organisations, a step forward from Infrastructure as Code (IaC). The...
Innovation and Laboratory Area in ElevenPaths #CyberSecurityReport21H1: More than 246 million OT cyber security events detected in six months There are many reports on security trends and summaries, but at Telefónica Tech we want to make a difference. From the Innovation and Lab team, we have just launched...
Telefónica Tech Blockchain News: Everything You Need to Know About One of The Technologies of The Future There is no doubt that Blockchain technology is one of the most popular technologies of recent times. In many blogs, forums, social networks and even in general media news,...
Moncho Terol Edge Computing and Cyber Security: Benefits and Challenges Digital transformation and economic growth are two key themes, closely related to the future of connectivity. One of the most important challenges that organisations of all types face in...
Diego Samuel Espitia New Threat, Old Techniques For some years now, the techniques used by malware developers have focused on evading detection mechanisms, finding that obfuscated macros and the use of Windows proprietary tools are an...
Carlos Rebato How Edge Computing avoids latency problems Every day we seek better connectivity. And this improvement comes from streamlining processes. For example, the time that elapses from the moment you send a packet of files to...
ElevenPaths Squeezing the numbers and facts of Google’s annual Android security report Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths) Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick FOCA Final Version, the ultimate FOCA You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...