Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Barriers to IoT adoption IoT growth forecast
  • Big Data
    • Artificial Intelligence or Cognitive Intelligence? The buzz words of business World Environment Day: Green digital transformation as a lever for change
  • Cybersecurity
    • How to Make API REST Requests to Tor Hidden Services in an Android APK Cyber Security Weekly Briefing 17-23 July
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

ElevenPaths for companies

Photo: Christina Wocintechchat.com / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 9 — 15 July

Rozena: backdoor distributed by exploiting Follina vulnerability Fortinet researchers have published an analysis of a malicious campaign in which they have detected the distribution of a new backdoor exploiting the...
Photo: Christina Wocintechchat.com
Telefónica Tech

Cyber Security Weekly Briefing, 1 — 8 July

Raspberry Robin: worm detected in multiple Windows networks Microsoft has issued a private advisory to Microsoft Defender for Endpoint subscribers, informing about the detection of the Raspberry Robin malware in...
Woman working on a computer. Photo: Unsplash
Diego Samuel Espitia

Where is your company on the cybersecurity journey?

Although the cybersecurity path is not linear and each company has its own characteristics, experience has allowed us to classify companies into five levels of cybersecurity evolution. The existence of...
ElevenPaths

DevSecOps: 7 Key Factors for Implementing Security in Devops

DevSecOps, also known as SecDevOps, is a software development philosophy that advocates the adoption of security throughout the software development lifecycle (SDLC). DevSecOps is more than just a specific...
Cyber Security Weekly Briefing May 29- June 4
ElevenPaths

Cyber Security Weekly Briefing May 29- June 4

Vulnerability in SonicWall Network Security Manager SonicWall has released security patches to fix a vulnerability affecting local versions of the Network Security Manager (NSM) multi-user firewall management solution. Classified as CVE-2021-20026 and...
Cyber Security White House
Sergio de los Santos

And the President Said, “Enough Is Enough”. The New Cyber Security Proposals from The White House

Joe Biden has signed an Executive Order to improve national cyber security and protect federal government networks more efficiently. The attack on oil pipeline operator Colonial Pipeline, a story...
DIARIO
Andrés Naranjo

DIARIO: One More Weapon in Thehive’s Arsenal

We already know that the weakest link in the cyber security chain is the user. Studies show that the main reason why a cyber-attack on a company is successful...
Cyber Security Weekly Briefing May 22-28
ElevenPaths

Cyber Security Weekly Briefing May 22-28

​​Windows HTTP protocol stack vulnerability also affects WinRM Security researchers have discovered that the vulnerability affecting the Windows IIS web server (CVE-2021-31166, CVSS 9.8), which resides in the HTTP protocol...
Fireless Malware
Diego Samuel Espitia

Fileless Malware: A Growing but Controllable Attack

For some years now, WatchGuard has been generating a report on the security situation detected on the Internet. Following the acquisition of Panda, this report has become even more...
ElevenPaths

Cyber Security Weekly Briefing May 15-20

​​​​​​​​QNAP Security Advisory QNAP has issued two security advisories to alert its clients about: The detection of recent eCh0raix ransomware attacks targeting its Network Attached Storage (NAS) devices. The firm is urging...

Navegación de entradas

Volver a portada
1 2 … 19
More articles
  • Telefónica Tech

Popular

Miryam Artigas
Using Midjourney to create social media content
Any sentence containing the word ‘dinosaur’ is worthy of attention. Admit it, it happens to you too. And if not, I’ll tell you why we’re talking about dinosaurs in a...
Two men working with computer
New Markets Team
Human Factors in Cybersecurity: Protect Yourself
Download the last report from Telefónica Tech Cyber & Cloud New Markets Team aimed at fighting disinformation and raising awareness about Cybersecurity
Roberto García Esteban
Cloud market trends until 2025
All of us who work in Cloud services are aware that this market is still in a phase of accelerated growth and that more and more companies are taking...
Photo: Nick Fewings / Unsplash
Alberto García García-Castro
TrustOS, the Swiss Army Knife of Blockchain Networks
Did you know that there are currently dozens of public Blockchain networks and that, added to the private and consortium ones, there could be hundreds? Which of them would...
Image from No Man's Sky video game
Javier Coronado Blazquez
Endless worlds, realistic worlds: procedural generation and artificial intelligence in video games
The video game No Man's Sky creates entirely visitable and different galaxies and planets at full-scale using a simple algorithm. How does it do it?
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration