Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • How IoT technology is helping candy producers make sweet profits! Quantum computing in the future of IoT
  • Big Data
    • Are you Ready for a Wild World? Don’t miss out on Big Data for Social Good 2018! DeepMindAI partners with Moorfields Eye Hospital to develop innovative sight-saving technology
  • Cybersecurity
    • We’re talking about technology, will you join the conversation? What Kind of Professionals Work in Our Security Operations Center (SOC)?
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

ElevenPaths Team

Telefónica Tech

Cyber Security Weekly Briefing, 31 December – 6 January

PyTorch’s dependency chain is breached PyTorch, a popular open-source machine learning framework, has warned users who installed PyTorch-nightly between 25 and 30 December 2022 to uninstall the framework and the...
Cyber Security Weekly Briefing May 29- June 4
ElevenPaths

Cyber Security Weekly Briefing May 29- June 4

Vulnerability in SonicWall Network Security Manager SonicWall has released security patches to fix a vulnerability affecting local versions of the Network Security Manager (NSM) multi-user firewall management solution. Classified as CVE-2021-20026 and...
ElevenPaths

Cyber Security Weekly Briefing May 15-20

​​​​​​​​QNAP Security Advisory QNAP has issued two security advisories to alert its clients about: The detection of recent eCh0raix ransomware attacks targeting its Network Attached Storage (NAS) devices. The firm is urging...
ElevenPaths

Cyber Security Weekly Briefing May 8-14

Ransomware attack on a main US oil pipeline US energy company Colonial Pipeline was hit by a ransomware attack on Friday, causing the shutdown of around 8800km of pipelines supplying...
Unravelling the Quantum Tangle of Cybersecurity: Quantum Computers, Quantum and Post-Quantum Cryptography
Gonzalo Álvarez Marañón

Unravelling the Quantum Tangle of Cybersecurity: Quantum Computers, Quantum and Post-Quantum Cryptography

Do you know what’ s the difference between quantum computing, quantum cryptography and post-quantum cryptography? Because to be honest, they have (almost) nothing to do with each other. They...
Cyber Security Weekly Briefing April 24-30 2021
ElevenPaths

Cyber Security Weekly Briefing April 24-30

BadAlloc – Critical Vulnerabilities in Industrial IoT and OT Devices Microsoft security researchers have discovered 25 critical remote code execution (RCE) vulnerabilities, collectively referred to as BadAlloc, affecting a wide...
Do I Really Need an Antivirus?
ElevenPaths

Do I Really Need an Antivirus?

How can standard users protect themselves? In this article we explain what an antivirus is for and how you can be (more) protected.
Telefónica Tech, recognized with Palo Alto Networks’ SASE, Cloud and Cortex Specializations
Pablo Alarcón Padellano

Telefónica Tech, recognized with Palo Alto Networks’ SASE, Cloud and Cortex Specializations

We are the first partner in Spain awarded with Prisma SASE, Prisma Cloud and Cortex XDR/XSOAR specializations.
Cyber Security Weekly Briefing April 10-16
ElevenPaths

Cyber Security Weekly Briefing April 10-16

​0-days in Chrome and Edge Security researcher Rajvardhan Agarwal has discovered a 0-day vulnerability in the current versions of Google Chrome and Microsoft Edge, which he has made public via his...
Cyber Security in Times of Pandemic: How Has Confinement Affected Our Digital Security?
ElevenPaths

Cyber Security in Times of Pandemic: How Has Confinement Affected Our Digital Security?

The pandemic has accelerated the transition to a digital life, and with it, cyber-attacks against users and businesses have risen. The most frequent attack, which is the most common...

Navegación de entradas

Volver a portada
1 2 … 10
More articles
  • Telefónica Tech

Popular

Gonzalo Fernández Rodríguez
What is a Cloud-Native Application?
The term Cloud Native is something that goes beyond moving applications on-premises, i.e. hosted directly in a data centre to an infrastructure from a Cloud provider, whether public or...
Photo: Vardan Papikyan / Unsplash
Alberto García García-Castro
Incentives in business blockchain networks: a new approach
It has always been a fundamental part of the technology to use incentives that reward collaboration and good practices among participants in a blockchain network. So much so that...
Two men working with computer
New Markets Team
Human Factors in Cybersecurity: Protect Yourself
Download the last report from Telefónica Tech Cyber & Cloud New Markets Team aimed at fighting disinformation and raising awareness about Cybersecurity
Roberto García Esteban
Cloud market trends until 2025
All of us who work in Cloud services are aware that this market is still in a phase of accelerated growth and that more and more companies are taking...
Image from No Man's Sky video game
Javier Coronado Blazquez
Endless worlds, realistic worlds: procedural generation and artificial intelligence in video games
The video game No Man's Sky creates entirely visitable and different galaxies and planets at full-scale using a simple algorithm. How does it do it?
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration