Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Telefónica Activation Programme: Innovate with IoT The next big battle for energy efficiency … air conditioners
  • Big Data
    • The Data Transparency Lab Conference 2016 kicks off tomorrow Big Data and the Blockchain phenomenon: Part II
  • Cybersecurity
    • New Threat, Old Techniques Cyber Security Weekly Briefing, 28 October – 4 November

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Cyber Security Briefing
Telefónica Tech

Cyber Security Weekly Briefing 2-8 October

Apache vulnerabilities actively exploited Earlier this week, Apache fixed a 0-day (CVE-2021-41773) affecting Apache HTTP servers which was actively being exploited. However, on Thursday we learned that the patch released...
IoT, Big Data and AI convergence report
Telefónica Tech

IoT, Big Data and AI convergence report

The IoT and Smart Cities Cybersecurity Innovation Centre of Telefónica Tech Ciber Security & Cloud in Valencia, Spain, brings us a compilation of the potential risks related to IoT,...
blog-ransomware-pilares
David García

Where does ransomware attack? Three main pillars

It all starts with a tweet from a researcher (Allan Liska from RecordedFuture) announcing that he is compiling a list of vulnerabilities currently being exploited by organised groups in...
Cyber Security Weekly Briefing 25 September - 1 October
ElevenPaths

Cyber Security Weekly Briefing 25 September – 1 October

​​​​Let’s Encrypt root certificate expires (DST Root CA X3) A few days ago, Scott Helme, founder of Security Headers, highlighted the 30 September as the date when Let’s Encrypt’s root certificate, DST...
David García

What’s new in the OWASP 2021 ranking?

OWASP, the foundation focused on web application security, has recently updated its ranking of the most prominent risks. Let’s take a look at the new reorganisation of the top,...
Cyber Security Briefing 18-24 sep
Telefónica Tech

Cyber Security Weekly Briefing 18-24 September

Malware campaign using TeamViewer on websites under IIS Malwarebytes researchers have observed a malware distribution campaign since the beginning of September that makes use of previously compromised pages running on Microsoft’s...
Cristina del Carmen Arroyo Siruela

The human factor: a key element of cyber security

When it is said that a server needs to be bastioned, cybersecurity personnel have an idea of what it is and what it consists of. But what about securing...
Little Red Riding Hood
José Vicente Catalán

What Little Red Riding Hood teaches us about cyber security

They say that a good fairy tale will be considered as such if it has many different readings and is able to convey hundreds of different messages. Little Red...
People at the core of our technology
Telefónica Tech

People at the core of our technology

At Telefónica Tech we are passionate about technology, but there is something we love even more: people. It is people who give meaning to technology and not the other...
Innovation Marketing Team

Empowering women in entrepreneurship: 10 female – led startups in Germany

In Germany, only about 15% of startups are initiated by women. Sadly, the figure has been stagnant for years. Additionally, female-led startups receive significantly less Venture Capital than those...

Navegación de entradas

Previous articles
1 … 30 31 32 … 120
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration