SOC OT: The importance of advanced monitoring for industrial cybersecurity

Posted on 28/09/2023, by
INCIBE (INCIBE)
SOC OT: The importance of advanced monitoring for industrial cybersecurity
In recent decades, the need to control processes remotely to improve efficiency, productivity and accelerate decision making on industrial systems has led to the interconnection of operation technologies (OT) with information technologies (IT). This interconnection has given rise to a number of security risks in industrial control systems, and to meet these challenges, specific tools and technologies have been developed and adapted to help ensure cybersecurity in industrial environments. One such tool is the Security Operations Center (SOC).In this article we will focus on the importance of advanced monitoring in a SOC OT. 

Firmware analysis of industrial devices

Posted on 21/09/2023, by
INCIBE (INCIBE)
Firmware analysis of industrial devices
Firmware analysis can help to uncover potential vulnerabilities that would otherwise never have been discovered.Although there are multiple types of attacks on IoT and IIoT devices, this guide focuses on the firmware of these devices to check for potential vulnerabilities, using security testing and reverse engineering to allow for an in-depth analysis of the firmware.

IEC62443-3-3 certification process

Posted on 14/09/2023, by
INCIBE (INCIBE)
IEC62443-3-3 certification process
Information security standards have become increasingly important in recent years, as more and more legal requirements oblige companies to demonstrate a certain degree of cybersecurity compliance. The IEC 62443 family of standards describes in its various sections the requirements for the secure implementation of an ICS (Industrial Control System) and represents a guarantee of cybersecurity in industrial environments. This article deals with IEC62443-3-3 covering cybersecurity of industrial systems.

Study of tools for recognition activity

Posted on 07/09/2023, by
INCIBE (INCIBE)
Introduction to the study of recognition tools blog image
With this study, we seek to offer a deep knowledge about the reconnaissance activity in cybersecurity, so that professionals from different fields can consider these tactics as an integral part of their security strategies. This study also aims to increase general understanding of these techniques and how they can be used to effectively protect information and systems. 

The challenges of upgrades in industrial environments

Posted on 24/08/2023, by
INCIBE (INCIBE)
Portada Antimalware en SCI
The increase of malware specifically designed to run on systems that support industrial processes creates a need in the industry that can be partly covered by different technological solutions. This article will focus on the different options available on the market to detect malicious files that aim to modify the operation of industrial environments or simply cause denials of service.Both portable and agent-deployed solutions can be an option, and this article will reflect on these and other options as well as provide guidelines on when it is best to use one solution or the other.

5G, a new SCI era

Posted on 24/08/2023, by
INCIBE (INCIBE)
5G, a new SCI era
The evolution of communications in society is also having an impact on the industrial world. With the arrival of 5G, many industrial companies have considered migrating some of their communications to take advantage of the characteristics of this new mobile communications band, such as the reduction of latency times, the increase in connection speed or the exponential increase in the number of devices that can be connected to the network. These characteristics fit perfectly with the industrial mentality, where there are a multitude of interconnected devices between which there cannot be a communication cut due to the criticality of the processes they implement. This article aims to comment, in addition to all the advantages that 5G provides to the industry, the different uses that can be given currently and the complexity of implementing these communications in some devices for subsequent deployment in the industry. Also, to specify possible vulnerabilities in communications using 5G networks.

External access in ICS: A double-edged sword?

Posted on 17/08/2023, by
INCIBE (INCIBE)
Decorative image blog External access in ICS
External access provides great convenience to workers, as it allows them to access any industrial equipment deployed in the field from the office or even further away. However, this type of access can pose a number of security problems for the company. This article reviews the main problems and how to solve them.

Secure configurations in industrial devices

Posted on 10/08/2023, by
INCIBE (INCIBE)
Secure configurations in industrial devices Blog cover
Within the industrial world, systems can be detected that do not have all their cybersecurity capabilities activated. This can occur for a variety of reasons, but if detected, each case must be analyzed to get the most out of each device. The ability to robustly configure programs, services or other nuances within industrial systems is called bastioning and allows, among other things, to prevent assets from having a large exposure to the network or the solutions deployed in the system from having vulnerabilities resulting from misconfiguration.In this article, we will begin by explaining what hardening is and how to apply it to our industrial network, along with some good practices to follow.

Maze, Egregor and Sekhmet: response and recovery actions

Posted on 03/08/2023, by
INCIBE (INCIBE)
Decorative image with skull and red background
The history of cybersecurity is marked by names that have left an indelible mark on the field of digital threats. Among them, Maze, Egregor and Sekhmet stand out as notable ransomware variants, whose similarities go beyond mere coincidence. In this article, we will unravel the tactics these ransomwares employed,  the encryption mechanisms they used, and the evasion and propagation strategies they employed. The review of these malware will offer us a deeper insight into the persistent threat of ransomware, as well as the importance and need to strengthen our cybersecurity posture.