Cyber-resilience: the key to overcoming incidents

Posted on 14/05/2020, by
INCIBE (INCIBE)
Cyber-resilience
The goal of cyber-resilience for an organization, whether or not it belongs to a strategic sector, whether or not it provides one of these digital services, is to maintain its primary purpose and integrity in the face of a cybersecurity threat or attack to an ideal level. Continuous detection processes must be established given that total prevention will never be guaranteed.

Sodinokibi: prevention, identification and response

Posted on 30/04/2020, by
INCIBE (INCIBE)
Sodinokibi
Sodinokibi uses the RaaS (Ramsonware as a Service) model, which favours its rapid spread. In this article we present some lines of action that should be followed in the case of having been a victim of this sophisticated malware or if it is suspected that it could have infected our systems.

Do you know the Spanish National Guidelines for Reporting and Managing Cyber Incidents?

Posted on 28/04/2020, by
INCIBE (INCIBE)
Decorative imagen Spanish National Guidelines
The latest version of the “Spanish National Guidelines for Reporting and Managing Cyber Incidents”, has been updated. In addition to this update, INCIBE-CERT has published the Appendix “Managing cyber incidents in the private sector”
Etiquetas

NetWalker ransomware: analysis and preventative measures

Posted on 08/04/2020, by
INCIBE (INCIBE)
Decorative imagen
In the last few days there have been various reports, both nationally and internationally, of a ransomware campaign called NetWalker, also known as Mailto or Koko, which appears to target healthcare centers, taking advantage of the current state of alarm declared as a result of the COVID-19 pandemic.

NTP, SNTP and PTP: what time synchronization do I need?

Posted on 05/03/2020, by
INCIBE (INCIBE)
NTP, SNTP and PTP
Time synchronization in industrial devices is a critical factor. In terms of time, industrial processes and the programming logic of industrial devices have specific needs. These may require specific accuracy that determines the need to use one protocol or another, as well as dependencies on cost or on the network infrastructure itself. Explaining the main differences is key when using one or another in industrial infrastructures. Just as each protocol has different nuances, there are certain differences to be taken into account within security.

Evolving towards secure Modbus

Posted on 20/02/2020, by
INCIBE (INCIBE)
Modbus decorative image
The Modbus protocol, in its TCP version, was not developed with cybersecurity capabilities in its communications. For this reason, many researchers have studied the different possibilities that could be undertaken at the technical level to incorporate a security layer in it, giving rise to a new version of Modbus/TCP called secure Modbus/TCP, which will gradually begin to be implemented in industrial communications.
Etiquetas