En esta sección se ofrecen contenidos de interés para los profesionales que manejan en su actividad diferentes lenguajes de programación, entornos de desarrollo, herramientas para garantizar la seguridad, analistas y auditores de código, criptógrafos, o especialistas en ingeniería inversa y malware.

Context in the measurement of cyberresilience indicators at the national level

Posted on 27/10/2022, by
INCIBE (INCIBE)
Context in the measurement of cyberresilience at the national level
Organisations are exposed to the consequences of cyber threats, and may be ill-prepared to face and manage cyber incidents, whether provoked or unprovoked. For this reason, in 2014 INCIBE launched its Indicators for the Improvement of Cyber Resilience (IMC) model, with the aim of improving and understanding the state of cyber resilience in organisations.

Threat analysis study: Nobelium

Posted on 08/09/2022, by
INCIBE (INCIBE)
Threat analysis study
Nobelium es la denominación de Microsoft para un grupo de atacantes que, según la atribución llevada a cabo por la Agencia de Seguridad de Infraestructura y Ciberseguridad (CISA) de Estados Unidos, pertenecen al Servicio de Inteligencia Exterior (SRV) de Rusia. Este grupo criminal es conocido por el ataque a la cadena de suministro de SolarWinds, y una campaña masiva de phishing haciéndose pasar por una empresa de desarrollo estadounidense.

Differences between OT DMZ and IT DMZ

Posted on 04/08/2022, by
INCIBE (INCIBE)
OT DMZ vs IT DMZ
Demilitarized zones, also known as DMZs (demilitarized zones), are used for the secure exchange of information between computers on a network that we want to protect and an external network that needs to access those computers. DMZs are widely used in the IT sector and also in the OT sector, but the equipment and services they host are not exactly the same.

Machine learning in ICS

Posted on 23/06/2022, by
INCIBE (INCIBE)
ML in ICS
In recent years, the concept of machine learning has gained more prominence, mainly driven by advances in parallel computing capacity. More and more developments, applications and programs are using these algorithms to provide systems with greater security, intelligence and independence. However, it’s rarely used in industrial environments, although some recent tests and developments prove its effectiveness, including in the scope of detection and prediction of cyber attacks.

Threat analysis study: Grandoreiro

Posted on 02/06/2022, by
INCIBE (INCIBE)
Threat analysis image
Grandoreiro, also known as Delephant, is a banking trojan from South America, which has spread its operations to other regions, especially Europe, including Spain and Portugal. According to ESET researchers, it has been active since 2015, affecting countries in Latin America, mainly Brazil, where it was developed.

IEC 62443-4-2, the need to secure components

Posted on 12/05/2022, by
INCIBE (INCIBE)
Standard IEC 62443-4-2, the need to secure ISC components
The security of control systems can be threatened from different aspects, with the end device being the most important attack vector. With this in mind, the IEC, within the 62443 standard, wanted to emphasise devices by preparing a document exclusively concerning their security: IEC62443-4-2. This document contains different technical requirements to improve the security of the types of assets that can be found in a control system.

FAT and SAT tests on industrial devices

Posted on 07/04/2022, by
INCIBE (INCIBE)
FAT and SAT tests on ICS
The continuity of the production process in businesses that require industrial automation depends more and more on the proper functioning, safety and reliability of the system of that composes it. Therefore, conducting tests of acceptance of its operation prior to its commissioning, is vital to ensure that the systems acquired meet the requirements set out in the contract between the company and the manufacturer.

Log4Shell: analysis of vulnerabilities in Log4j

Posted on 24/02/2022, by
INCIBE (INCIBE)
Log4Shell: analysis of vulnerabilities in Log4j
This post will analyse the vulnerabilities associated with Log4Shell, detected in the library Log4j, which is found in infinite software products both in technical and industrial fields. Although there have been other instances of more sophisticated vulnerabilities, the problem with this one is area of exposure.

The MITRE matrix: tactics and techniques in industrial settings

Posted on 03/02/2022, by
INCIBE (INCIBE)
MITRE matrix: TTP in ICS
Monitoring and analyzing security incidents in Industrial Control Systems (ICS) has been a priority for many organizations for a while now. As a response to this need, and given the great success in other areas specialized in cybersecurity, the MITRE organization has developed a matrix that collects many of the tactics, techniques and procedures detected in the industrial world. This article seeks to make the contents and potential uses of said matrix known.

Threat analysis study: Hive

Posted on 20/12/2021, by
INCIBE (INCIBE)
imagen de estudios de amenazas
The malicious code of the ransomware known as ‘Hive’ represents a threat to all users, as it implements encryption functionalities on the information in an infected computer, making simple recovery of the data impossible. This threat attempts to use extortion to recover the information, demanding a payment and threatening publication of part of the stolen information on a blog through the network Tor if the payment is not forthcoming.