En esta sección se ofrecen contenidos de interés para los profesionales que manejan en su actividad diferentes lenguajes de programación, entornos de desarrollo, herramientas para garantizar la seguridad, analistas y auditores de código, criptógrafos, o especialistas en ingeniería inversa y malware.

EVOLVE: organisations’ capacity to adapt and improve their services after a cyberattack

Posted on 25/11/2021, by
INCIBE (INCIBE)
CII: evolve measurement
All organisations must be prepared so that, after the impact of a cyberattack, it may change, improve and adapt its processes and services. For this reason, it is necessary to protect the main business processes using a set of tasks that allow the organisation to evolve after a serious incident to redesign its strategies and minimise the possible impact of future cyberattacks

New generation antivirus applied to OT environments

Posted on 28/10/2021, by
INCIBE (INCIBE)
New generation antivirus
The new generations of antiviruses may entail an improvement in the OT environment, since special care must be taken with the assets, networks and communications of Industrial Control Systems. They can also help secure our industries against the increasingly frequent cyberattacks directed against them.

RECOVER: the capacity of organizations to restore their services following a cyber-attack

Posted on 07/10/2021, by
INCIBE (INCIBE)
CII recover goal
It is necessary to protect the main business processes through a set of tasks that allow the organisation to recover from a major incident in a timeframe that does not compromise the continuity of its services. This ensures a planned response to any security breach.

Threat analysis study: Anatsa

Posted on 05/07/2021, by
INCIBE (INCIBE)
image of threat studies
Anatsa is a banking Trojan designed for Android devices that has become particularly relevant since its discovery in January 2021. Throughout the study, a detailed technical analysis of the threat is carried out using a sample of the malicious code in question to show how this malware behaves and the possibilities it offers.

Control of multicast requests in the IEC 61850 standard

Posted on 27/05/2021, by
INCIBE (INCIBE)
control of multicast requests in the IEC 61850 standard
In previous articles an introduction was given to the 61850 regulation and the different protocols of which it consists. As explained in those articles, the GOOSE and SV (Sample Values) protocols, included in the standard, use multicast frames. Security is very difficult to implement in this type of frame, but there are a number of measures that make possible to raise the security level.

Technologies shaping the electricity grid of the future

Posted on 29/04/2021, by
INCIBE (INCIBE)
technologies shaping the electricity grid of the future
In recent years we have witnessed the evolution of the electrical grid and the development of new technologies produce what we know today as the smart grid. This evolution continues to this day and the trend seems to point to greater interconnection between end consumers and the grid, which increases possible attack vectors. Over the course of this article, we shall see the security measures that will be used in the electrical grid of the future.

Threat analysis studies: Mekotio, FluBot, Cring and WannaMine

Posted on 15/04/2021, by
INCIBE (INCIBE)
Threat analysis studies image
Various studies with threat analysis or malware distribution campaigns affecting Spain and identified through incident management undertaken by INCIBE-CERT. The aim is to increase knowledge of the more technical details and characteristics of the threats so that organisations can implement appropriate detection and protection measures.

Secure remote access in ICS

Posted on 04/03/2021, by
INCIBE (INCIBE)
secure remote access in ICS
With the arrival of industry 4.0 to companies’ productive processes, including IIoT and Cloud, the need to control and monitor the ICS that remotely make them up arises. However, said access points should be established securely and in a controlled manner, mainly due to the criticality of these assets. This article discusses good practices, tools and methods that can be used to establish remote connections to OT networks as securely as possible.

SweynTooth: Bluetooth in the spotlight

Posted on 17/12/2020, by
INCIBE (INCIBE)
Sweyntooth: Bluetooth in the spotlight
Wireless communications encompass a set of protocols that are widely used in some industrial sectors. In particular, building automation is based on these protocols, mainly using the BACNET and Lontalks protocols, but also making use of new ZigBee and Bluetooth based devices for IIoT. This article will provide information on SweynTooth, a set of vulnerabilities that affect Bluetooth technology.

INCIBE-CERT technical webinars

Posted on 24/09/2020, by
INCIBE (INCIBE)
INCIBE-CERT technical webinars
With the aim of increasing cybersecurity knowledge, INCIBE-CERT has published a series of webinars in video format, so that, in a light and entertaining way, knowledge and technical aspects of cybersecurity can be expanded in various areas of interest, for both INCIBE-CERT's technical audience and anyone interested in cybersecurity.