Segmentados Desarrollo

Contenido Segmentados Desarrollo

En esta sección se ofrecen contenidos de interés para los profesionales que manejan en su actividad diferentes lenguajes de programación, entornos de desarrollo, herramientas para garantizar la seguridad, analistas y auditores de código, criptógrafos, o especialistas en ingeniería inversa y malware.

ANTICIPATING: one of the four goals of cyberresilience

Posted on 11/06/2020, by
INCIBE (INCIBE)
IMC ANTICIPATING
Anticipating is one of the four aims of cyberresilience. It consists of maintaining a state of informed readiness, in order to prevent essential services from being compromised in the event of a cyberattack. To measure the objectives of this aim, its three functional domains are analysed: cybersecurity policies, risk management and cybersecurity training.

Preventing the leaking of information in ICS

Posted on 28/05/2020, by
INCIBE (INCIBE)
Preventing the leaking of information in ICS
Exfiltration of data, or information leakage, poses a threat to all companies throughout the world. It is important to know the possible ways information can get out to control them and avoid a loss of information in our organisation. Since in industry the most important factor is availability, this threat has to be put into perspective.

Cyber-resilience: the key to overcoming incidents

Posted on 14/05/2020, by
INCIBE (INCIBE)
Cyber-resilience
The goal of cyber-resilience for an organization, whether or not it belongs to a strategic sector, whether or not it provides one of these digital services, is to maintain its primary purpose and integrity in the face of a cybersecurity threat or attack to an ideal level. Continuous detection processes must be established given that total prevention will never be guaranteed.

Sodinokibi: features and operation

Posted on 06/04/2020, by
INCIBE (INCIBE)
Sodinokibi
The ransomware attacks have experienced a great evolution from its beginnings, being able to identify a great amount of different families at the present time, many of them are highly sophisticated, with high propagation and persistence. In this blog we explain what is Sodinokibi and how it works.

Evolving towards secure Modbus

Posted on 20/02/2020, by
INCIBE (INCIBE)
Modbus decorative image
The Modbus protocol, in its TCP version, was not developed with cybersecurity capabilities in its communications. For this reason, many researchers have studied the different possibilities that could be undertaken at the technical level to incorporate a security layer in it, giving rise to a new version of Modbus/TCP called secure Modbus/TCP, which will gradually begin to be implemented in industrial communications.
Etiquetas

Safety recommendations for electric vehicle charging stations

Posted on 06/02/2020, by
INCIBE (INCIBE)
station
Over the last few years we have seen how electric vehicles have experienced a boom in terms of their development and retail and, along with them, the deployment of their charging points. In this article we will discuss a series of requirements, in terms of security, that should be implemented in these charging stations in order to ensure their security.

Attacking a BusyBox, the small Gaulish village

Posted on 05/09/2019, by
INCIBE (INCIBE)
Busybox
A BusyBox is software or a program that combines several functionalities in a small executable. This small tool was created for use in integrated operating systems with very limited resources, and they are usually used in control systems. But, as in all tools, you have to know what security level they have and if it can be improved.