Home / Blog / Filter / Blog
Subscribe to CERTSI - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Botnet
Problems in the industry

Mitigating availability problems in the industry

Posted on 07/19/2018, by INCIBE
Given that availability is always a critical point to take into account for within industrial environments, it is necessary to prevent the attacks that denial of services cause and that affect these environments. The means of giving way to a denial of service can be diverse, much like the means of mitigating these problems. This article will review all of these points, as well as the way in which the risks derived from these attacks can be reduced.
Beyond the Wall logo

Beyond the Wall

Posted on 06/07/2016, by Miguel Herrero (INCIBE)
The 'wildlings' live beyond the wall. Everyone in Westeros knows that. This is why they trust in the Night's Watch, protectors of the Seven Kingdoms. In the world of cybersecurity there are also people who live beyond the wall and we know that not all of them have evil intentions. They may not obey the laws but their intentions do not seem to be to destroy everything that is established by law.
ACDC

ACDC in fighting against botnets

Posted on 11/24/2015, by Gonzalo de la Torre (INCIBE)
There is no doubt that the fight against botnets is something that concerns the different governments around the world and it is something that has also transferred to other environments such as businesses and, to a lesser extent, due to the lack of awareness, to citizens. Likewise, this is a setting in which it is difficult for the individual "fight" to achieve results since the field of play...
camera

Physical security and cybersecurity go hand in hand: CCTV

Posted on 11/17/2015, by Daniel Fírvida (INCIBE)
In recent years different news has emerged linked to webcam and IP camera attacks, such as the vulnerabilities of any system, embedded credentials, and the most well-known, open cameras without a password... as well as many other examples. These security failures are not alien to more professional systems such as video recorders or DVRs and closed-circuit television or CCTV cameras. A few...
What is a correlation? And data analysis tools

What is a correlation? And data analysis tools

Posted on 07/09/2015, by Héctor R. Suárez (INCIBE)
When information of a dataset are analysed, whose origin or “feed” may be a database, information of raw files, logs, spreadsheet data, etc. one of the most powerful tools for drawing conclusions is to carry out correlations. In the post “The importance of language, binary diffing and other “One Day” stories”, we highlighted that the term “correlation” has begun to be heard frequently. However,...
Emerging Evasion Techniques

Emerging Evasion Techniques: Domain Shadowing

Posted on 04/08/2015, by Antonio López (INCIBE)
The malware in general and in particular botnets maintain a constant battle to operate through internet and avoid detection. Techniques like blacklisting domains and sinkholing are bypassed with various countermeasures. Let's talk about domain, a recent mechanism of evasion.