Home / Blog / Filter / Blog
Subscribe to INCIBE-CERT - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Critical infrastructures
technologies shaping the electricity grid of the future

Technologies shaping the electricity grid of the future

Posted on 04/29/2021, by INCIBE
In recent years we have witnessed the evolution of the electrical grid and the development of new technologies produce what we know today as the smart grid. This evolution continues to this day and the trend seems to point to greater interconnection between end consumers and the grid, which increases possible attack vectors. Over the course of this article, we shall see the security measures that will be used in the electrical grid of the future.
DrDoS: characteristics and operation

DrDoS: characteristics and operation

Posted on 04/22/2021, by INCIBE
This article reviews the origin and development of the best-known types of denial-of-service attacks, placing special emphasis on Reflected Distributed Denial of Service attacks, analysing their main characteristics, operation, and consequences, as well as the measures necessary to mount a good defence against them.
secure remote access in ICS

Secure remote access in ICS

Posted on 03/04/2021, by INCIBE
With the arrival of industry 4.0 to companies’ productive processes, including IIoT and Cloud, the need to control and monitor the ICS that remotely make them up arises. However, said access points should be established securely and in a controlled manner, mainly due to the criticality of these assets. This article discusses good practices, tools and methods that can be used to establish remote connections to OT networks as securely as possible.
dangers of drones in industrial settings

Dangers of drones in industrial settings

Posted on 01/21/2021, by INCIBE
The attacks on the Saudi Aramco oil refinery have highlighted the vulnerabilities of these plants against physical attacks using drones. There’s a wide variety of physical and cyber attacks that use drones, from launching explosives, to capturing images, invasion of privacy or taking screenshots of Wi-Fi traffic, so companies should take new defense measures in order to protect their assets
Sweyntooth: Bluetooth in the spotlight

SweynTooth: Bluetooth in the spotlight

Posted on 12/17/2020, by INCIBE
Wireless communications encompass a set of protocols that are widely used in some industrial sectors. In particular, building automation is based on these protocols, mainly using the BACNET and Lontalks protocols, but also making use of new ZigBee and Bluetooth based devices for IIoT. This article will provide information on SweynTooth, a set of vulnerabilities that affect Bluetooth technology.
cyberchallenges to security in industrial robotics

Cyberchallenges to security in industrial robotics

Posted on 11/19/2020, by INCIBE
Around 4 million robots are expected to be introduced in the area of industry over the next five years. This is on top of the evolution towards industry 4.0, in which industrial robotics is crucial, and which is now consolidated in any industrial process, from the manufacturing industry to any large-area warehouse. In that industrial transformation, barriers must be applied to ensure the integrity of the components and to prevent incidents in plants.

Pages