Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Cryptography
Sodinokibi uses the RaaS (Ramsonware as a Service) model, which favours its rapid spread. In this article we present some lines of action that should be followed in the case of having been a victim of this sophisticated malware or if it is suspected that it could have infected our systems.
In the last few days there have been various reports, both nationally and internationally, of a ransomware campaign called NetWalker, also known as Mailto or Koko, which appears to target healthcare centers, taking advantage of the current state of alarm declared as a result of the COVID-19 pandemic.
The ransomware attacks have experienced a great evolution from its beginnings, being able to identify a great amount of different families at the present time, many of them are highly sophisticated, with high propagation and persistence. In this blog we explain what is Sodinokibi and how it works.
Over the last few years we have seen how electric vehicles have experienced a boom in terms of their development and retail and, along with them, the deployment of their charging points. In this article we will discuss a series of requirements, in terms of security, that should be implemented in these charging stations in order to ensure their security.
Last year ransomware became the threat most widely used by attackers to monetise their actions. This fact has also affected industrial sectors which, to a greater or lesser extent, have suffered this type of malware.
Although in industrial environments, availability is king, integrity is also a factor to be taken into account as data must be transferred in unaltered form. The use of mechanisms such as digital signatures helps with integrity, although it is not so simple to implement in all environments.
Blockchain is in fashion. Every month, new systems of this type emerge, applications that use them or companies who base their business models on the opportunities provided by this technology. Despite this boom, there is still a lot of uncertainty surrounding the protocol.
La computación cuántica revolucionará la ciberseguridad tal y como la conocemos. Tecnologías actuales dejarán de ser seguras a medida que irrumpan ordenadores cuánticos con suficiente capacidad. ¿Qué algoritmos tendremos para reemplazar los que vamos dejando atrás?