Home / Blog / Filter / Blog
Subscribe to CERTSI - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Cybercrime
Criptodivisas: su papel en el malware

Cryptocurrency and its role in malware

Posted on 04/12/2018, by José Manuel Roviralta (INCIBE)
It is increasingly common to find malware related to cryptocurrencies, either to use them as payment currency in extortions and illegal activities, cryptocurrency theft or infiltrate on systems and equipment from all areas to take advantage of the resources of the victims' equipment to undermine cryptocurrency
decorative image

Protective measures against denial-of-service (DoS) attacks

Posted on 01/26/2018, by Alejandro Fernández Castrillo
Denial-of-service attacks are a type of cyber-attack which consists on reducing or cancelling altogether the capacity of servers or other computing resources to provide service. A denial-of-service attack can occur in different scenarios, such as overloading online services by mass request sending or exploiting vulnerabilities of programs or services in order to suspend function totally or partially. In most of such attacks, attackers use a wide range of techniques and tools to hide their identities, which makes it especially challenging to find the culprits.
Information Sharing

United Against Cyberthreats: Information Sharing

Posted on 10/06/2016
The well known motto "there is strength in numbers" perfectly describes the beneficial situation that involves collaboration and knowledge sharing on cyber threats. The concept of Information Sharing bring to us the idea of ​​establishing methods to share and take full benefit of the gathered knowledge among all actors. Among these partners, CERT and security companies play a key role in defining consensus documentation and the pathway for sharing knowledge effectively.
industrial cloud

My SCADA in the cloud

Posted on 11/03/2015, by INCIBE
Like their corporate counterparts, industrial systems are constantly evolving in order to become more competitive. One of the improvements taking place in these environments at the moment is the reduction of costs through the use of cloud technology.
Thum

Click fraud - a highly lucrative business

Posted on 07/28/2015, by INCIBE
Various studies have indicated that bots currently constitute over half of all global Internet traffic. Certain reports, such as "The 2015 Bad Bot Landscape Report" released by Distil Networks, Inc, even divide traffic into legitimate and malicious traffic, concluding that the latter is growing at an alarming rate. The boom that Cloud Computing has experienced in recent times has been one of...

Pages