Home / Blog / Filter / Blog
Subscribe to INCIBE-CERT - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Firewall
Ransomware: preventative measures (II)

Ransomware: preventative measures (II)

Posted on 09/30/2021, by INCIBE
Cyberattacks using ransomware are one of the main threats for companies all over the world and Spain is the tenth most affected country. That is why, in this article, as a continuation of the previous one entitled: ‘Ransomware: preventative measures (I)’, will cover in detail new recommendations to prevent them.
Ransomware: preventive measures (I)

Ransomware: preventative measures (I)

Posted on 09/21/2021, by INCIBE
Cyberattacks using ransomware are one of the main threats for companies all over the world, and Spain is the tenth most affected country. This article, the first in a series dedicated to this subject, will provide a detailed list of recommendations for preventative measures dedicated to hardening in order to deal with such attacks.
secure remote access in ICS

Secure remote access in ICS

Posted on 03/04/2021, by INCIBE
With the arrival of industry 4.0 to companies’ productive processes, including IIoT and Cloud, the need to control and monitor the ICS that remotely make them up arises. However, said access points should be established securely and in a controlled manner, mainly due to the criticality of these assets. This article discusses good practices, tools and methods that can be used to establish remote connections to OT networks as securely as possible.
Keyring

My industrial devices support LDAP, now what?

Posted on 09/19/2019, by INCIBE
The main security standards and best practice guidelines in industrial cybersecurity include as a requirement the need for a user authentication system. The options involve implementations in each device of this system or being integrated into a centralised user authentication system. One of the most-used options is the use of the LDAP protocol, but there are a number of points to consider in the design phase, which are key when implementing a specific centralised user management system for industrial control systems, under LDAP.
Secure network architecture

Secure network architecture, things in order

Posted on 08/08/2019, by INCIBE
Control system networks have grown immensely in recent years, something similar to what happened with the explosion of IT networks in the 1980s. This growth is happening somewhat chaotically, promoted mainly by productive needs and by the lack of joint definition of network administration managers for IT and OT, instead of doing it by thinking of the future, scalability and security.
Emerging Evasion Techniques

Emerging Evasion Techniques: Domain Shadowing

Posted on 04/08/2015, by Antonio López (INCIBE)
The malware in general and in particular botnets maintain a constant battle to operate through internet and avoid detection. Techniques like blacklisting domains and sinkholing are bypassed with various countermeasures. Let's talk about domain, a recent mechanism of evasion.

Pages