With the aim of increasing cybersecurity knowledge, INCIBE-CERT has published a series of webinars in video format, so that, in a light and entertaining way, knowledge and technical aspects of cybersecurity can be expanded in various areas of interest, for both INCIBE-CERT's technical audience and anyone interested in cybersecurity.
Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Malware
In this new blog entry, we will analyze the features and describe the operation of a new ransomware called Ekans, initially known as Snake, which has a very specific design, aimed at infecting and blocking Industrial Control Systems (ICS).
Sodinokibi uses the RaaS (Ramsonware as a Service) model, which favours its rapid spread. In this article we present some lines of action that should be followed in the case of having been a victim of this sophisticated malware or if it is suspected that it could have infected our systems.
In the last few days there have been various reports, both nationally and internationally, of a ransomware campaign called NetWalker, also known as Mailto or Koko, which appears to target healthcare centers, taking advantage of the current state of alarm declared as a result of the COVID-19 pandemic.
The ransomware attacks have experienced a great evolution from its beginnings, being able to identify a great amount of different families at the present time, many of them are highly sophisticated, with high propagation and persistence. In this blog we explain what is Sodinokibi and how it works.
Over the years, the automotive sector has been growing and evolving technologically. During this time, different deficiencies or vulnerabilities in smart cars have been discovered. For this reason, one of the key issues for this new type of vehicle is protection against possible threats.
It is increasingly common to find malware related to cryptocurrencies, either to use them as payment currency in extortions and illegal activities, cryptocurrency theft or infiltrate on systems and equipment from all areas to take advantage of the resources of the victims' equipment to undermine cryptocurrency
Alarm bells ringing again –a new malware threats industrial networks. After the attack suffered in Ukraine with BlackEnergy and the failures occurred at the beginning of the year, other new malware is added to the list of attackers of industrial control systems started by Stuxnet