Monitoring and analyzing security incidents in Industrial Control Systems (ICS) has been a priority for many organizations for a while now. As a response to this need, and given the great success in other areas specialized in cybersecurity, the MITRE organization has developed a matrix that collects many of the tactics, techniques and procedures detected in the industrial world. This article seeks to make the contents and potential uses of said matrix known.
Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Safe development
Not all industrial control systems operate with the same programming language given that, depending on the manufacturer, devices will work with a specific software and programming language. This may be a problem for plant managers in industrial systems, as the interconnectivity between devices becomes impossible, or at least, is further complicated. One solution that has emerged in order to connect systems from different operating systems is CORBA standard and CORBAsec, its development with added security.
The malicious code of the ransomware known as ‘Hive’ represents a threat to all users, as it implements encryption functionalities on the information in an infected computer, making simple recovery of the data impossible. This threat attempts to use extortion to recover the information, demanding a payment and threatening publication of part of the stolen information on a blog through the network Tor if the payment is not forthcoming.
Cyberattacks using ransomware are one of the main threats for companies all over the world and Spain is the tenth most affected country. For this reason, this article, in continuation of previous posts on measures of prevention and detection, looks in detail at how to respond these attacks.
All organisations must be prepared so that, after the impact of a cyberattack, it may change, improve and adapt its processes and services. For this reason, it is necessary to protect the main business processes using a set of tasks that allow the organisation to evolve after a serious incident to redesign its strategies and minimise the possible impact of future cyberattacks
Cyberattacks using ransomware constitute one of the biggest threats to companies all over the world and Spain is the tenth most affected country. This article, as a continuation of previous posts on preventive measures, looks in detail at how to detect these attacks.
Cyberattacks using ransomware are one of the main threats for companies all over the world and Spain is the tenth most affected country. That is why, in this article, as a continuation of the previous one entitled: ‘Ransomware: preventative measures (I)’, will cover in detail new recommendations to prevent them.
This article reviews some of the most representative cybersecurity and cyberresilience frameworks that can be found in Spain, Europe, the US and the UK, and whose adoption can help organisations to further improve their cybersecurity protection capabilities.
Anatsa is a banking Trojan designed for Android devices that has become particularly relevant since its discovery in January 2021. Throughout the study, a detailed technical analysis of the threat is carried out using a sample of the malicious code in question to show how this malware behaves and the possibilities it offers.
In previous articles an introduction was given to the 61850 regulation and the different protocols of which it consists. As explained in those articles, the GOOSE and SV (Sample Values) protocols, included in the standard, use multicast frames. Security is very difficult to implement in this type of frame, but there are a number of measures that make possible to raise the security level.