Home / Blog / Filter / Blog
Subscribe to INCIBE-CERT - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Windows
Threat analysis image

Threat analysis study: Grandoreiro

Posted on 06/02/2022, by INCIBE
Grandoreiro, also known as Delephant, is a banking trojan from South America, which has spread its operations to other regions, especially Europe, including Spain and Portugal. According to ESET researchers, it has been active since 2015, affecting countries in Latin America, mainly Brazil, where it was developed.
Log4Shell: analysis of vulnerabilities in Log4j

Log4Shell: analysis of vulnerabilities in Log4j

Posted on 02/24/2022, by INCIBE
This post will analyse the vulnerabilities associated with Log4Shell, detected in the library Log4j, which is found in infinite software products both in technical and industrial fields. Although there have been other instances of more sophisticated vulnerabilities, the problem with this one is area of exposure.
imagen de estudios de amenazas

Threat analysis study: Hive

Posted on 12/20/2021, by INCIBE
The malicious code of the ransomware known as ‘Hive’ represents a threat to all users, as it implements encryption functionalities on the information in an infected computer, making simple recovery of the data impossible. This threat attempts to use extortion to recover the information, demanding a payment and threatening publication of part of the stolen information on a blog through the network Tor if the payment is not forthcoming.
Threat analysis studies image

Threat analysis studies: Mekotio, FluBot, Cring and WannaMine

Posted on 04/15/2021, by INCIBE
Various studies with threat analysis or malware distribution campaigns affecting Spain and identified through incident management undertaken by INCIBE-CERT. The aim is to increase knowledge of the more technical details and characteristics of the threats so that organisations can implement appropriate detection and protection measures.
Protect

Protect your DNS requests with DNS over TLS

Posted on 07/04/2019, by Ignacio Porro Sáez (INCIBE)
Security breaches that put our privacy at risk, leaks of our data, passwords... are incidents that happen more and more often. Protecting ourselves from these information leaks is often beyond our reach, but this does not mean that we should not try to take measures to protect our data. DNS-over-TLS can be very helpful in encrypting our communications, making them much more secure.
Balance

Comparative study of mobile architectures

Posted on 05/31/2016, by Asier Martínez (INCIBE)
The following article shall outline the most significant technical specifications of the main mobile platforms. Accordingly, the 4 most widely used mobile platforms are going to be taken into account based on their market share: Android, iOS, Windows Phone and BlackBerry OS.
2015 Cybersecurity Highlights

2015 Cybersecurity Highlights log

Posted on 01/28/2016, by David Cantón (INCIBE)
Nobody can deny that computer security is a vital issue in our lives, affecting all of us. It is not uncommon to see articles on themes related to or speaking directly about computer security in newspapers or mainstream publications. The INCIBE_ Cybersecurity Highlights log aims to gather together articles published on events or incidents related to computer security based on their importance...

Pages