Blog

Contenido Blog

Aurora vulnerability: origin, explanation and solutions

Posted on 26/09/2019, by
INCIBE (INCIBE)
Aurora_ICS
Perhaps, given the many important cybersecurity leaks and intrusions in recent years involving everything from social media accounts to critical infrastructure and classified military secrets, the attention paid to the Aurora vulnerability has not been proportional to its seriousness and systems affected. This is because it affects almost every electrical system in the world, and potentially any rotating equipment, whether it generates energy or is essential for an industrial or commercial installation. If the threat is so widespread, why isn’t the industry more worried and actively looking for solutions? From this article various possible reasons for this are given.

My industrial devices support LDAP, now what?

Posted on 19/09/2019, by
INCIBE (INCIBE)
Keyring
The main security standards and best practice guidelines in industrial cybersecurity include as a requirement the need for a user authentication system. The options involve implementations in each device of this system or being integrated into a centralised user authentication system. One of the most-used options is the use of the LDAP protocol, but there are a number of points to consider in the design phase, which are key when implementing a specific centralised user management system for industrial control systems, under LDAP.

The improvement of IIoT in industrial environments

Posted on 12/09/2019, by
INCIBE (INCIBE)
IoT
In recent years there has been an increase in interconnectivity between devices thanks to the Internet of Things (IoT). This has affected all sectors, including industry, which has been involved in an era of connectivity of industrial devices. This concept is known as the Industrial Internet of Things (IIoT).
Etiquetas

Attacking a BusyBox, the small Gaulish village

Posted on 05/09/2019, by
INCIBE (INCIBE)
Busybox
A BusyBox is software or a program that combines several functionalities in a small executable. This small tool was created for use in integrated operating systems with very limited resources, and they are usually used in control systems. But, as in all tools, you have to know what security level they have and if it can be improved.

Radio frequencies in industrial environments

Posted on 29/08/2019, by
INCIBE (INCIBE)
RF_ICS
In the industrial world there are many communications including radio communications. This article aims to inform the reader about these types of communications available and some concepts to consider. Also, about cases of cyberattacks that have been detected in order to prevent them in the future.

Secure network architecture, things in order

Posted on 08/08/2019, by
INCIBE (INCIBE)
Secure network architecture
Control system networks have grown immensely in recent years, something similar to what happened with the explosion of IT networks in the 1980s. This growth is happening somewhat chaotically, promoted mainly by productive needs and by the lack of joint definition of network administration managers for IT and OT, instead of doing it by thinking of the future, scalability and security.
Etiquetas

Measuring the severity of vulnerabilities: changes in CVSS 3.1

Posted on 01/08/2019, by
Hugo Rodríguez Santos (INCIBE)
CVSS3.1
The open and most-widely-used framework for communication and vulnerability scoring, the CVSS (Common Vulnerability Scoring System), has been updated, incorporating improvements in its new version 3.1 with respect to the previous one. This standard assesses the severity of computer systems vulnerabilities and assigns them a score of 0 to 10.