![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/blog/2023/Recuperar/imc_recuperar_portada.jpg)
It is necessary to protect the main business processes through a set of tasks that allow the organisation to recover from a major incident in a timeframe that does not compromise the continuity of its services. This ensures a planned response to any security breach.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2024-06/memcached_drdos.jpg)
This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the Memcached protocol, describing in detail the prevention, identification and response phases to follow.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/drdos_mdns_0.jpg)
This post sets out some lines of action that must be followed to deal with a DrDoS cyberattack based on the mDNS protocol; it describes in detail the prevention, identification and response phases that must be undertaken.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/portada_tftp.jpg)
This post sets out some lines of action that must be followed to deal with a DrDoS cyberattack based on the TFTP protocol; it describes in detail the prevention, identification and response phases that must be undertaken.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/portada_ntp.jpg)
This post sets out some lines of action that must be followed to deal with a DrDoS cyberattack based on the NTP protocol; it describes in detail the prevention, identification and response phases that must be undertaken.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/portada_dns_drdos.jpg)
This post sets out some lines of action that must be followed to deal with a DrDoS cyberattack based on the DNS protocol; it describes in detail the prevention, identification and response phases that must be followed.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/smartgrid.jpg)
In recent years we have witnessed the evolution of the electrical grid and the development of new technologies produce what we know today as the smart grid. This evolution continues to this day and the trend seems to point to greater interconnection between end consumers and the grid, which increases possible attack vectors. Over the course of this article, we shall see the security measures that will be used in the electrical grid of the future.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/drdos.png)
This article reviews the origin and development of the best-known types of denial-of-service attacks, placing special emphasis on Reflected Distributed Denial of Service attacks, analysing their main characteristics, operation, and consequences, as well as the measures necessary to mount a good defence against them.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/ekans_2.jpg)
This post presents some lines of action to be followed in the case of having fallen victim to Ekans ransomware. It describes in detail the prevention, identification and response phases to be carried out.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/ekans.jpg)
In this new blog entry, we will analyze the features and describe the operation of a new ransomware called Ekans, initially known as Snake, which has a very specific design, aimed at infecting and blocking Industrial Control Systems (ICS).