Imagen decorativa Avisos
Blog posted on 06/05/2021

This post sets out some lines of action that must be followed to deal with a DrDoS cyberattack based on the DNS protocol; it describes in detail the prevention, identification and response phases that must be followed.

Imagen decorativa Avisos
Blog posted on 22/04/2021

This article reviews the origin and development of the best-known types of denial-of-service attacks, placing special emphasis on Reflected Distributed Denial of Service attacks, analysing their main characteristics, operation, and consequences, as well as the measures necessary to mount a good defence against them.

Imagen decorativa Avisos
Blog posted on 15/04/2021

Various studies with threat analysis or malware distribution campaigns affecting Spain and identified through incident management undertaken by INCIBE-CERT. The aim is to increase knowledge of the more technical details and characteristics of the threats so that organisations can implement appropriate detection and protection measures.

Imagen decorativa Avisos
Blog posted on 24/09/2020

With the aim of increasing cybersecurity knowledge, INCIBE-CERT has published a series of webinars in video format, so that, in a light and entertaining way, knowledge and technical aspects of cybersecurity can be expanded in various areas of interest, for both INCIBE-CERT's technical audience and anyone interested in cybersecurity.

Imagen decorativa Avisos
Blog posted on 30/03/2020

In this article, we review virtual private networks, or VPNs, one of the most important measures for teleworking, as they allow a connection to the organization through secure networks, and the advantages they offer, as well as additional security recommendations to help ensure cyber security.

Imagen decorativa Avisos
Blog posted on 05/03/2020

Time synchronization in industrial devices is a critical factor. In terms of time, industrial processes and the programming logic of industrial devices have specific needs. These may require specific accuracy that determines the need to use one protocol or another, as well as dependencies on cost or on the network infrastructure itself. Explaining the main differences is key when using one or another in industrial infrastructures. Just as each protocol has different nuances, there are certain differences to be taken into account within security.

Imagen decorativa Avisos
Blog posted on 06/02/2020

Over the last few years we have seen how electric vehicles have experienced a boom in terms of their development and retail and, along with them, the deployment of their charging points. In this article we will discuss a series of requirements, in terms of security, that should be implemented in these charging stations in order to ensure their security.

Imagen decorativa Avisos
Blog posted on 28/11/2019

Over the years, the automotive sector has been growing and evolving technologically. During this time, different deficiencies or vulnerabilities in smart cars have been discovered. For this reason, one of the key issues for this new type of vehicle is protection against possible threats.

Imagen decorativa Avisos
Blog posted on 08/08/2019

Control system networks have grown immensely in recent years, something similar to what happened with the explosion of IT networks in the 1980s. This growth is happening somewhat chaotically, promoted mainly by productive needs and by the lack of joint definition of network administration managers for IT and OT, instead of doing it by thinking of the future, scalability and security.

Imagen decorativa Avisos
Blog posted on 04/07/2019

Security breaches that put our privacy at risk, leaks of our data, passwords... are incidents that happen more and more often. Protecting ourselves from these information leaks is often beyond our reach, but this does not mean that we should not try to take measures to protect our data. DNS-over-TLS can be very helpful in encrypting our communications, making them much more secure.