![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2024-06/memcached_drdos.jpg)
This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the Memcached protocol, describing in detail the prevention, identification and response phases to follow.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2023-05/blog_estudios_amenazas_0%5B1%5D.png)
Anatsa is a banking Trojan designed for Android devices that has become particularly relevant since its discovery in January 2021. Throughout the study, a detailed technical analysis of the threat is carried out using a sample of the malicious code in question to show how this malware behaves and the possibilities it offers.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/drdos_mdns_0.jpg)
This post sets out some lines of action that must be followed to deal with a DrDoS cyberattack based on the mDNS protocol; it describes in detail the prevention, identification and response phases that must be undertaken.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/portada_tftp.jpg)
This post sets out some lines of action that must be followed to deal with a DrDoS cyberattack based on the TFTP protocol; it describes in detail the prevention, identification and response phases that must be undertaken.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/portada_ntp.jpg)
This post sets out some lines of action that must be followed to deal with a DrDoS cyberattack based on the NTP protocol; it describes in detail the prevention, identification and response phases that must be undertaken.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/portada_dns_drdos.jpg)
This post sets out some lines of action that must be followed to deal with a DrDoS cyberattack based on the DNS protocol; it describes in detail the prevention, identification and response phases that must be followed.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/drdos.png)
This article reviews the origin and development of the best-known types of denial-of-service attacks, placing special emphasis on Reflected Distributed Denial of Service attacks, analysing their main characteristics, operation, and consequences, as well as the measures necessary to mount a good defence against them.