![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2024-06/drdos_portmapper.jpg)
This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the PortMapper protocol, describing in detail the prevention, identification and response phases to follow.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2024-06/ldap_drdos.jpg)
This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the LDAP protocol, describing in detail the prevention, identification and response phases to follow.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2024-06/drdos_qotd.jpg)
This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the QOTD protocol, describing in detail the prevention, identification and response phases to follow.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2024-06/ciberataques-drdos-basados-en-el-protocolo-ssdp.jpg)
This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the SSDP protocol, describing in detail the prevention, identification and response phases to follow.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2024-06/portada_drdos_chargen.jpg)
En este post se presentan algunas líneas de actuación que deben seguirse para hacer frente a un ciberataque DrDoS basado en el protocolo CharGEN, describiendo detalladamente las fases de prevención, identificación y respuesta a adoptar.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2024-03/portada_coches.jpg)
The automotive world has always been one of the most cutting-edge sectors in terms of the technology used, which is why today's cars are equipped with technologies such as Bluetooth, NFC, GPS, etc., which improve different aspects such as comfort, fuel efficiency and increased safety.
But these implemented technologies can also bring with them serious problems, such as the risk of cyber-attacks that can affect passengers in the vehicle, both at the level of personal data and physical security.
For this reason, this article aims to provide an insight into some of the cyber-attacks that smart cars have suffered and how cyber-security is evolving and adapting to make more and more vehicles cyber-safe.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2023-11/Portada_5G_v2_0.png)
The evolution of communications in society is also having an impact on the industrial world. With the arrival of 5G, many industrial companies have considered migrating some of their communications to take advantage of the characteristics of this new mobile communications band, such as the reduction of latency times, the increase in connection speed or the exponential increase in the number of devices that can be connected to the network. These characteristics fit perfectly with the industrial mentality, where there are a multitude of interconnected devices between which there cannot be a communication cut due to the criticality of the processes they implement.
This article aims to comment, in addition to all the advantages that 5G provides to the industry, the different uses that can be given currently and the complexity of implementing these communications in some devices for subsequent deployment in the industry. Also, to specify possible vulnerabilities in communications using 5G networks.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/portada_drdos_ard_0.jpg)
This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the ARD protocol, describing in detail the prevention, identification and response phases to follow.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/portada_middlebox_ddos.jpg)
Weaknesses in TCP protocol implementation in middleboxes could provide a means to carry out distributed reflection denial-of-service (DrDoS) attacks against any target.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/portada_drdos_snmp.jpg)
This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the SNMP protocol, describing in detail the prevention, identification and response phases to follow.