![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/ekans_2.jpg)
Blog posted on 01/10/2020
This post presents some lines of action to be followed in the case of having fallen victim to Ekans ransomware. It describes in detail the prevention, identification and response phases to be carried out.
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
News posted on 30/09/2020
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
News posted on 25/09/2020
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
News posted on 24/09/2020
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
News posted on 21/09/2020
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
News posted on 27/08/2020
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
News posted on 21/08/2020
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/ekans.jpg)
Blog posted on 20/08/2020
In this new blog entry, we will analyze the features and describe the operation of a new ransomware called Ekans, initially known as Snake, which has a very specific design, aimed at infecting and blocking Industrial Control Systems (ICS).
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
News posted on 19/08/2020
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
News posted on 18/08/2020