INCIBE-CERT

Contenido INCIBE-CERT

 

NoSQL Injection: How malicious input can compromise your application

Posted on 20/06/2025, by
INCIBE (INCIBE)
NoSQL injections. A hand touching a digital screen with a database icon , the background is a blurred digital environment with binary code and abstract shapes. The database icon is adorned with "NoSQL"
Given the increasing proliferation of NoSQL databases in modern applications, it is critical for developers and security teams to understand the risks associated with NoSQL injections. This article discusses the threats and impact of these vulnerabilities, the techniques attackers use to discover and exploit weaknesses in applications, and best practices for protecting against these types of attacks. Through a defense-in-depth strategy, which combines input validation, secure queries, strict access controls, and continuous monitoring, organizations will be able to strengthen the security of their applications against NoSQL injections and mitigate the associated risks.

ICS Matrix: Unauthorized initial access. Part 1

Posted on 24/04/2025, by
INCIBE (INCIBE)
Acceso inicial no autorizado a equipos SCI. Candados, password, mapa del mundo, código binario.
The Initial Access tactic is one of the 12 tactics that make up the matrix developed by MITRE for industrial environments (for more information on the matrix, feel free to consult the article ICS Matrix, the State of v11). Within this tactic, different techniques used by attackers with the aim of gaining unauthorized access to an industrial environment are shown. This is often the first target of external attackers, as access to the ICS's internal environment allows internal computers to be recognized and exploited, move around the network, gain elevated privileges, or steal sensitive information. Therefore, it is important to know this tactic in order to defend our systems

Windows forensic keys: essential artifacts for digital investigation

Updated on 20/03/2025, by
INCIBE (INCIBE)
Windows forensic keys: essential artifacts for digital investigation
In the digital forensic analysis of Windows systems, artefacts such as event logs, prefetch files, LNK files or the Windows Registry are essential for the investigation of cyber incidents. These artefacts are characterised by the storage of detailed information about system and user activities, allowing the identification of malicious actions, the tracking of attackers' movements and the reconstruction of timelines of critical events. Thanks to these, attack techniques such as command execution, persistence and evasion of system defences can be detected. Knowledge about the collection and analysis of these artefacts ensures accurate and efficient analysis. Therefore, contextualising the relevance of these artefacts helps cybersecurity professionals to strengthen their detection and response capabilities, thus ensuring the integrity of collected evidence and improving the effectiveness of digital forensic investigations.

Vulnerabilities

Check our database with information in Spanish about the latest documented and known vulnerabilities.

Guides and studies

Advanced practical and theoretical content on cybersecurity for technicians.

Service for operators

Set of services we offer for strategic operators.

Servicio para operadores