All news

Employees of the State Research and Development Institute of Cyber Security Technologies took part in a training session for facilitators of tabletop exercises (English TTX - Tabletop Exercise)

10.01.2024 10:08

The training was organized by the Cybersecurity and Infrastructure Security Agency of the Department of National Security of the United States of America (CISA) with the support of the USAID Project "Cybersecurity of Critical Infrastructure of Ukraine".

Employees of the State Research Institute of Cyber Security Technologies took part in the online course "Oracle Database: SQL and PL/SQL Fundamentals"

10.01.2024 10:05

The curriculum consisted of 2 modules and practice:- Module 1 - SQL 1 Fundamentals;- Module 2 - PL/SQL Fundamentals.The training concept was to present the basic principles of operation of industrial control systems, possible vulnerabilities and methods of protection.

Representatives of the State Research Institute of Cyber Security Technologies took part in the SAINT CYBER-Cyber analyst training 2023 training course

10.01.2024 10:00

The training program consisted of two modules:- Module I general training;- Module II specialized training.The concept of the training was to present the training group in the form of a SOC (Security Operations Center) and, using theoretical and practical training elements, familiarize the training group with SOC activities.

Employees of the State Research Institute of Cyber Security Technologies took part in the ICS-UKR-CERT program

10.01.2024 09:04

Representatives of the State Research Institute of Cyber Security Technologies participated in the ICS-UKR-CERT program and gained theoretical and practical skills in understanding the work of CERT/CSIRT INCIBE, their interaction with the public/private sector and citizens.Completion of the specified training event allowed the participants to find useful tools for testing systems and networks for vulnerability (Shodan), to increase the general level of knowledge about the features and nature of attacks and vulnerabilities, the level of knowledge about cyber defense of systems and networks, to learn new features of testing systems for vulnerability, to obtain statistical data regarding the most common vulnerabilities in network infrastructures, to consider the possibility of applying and implementing the obtained tools and methods in their own activities.

Collaboration at all levels is key to building effective cyber defense systems - CSIRT

Collaboration at all levels is key to building effective cyber defense systems

29.11.2023 08:53

In the conditions of the rapid development of information technologies, the formation of effective approaches that will ensure the cyber resilience of information systems is extremely important. In order for this work to be as effective as possible, it is necessary to develop cooperation both within the state and at the interstate level, create a modern regulatory framework, and train specialists who will be able to resist threats in cyberspace. This was emphasized by Oleksandr Potii, the deputy head of the State Special Service, during his speech at the World Economic Forum.

We are strengthening cooperation with international partners to effectively counter cyber threats - CSIRT

We are strengthening cooperation with international partners to effectively counter cyber threats

29.11.2023 08:46

The Administration of the State Service for Special Communications and Information Protection of Ukraine and the Information Technology and Cyber Security Service of the Republic of Moldova concluded a Memorandum of Understanding in the field of cyber protection. Signatories to the document are Yuriy Shchygol, head of the State Intelligence Service, and Alesandru Koretskyi, head of the Moldovan service.

The number of information operations with a cyber component has increased - CSIRT

The number of information operations with a cyber component has increased

29.11.2023 08:32

In addition to the groups controlled by the FSB of the Russian Federation and the Russian Main Directorate of the General Staff of the Armed Forces of the Russian Federation (Gu Gsh ZS RF, formerly Gru), Ukraine is also actively attacked by the so-called "independent hacktivists", who turned out to be an "umbrella" for state-controlled criminals. In particular, these are Killnet, NoName057(16), XakNet, Anonymous Russia and Cyber Army of Russia. These hacker groups actually cooperate with each other. They attacked the same or similar targets and retweeted each other's messages on social media.

Updating educational programs in the field of cyber security according to new professional standards: experience and plans - CSIRT

Updating educational programs in the field of cyber security according to new professional standards: experience and plans

29.11.2023 08:17

In Ukraine, work continues on improving the personnel training system and strengthening personnel potential in the field of information and cyber security. The reform envisages, in particular, the development and implementation of new professional standards taking into account the best international experience. The new professional standards are important both for employers and for educational institutions, which can adapt their educational and professional programs accordingly.

What is a VPN and how to use it safely - CSIRT

What is a VPN and how to use it safely

10.08.2023 10:25

The occupiers in the temporarily occupied territories are trying to connect Ukrainians to Russian Internet networks, where there is equipment for filtering Internet traffic, which made it possible to block many Ukrainian and international web resources. To avoid tracking and bypass restrictions, we advise Ukrainian users connected to Russian networks to use VPN services.

How to hide your IP address - CSIRT

How to hide your IP address

10.08.2023 10:20

An IP address, or Internet Protocol address, is a unique numerical identifier of a gadget on the network, which is needed to transfer information between devices. Every computer, tablet, smartphone connected to the Internet has an IP address. It can be static (permanent, provided by the provider) and dynamic (changes every time you connect to the Internet).