All news
Employees of the State Research Institute of Cyber Security Technologies took part in the ICS-UKR-CERT program
Representatives of the State Research Institute of Cyber Security Technologies participated in the ICS-UKR-CERT program and gained theoretical and practical skills in understanding the work of CERT/CSIRT INCIBE, their interaction with the public/private sector and citizens.Completion of the specified training event allowed the participants to find useful tools for testing systems and networks for vulnerability (Shodan), to increase the general level of knowledge about the features and nature of attacks and vulnerabilities, the level of knowledge about cyber defense of systems and networks, to learn new features of testing systems for vulnerability, to obtain statistical data regarding the most common vulnerabilities in network infrastructures, to consider the possibility of applying and implementing the obtained tools and methods in their own activities.

Collaboration at all levels is key to building effective cyber defense systems
In the conditions of the rapid development of information technologies, the formation of effective approaches that will ensure the cyber resilience of information systems is extremely important. In order for this work to be as effective as possible, it is necessary to develop cooperation both within the state and at the interstate level, create a modern regulatory framework, and train specialists who will be able to resist threats in cyberspace. This was emphasized by Oleksandr Potii, the deputy head of the State Special Service, during his speech at the World Economic Forum.

We are strengthening cooperation with international partners to effectively counter cyber threats
The Administration of the State Service for Special Communications and Information Protection of Ukraine and the Information Technology and Cyber Security Service of the Republic of Moldova concluded a Memorandum of Understanding in the field of cyber protection. Signatories to the document are Yuriy Shchygol, head of the State Intelligence Service, and Alesandru Koretskyi, head of the Moldovan service.

The number of information operations with a cyber component has increased
In addition to the groups controlled by the FSB of the Russian Federation and the Russian Main Directorate of the General Staff of the Armed Forces of the Russian Federation (Gu Gsh ZS RF, formerly Gru), Ukraine is also actively attacked by the so-called "independent hacktivists", who turned out to be an "umbrella" for state-controlled criminals. In particular, these are Killnet, NoName057(16), XakNet, Anonymous Russia and Cyber Army of Russia. These hacker groups actually cooperate with each other. They attacked the same or similar targets and retweeted each other's messages on social media.

Updating educational programs in the field of cyber security according to new professional standards: experience and plans
In Ukraine, work continues on improving the personnel training system and strengthening personnel potential in the field of information and cyber security. The reform envisages, in particular, the development and implementation of new professional standards taking into account the best international experience. The new professional standards are important both for employers and for educational institutions, which can adapt their educational and professional programs accordingly.

What is a VPN and how to use it safely
The occupiers in the temporarily occupied territories are trying to connect Ukrainians to Russian Internet networks, where there is equipment for filtering Internet traffic, which made it possible to block many Ukrainian and international web resources. To avoid tracking and bypass restrictions, we advise Ukrainian users connected to Russian networks to use VPN services.

How to hide your IP address
An IP address, or Internet Protocol address, is a unique numerical identifier of a gadget on the network, which is needed to transfer information between devices. Every computer, tablet, smartphone connected to the Internet has an IP address. It can be static (permanent, provided by the provider) and dynamic (changes every time you connect to the Internet).

The State Intelligence Service conducted training on cyber protection of critical information infrastructure for information security specialists of the state sector
Objects of critical infrastructure of Ukraine are one of the main targets of Russian hackers during the war in Ukraine. In order to improve the knowledge of information security specialists and provide practical skills that will help institutions to be effective in building and managing cyber protection, the State Special Communications Service conducted a second educational course for category "B" civil servants.

Criminals send viruses under the guise of recommendations from CERT-UA
The government computer emergency response team of Ukraine CERT-UA, which operates under the State Special Communications Service, discovered and investigated the distribution of emails by criminals using the email address cert-ua@ ukr.net. The letters with the subject "CERT-UA Recommendations on the settings of MS Office programs" contain an attached file "INTERNAL CYBER THREAT.chm" allegedly on behalf of CERT-UA.

Cyber attack by group UAC-0057 (GhostWriter) against the state organization of Ukraine using PicassoLoader and Cobalt Strike Beacon (CERT-UA#6852)
The Government Computer Emergency Response Team of Ukraine CERT-UA discovered the PPT document "daewdfq342r.ppt", which contains a macro and a thumbnail image with the emblem of the National Defense University of Ukraine named after Ivan Chernyakhivskyi.