Decorative image of Firmware analysis of industrial devices

The main purpose of this guide is to define the steps to ethically identify vulnerabilities in different types of firmware, in order to eliminate or mitigate them, explaining to a greater extent everything about IoT device firmware, both at a theoretical-technical level as well as a practical explanation on how to analyze device firmware.

Posted on: 
Language: English
Protection guide for endpoints in industrial control systems image
Posted on: 
Language: English
Anatsa analysis study image

This study focuses on the harmful Anatsa code, a trojan especially designed for Android devices that has been present in multiple fraudulent SMS schemes since 2020, in which logistics companies are impersonated in an attempt to get the user to install a malicious application.

Posted on: 
Language: English

This document provides Information Security Officers (ISOs) with guidelines for complying with the obligation to report cybersecurity incidents that have taken place within Public Administrations, critical infrastructures and strategic operators under their purview, as well as the rest of the entities included in the scope of application of Spanish Royal Decree-Law 12/2018.

Posted on: 
Language: English

This guide sets out the steps necessary and main recommendations for conducting an asset inventory in industrial networks. To do this, various possible methods are addressed, and their different characteristics are reviewed.

Posted on: 
Language: English

This guide includes concepts related to honeypots, recommended requisites for their correct implementation, different possible types and their evolution to the present day, where they are implemented, forming a honeynet.

Posted on: 
Language: English

The Cyber-resilience Improvement Indicators (CII) model is a tool to diagnose and measure the capacity of organizations to resist and overcome disasters and disturbances from the digital environment.

Posted on: 
Language: English

This guide describes IDS, IPS and SIEM technologies in the field of industrial control systems, delving into each technology and showing readers all steps necessary to completely deploy a real environment that can meet their needs.

Posted on: 
Language: English

This guide describes the main wireless technologies used in an industrial environment, and highlights the security features that are implemented by them as well as the recommended good practices to minimise the risks of a cyberincident.

Posted on: 
Language: English

This guide describes some of the specific protocols used in Smart Grid at European level. IIt offers the reader different alternatives to complement the security of each protocol and more specific alternatives to strengthen protocol's weaknesses.

Posted on: 
Language: English