Decorative image

Over the past few years, we have witnessed how cyberattacks in the industrial world have been growing and evolving, causing large-scale production and security problems. One example of this is the BlackEnergy malware.

Posted on: 
Language: English
Image for study of tools for recognition activity

With this study, we seek to offer a deep knowledge about the reconnaissance activity in cybersecurity, so that professionals from different fields can consider these tactics as an integral part of their security strategies. This study also aims to increase general understanding of these techniques and how they can be used to effectively protect information and systems.

Posted on: 
Language: English
Decorative image of Firmware analysis of industrial devices

The main purpose of this guide is to define the steps to ethically identify vulnerabilities in different types of firmware, in order to eliminate or mitigate them, explaining to a greater extent everything about IoT device firmware, both at a theoretical-technical level as well as a practical explanation on how to analyze device firmware.

Posted on: 
Language: English
Protection guide for endpoints in industrial control systems image
Posted on: 
Language: English
Cybersecurity in TETRA networks study

The purpose of this study is to provide advanced knowledge about TETRA networks, so that different users can consider this standard for their critical communications, as well as to increase users’ basic knowledge about this type of networks. On the other hand, it defines different types of vulnerabilities that can affect this type of networks and explains how to remedy or mitigate them.

Posted on: 
Language: English

This study briefly describes the origin and threat evolution of the ransomware LockBit 3.0, through the analysis of several malicious samples, with the aim of providing the necessary information to identify the characteristics of this malware, its behaviour and the techniques used, thus enabling a better identification and response to it.

Posted on: 
Language: English

This study briefly describes the origin, background and historical evolution of the Nobelium group, through the analysis of a malicious sample, with the aim of providing the necessary information to identify the characteristics of this threat, its behaviour and the techniques used, thus enabling a better identification and response to it.

Posted on: 
Language: English

This study focuses on the Grandoreiro banking trojan from South America that has spread its operations to other regions, principally Europe, including Spain and Portugal.

Posted on: 
Language: English

This study focuses on the Hive malicious code, a type of ransomware that is increasingly relevant and linked to different campaigns.

Posted on: 
Language: English
Anatsa analysis study image

This study focuses on the harmful Anatsa code, a trojan especially designed for Android devices that has been present in multiple fraudulent SMS schemes since 2020, in which logistics companies are impersonated in an attempt to get the user to install a malicious application.

Posted on: 
Language: English

Go top