This study, conducted after analysing a sample of malware from the WannaMine family, with the main purpose of identifying the actions it performs and how it spreads, as well as identifying the family it belongs to and possible destructive effects it may cause, to know it and be able to take adequate prevention and response action.
This study focuses on the malicious code FluBot, a Trojan specially designed for Android devices and which has been present in multiple fraudulent SMS campaigns since 2020, in which it spoofs logistics companies seeking to have the user install a malicious application.
Through this study, a detail technical analysis of the threat is undertaken, with a sample of the malicious code, which belongs to the Mekotio family, with the main aim of identifying the actions this software carries out, using the set of tools used by this team of analysts.
This document provides Information Security Officers (ISOs) with guidelines for complying with the obligation to report cybersecurity incidents that have taken place within Public Administrations, critical infrastructures and strategic operators under their purview, as well as the rest of the entities included in the scope of application of Spanish Royal Decree-Law 12/2018.
This guide sets out the steps necessary and main recommendations for conducting an asset inventory in industrial networks. To do this, various possible methods are addressed, and their different characteristics are reviewed.
This guide includes concepts related to honeypots, recommended requisites for their correct implementation, different possible types and their evolution to the present day, where they are implemented, forming a honeynet.
The Cyber-resilience Improvement Indicators (CII) model is a tool to diagnose and measure the capacity of organizations to resist and overcome disasters and disturbances from the digital environment.
This guide describes IDS, IPS and SIEM technologies in the field of industrial control systems, delving into each technology and showing readers all steps necessary to completely deploy a real environment that can meet their needs.
This guide describes the main wireless technologies used in an industrial environment, and highlights the security features that are implemented by them as well as the recommended good practices to minimise the risks of a cyberincident.
This guide describes some of the specific protocols used in Smart Grid at European level. IIt offers the reader different alternatives to complement the security of each protocol and more specific alternatives to strengthen protocol's weaknesses.