This study contains a detailed technical report prepared after analysing a sample of malicious code identified as Cring, the main purpose of which is to identify the actions it carries out, by performing an advanced analysis of the sample, using the set of tools used by the team of analysts.

Posted on: 
Language: English

This study, conducted after analysing a sample of malware from the WannaMine family, with the main purpose of identifying the actions it performs and how it spreads, as well as identifying the family it belongs to and possible destructive effects it may cause, to know it and be able to take adequate prevention and response action.

Posted on: 
Language: English

This study focuses on the malicious code FluBot, a Trojan specially designed for Android devices and which has been present in multiple fraudulent SMS campaigns since 2020, in which it spoofs logistics companies seeking to have the user install a malicious application.

Posted on: 
Language: English

Through this study, a detail technical analysis of the threat is undertaken, with a sample of the malicious code, which belongs to the Mekotio family, with the main aim of identifying the actions this software carries out, using the set of tools used by this team of analysts.

Posted on: 
Language: English

This document provides Information Security Officers (ISOs) with guidelines for complying with the obligation to report cybersecurity incidents that have taken place within Public Administrations, critical infrastructures and strategic operators under their purview, as well as the rest of the entities included in the scope of application of Spanish Royal Decree-Law 12/2018.

Posted on: 
Language: English

This guide sets out the steps necessary and main recommendations for conducting an asset inventory in industrial networks. To do this, various possible methods are addressed, and their different characteristics are reviewed.

Posted on: 
Language: English

This guide includes concepts related to honeypots, recommended requisites for their correct implementation, different possible types and their evolution to the present day, where they are implemented, forming a honeynet.

Posted on: 
Language: English

The Cyber-resilience Improvement Indicators (CII) model is a tool to diagnose and measure the capacity of organizations to resist and overcome disasters and disturbances from the digital environment.

Posted on: 
Language: English

This guide describes IDS, IPS and SIEM technologies in the field of industrial control systems, delving into each technology and showing readers all steps necessary to completely deploy a real environment that can meet their needs.

Posted on: 
Language: English

This guide describes the main wireless technologies used in an industrial environment, and highlights the security features that are implemented by them as well as the recommended good practices to minimise the risks of a cyberincident.

Posted on: 
Language: English