Studies

Contenido Studies

Decorative image

Over the past few years, we have witnessed how cyberattacks in the industrial world have been growing and evolving, causing large-scale production and security problems. One example of this is the BlackEnergy malware.

Posted on: 
Language: English
Image for study of tools for recognition activity

With this study, we seek to offer a deep knowledge about the reconnaissance activity in cybersecurity, so that professionals from different fields can consider these tactics as an integral part of their security strategies. This study also aims to increase general understanding of these techniques and how they can be used to effectively protect information and systems.

Posted on: 
Language: English
Cybersecurity in TETRA networks study

The purpose of this study is to provide advanced knowledge about TETRA networks, so that different users can consider this standard for their critical communications, as well as to increase users’ basic knowledge about this type of networks. On the other hand, it defines different types of vulnerabilities that can affect this type of networks and explains how to remedy or mitigate them.

Posted on: 
Language: English

This study briefly describes the origin and threat evolution of the ransomware LockBit 3.0, through the analysis of several malicious samples, with the aim of providing the necessary information to identify the characteristics of this malware, its behaviour and the techniques used, thus enabling a better identification and response to it.

Posted on: 
Language: English

This study briefly describes the origin, background and historical evolution of the Nobelium group, through the analysis of a malicious sample, with the aim of providing the necessary information to identify the characteristics of this threat, its behaviour and the techniques used, thus enabling a better identification and response to it.

Posted on: 
Language: English

This study focuses on the Grandoreiro banking trojan from South America that has spread its operations to other regions, principally Europe, including Spain and Portugal.

Posted on: 
Language: English

This study focuses on the Hive malicious code, a type of ransomware that is increasingly relevant and linked to different campaigns.

Posted on: 
Language: English

Through this study, a detail technical analysis of the threat is undertaken, with a sample of the malicious code, which belongs to the Mekotio family, with the main aim of identifying the actions this software carries out, using the set of tools used by this team of analysts.

Posted on: 
Language: English

This study focuses on the malicious code FluBot, a Trojan specially designed for Android devices and which has been present in multiple fraudulent SMS campaigns since 2020, in which it spoofs logistics companies seeking to have the user install a malicious application.

Posted on: 
Language: English

This study contains a detailed technical report prepared after analysing a sample of malicious code identified as Cring, the main purpose of which is to identify the actions it carries out, by performing an advanced analysis of the sample, using the set of tools used by the team of analysts.

Posted on: 
Language: English