![New 2024 cybersecurity regulations for vehicles image decorative image New 2024 cybersecurity regulations for vehicles](/sites/default/files/2024-05/Coches_mini.png)
![Study decorative image Decorative image](/sites/default/files/2024-02/Amenazas_mini_0.png)
Over the past few years, we have witnessed how cyberattacks in the industrial world have been growing and evolving, causing large-scale production and security problems. One example of this is the BlackEnergy malware.
![Study decorative image Image for study of tools for recognition activity](/sites/default/files/2023-08/Reconocimiento_mini.png)
With this study, we seek to offer a deep knowledge about the reconnaissance activity in cybersecurity, so that professionals from different fields can consider these tactics as an integral part of their security strategies. This study also aims to increase general understanding of these techniques and how they can be used to effectively protect information and systems.
![Firmware analysis of industrial devices Decorative image of Firmware analysis of industrial devices](/sites/default/files/2023-08/Firmware_mini.png)
The main purpose of this guide is to define the steps to ethically identify vulnerabilities in different types of firmware, in order to eliminate or mitigate them, explaining to a greater extent everything about IoT device firmware, both at a theoretical-technical level as well as a practical explanation on how to analyze device firmware.
![Decorative image Protection guide for endpoints in industrial control systems image](/sites/default/files/2023-05/Portada_Defensa%2520de%2520EndPoints_mini.jpg)
![Cybersecurity in TETRA networks study Cover Cybersecurity in TETRA networks study](/sites/default/files/contenidos/estudios/mini_tetra_0.png)
The purpose of this study is to provide advanced knowledge about TETRA networks, so that different users can consider this standard for their critical communications, as well as to increase users’ basic knowledge about this type of networks. On the other hand, it defines different types of vulnerabilities that can affect this type of networks and explains how to remedy or mitigate them.
![](/sites/default/files/contenidos/estudios/mini_estudios_amenazas_6.png)
This study briefly describes the origin and threat evolution of the ransomware LockBit 3.0, through the analysis of several malicious samples, with the aim of providing the necessary information to identify the characteristics of this malware, its behaviour and the techniques used, thus enabling a better identification and response to it.
![](/sites/default/files/contenidos/estudios/mini_estudios_amenazas_5.png)
This study briefly describes the origin, background and historical evolution of the Nobelium group, through the analysis of a malicious sample, with the aim of providing the necessary information to identify the characteristics of this threat, its behaviour and the techniques used, thus enabling a better identification and response to it.
![](/sites/default/files/contenidos/estudios/mini_estudios_amenazas_4_0.png)
This study focuses on the Grandoreiro banking trojan from South America that has spread its operations to other regions, principally Europe, including Spain and Portugal.
![](/sites/default/files/contenidos/estudios/mini_estudios_amenazas_4.png)
This study focuses on the Hive malicious code, a type of ransomware that is increasingly relevant and linked to different campaigns.