Over the past few years, we have witnessed how cyberattacks in the industrial world have been growing and evolving, causing large-scale production and security problems. One example of this is the BlackEnergy malware.
With this study, we seek to offer a deep knowledge about the reconnaissance activity in cybersecurity, so that professionals from different fields can consider these tactics as an integral part of their security strategies. This study also aims to increase general understanding of these techniques and how they can be used to effectively protect information and systems.
The main purpose of this guide is to define the steps to ethically identify vulnerabilities in different types of firmware, in order to eliminate or mitigate them, explaining to a greater extent everything about IoT device firmware, both at a theoretical-technical level as well as a practical explanation on how to analyze device firmware.
The purpose of this study is to provide advanced knowledge about TETRA networks, so that different users can consider this standard for their critical communications, as well as to increase users’ basic knowledge about this type of networks. On the other hand, it defines different types of vulnerabilities that can affect this type of networks and explains how to remedy or mitigate them.
This study briefly describes the origin and threat evolution of the ransomware LockBit 3.0, through the analysis of several malicious samples, with the aim of providing the necessary information to identify the characteristics of this malware, its behaviour and the techniques used, thus enabling a better identification and response to it.
This study briefly describes the origin, background and historical evolution of the Nobelium group, through the analysis of a malicious sample, with the aim of providing the necessary information to identify the characteristics of this threat, its behaviour and the techniques used, thus enabling a better identification and response to it.
This study focuses on the Grandoreiro banking trojan from South America that has spread its operations to other regions, principally Europe, including Spain and Portugal.