![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/blog_estudios_amenazas_2.png)
Grandoreiro, also known as Delephant, is a banking trojan from South America, which has spread its operations to other regions, especially Europe, including Spain and Portugal. According to ESET researchers, it has been active since 2015, affecting countries in Latin America, mainly Brazil, where it was developed.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/mitre_matriz.jpg)
Monitoring and analyzing security incidents in Industrial Control Systems (ICS) has been a priority for many organizations for a while now. As a response to this need, and given the great success in other areas specialized in cybersecurity, the MITRE organization has developed a matrix that collects many of the tactics, techniques and procedures detected in the industrial world. This article seeks to make the contents and potential uses of said matrix known.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/blog_estudios_amenazas_1.png)
The malicious code of the ransomware known as ‘Hive’ represents a threat to all users, as it implements encryption functionalities on the information in an infected computer, making simple recovery of the data impossible. This threat attempts to use extortion to recover the information, demanding a payment and threatening publication of part of the stolen information on a blog through the network Tor if the payment is not forthcoming.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/antivirusng.jpg)
The new generations of antiviruses may entail an improvement in the OT environment, since special care must be taken with the assets, networks and communications of Industrial Control Systems. They can also help secure our industries against the increasingly frequent cyberattacks directed against them.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2023-05/blog_estudios_amenazas_0%5B1%5D.png)
Anatsa is a banking Trojan designed for Android devices that has become particularly relevant since its discovery in January 2021. Throughout the study, a detailed technical analysis of the threat is carried out using a sample of the malicious code in question to show how this malware behaves and the possibilities it offers.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/smartgrid.jpg)
In recent years we have witnessed the evolution of the electrical grid and the development of new technologies produce what we know today as the smart grid. This evolution continues to this day and the trend seems to point to greater interconnection between end consumers and the grid, which increases possible attack vectors. Over the course of this article, we shall see the security measures that will be used in the electrical grid of the future.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/blog_estudios_amenazas.png)
Various studies with threat analysis or malware distribution campaigns affecting Spain and identified through incident management undertaken by INCIBE-CERT. The aim is to increase knowledge of the more technical details and characteristics of the threats so that organisations can implement appropriate detection and protection measures.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/webinars.jpg)
With the aim of increasing cybersecurity knowledge, INCIBE-CERT has published a series of webinars in video format, so that, in a light and entertaining way, knowledge and technical aspects of cybersecurity can be expanded in various areas of interest, for both INCIBE-CERT's technical audience and anyone interested in cybersecurity.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/siem.jpg)
Today, it is common to find SIEM deployed in the IT infrastructures of all kinds of organisations, to be able to monitor and analyse security alerts in applications, systems, network devices, etc. However, though time and resources are being invested in industrial environments, it is still unresolved.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/istock-813062006.jpg)
The process of creating intelligence, and the correct application of this cycle to obtain "consumable" intelligence, targeted to our industry's specific threats, is essential in order to face the new defence needs.