Home / Publications / Studies
Subscribe to CERTSI - Studies RSS
Study of the Mekotio analysis

Study of the Mekotio analysis

Posted on 04/15/2021
Through this study, a detail technical analysis of the threat is undertaken, with a sample of the malicious code, which belongs to the Mekotio family, with the main aim of identifying the actions this software carries out, using the set of tools used by this team of analysts.
Documentos asociados: 
Study of the FluBot analysis

Study of the FluBot analysis

Posted on 04/15/2021
This study focuses on the malicious code FluBot, a Trojan specially designed for Android devices and which has been present in multiple fraudulent SMS campaigns since 2020, in which it spoofs logistics companies seeking to have the user install a malicious application.
Documentos asociados: 
Study of the Cring analysis

Study of the Cring analysis

Posted on 04/15/2021
This study contains a detailed technical report prepared after analysing a sample of malicious code identified as Cring, the main purpose of which is to identify the actions it carries out, by performing an advanced analysis of the sample, using the set of tools used by the team of analysts.
Documentos asociados: 
Study of the WannaMine analysis

Study of the WannaMine analysis

Posted on 04/15/2021
This study, conducted after analysing a sample of malware from the WannaMine family, with the main purpose of identifying the actions it performs and how it spreads, as well as identifying the family it belongs to and possible destructive effects it may cause, to know it and be able to take adequate prevention and response action.
Documentos asociados: 
Summary report of the feasibility study and design of a network of centers of excellence in R & D in cybersecurity

Summary report of the feasibility study and design of a network of centers of excellence in R & D in cybersecurity

Posted on 06/01/2015
This report contains a summary of the methodology followed as well as the main findings and results obtained after completion of the study in order to understand the context and dynamics of the R&D and innovation activity related to cybersecurity in Spain.
Cyber exercises taxonomy

Cyber exercises taxonomy

Posted on 03/12/2015
INCIBE publishes the study on “Cyber exercises taxonomy” with the aim of proposing a taxonomy of cyber exercises that can become a useful tool for the national and international cybersecurity community.
Documentos asociados: 
Cyber-Resilience: An Approach to a Measurement Framework

Cyber-Resilience: An Approach to a Measurement Framework

Posted on 04/22/2014
Computer Emergency Response Team from INCIBE publishes the study "Cyber-Resilience: An Approach to a Measurement Framework." The cyber-resilience is the capacity for resisting, protect and advocate the use of cyberspace from attackers. INCIBE proposes an indicators framework for measuring aimed at measuring the capacity of organizations to various attacks, threats or incidents that may occur.