Dragos Security

  1. CRASHOVERRIDE, Analysis of the Threat to Electric Grid Operations. Enlace.
  2. Insights into Building an Industrial Control System Security Operations Center. Enlace.
  3. Trisis Malware, Analysis of Safety System Targeted Malware. Enlace.
  4. Industrial Control Vulnerabilities. Enlace.
  5. Industrial Control System Threats. Enlace.
  6. Hunting and Responding to Industrial Intrusions. Enlace.
  7. Whitepapers. Enlace.

Trend Micro

  1. The State of SCADA HMI Vulnerabilities.Enlace.
  2. Rogue Robots: Testing the Limits of an Industrial Robot’s Security. Enlace.
  3. A Security Analysis of Radio Remote Controllers for Industrial Applications. Enlace.
  4. Securing Smart Factories. Enlace.
  5. Hacker Machine Interface. Enlace.
  6. Caught in the Act: Running a Realistic Factory Honeypot to Capture Real Threats. Enlace.

Kaspersky Lab

  1. Greyenergy´s overlap with Zebrocy. Enlace.
  2. Threat Landscape for Industrial Automation Systems in H2 2018. Enlace.

Rockwell Automation

  1. Industrial Networks Design Guides. Enlace.
  2. Industrial Networks Whitepapers. Enlace.


  1. GreyEnergy: Dissecting the Malware from Maldoc to Backdoor. Enlace.


  1. Recommended Security Settings for IPCs in the Industrial Environment. Enlace.
  2. Security Guidelinessfor SIMATIC HMI Operator Panels. Enlace.
  3. Simulating a Cyberattack on the Energy Industry. Enlace.


  1. Honeywell Industrial USB Threat Report. Enlace.

General Electric

  1. Plant Applications 7.0, Secure Deployment Guide. Enlace.