{"id":3084,"date":"2026-05-08T08:22:48","date_gmt":"2026-05-08T08:22:48","guid":{"rendered":"https:\/\/inprotech.es\/?p=3084"},"modified":"2026-05-08T09:21:26","modified_gmt":"2026-05-08T09:21:26","slug":"ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice","status":"publish","type":"post","link":"https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/","title":{"rendered":"OT Threat Intelligence: how to read the Xunta&#8217;s report and put it into practice"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The <a href=\"https:\/\/ciberseguridadegalicia.gal\/gl\/recursos\/documentacion\/informe-de-intelixencia-de-ameazas\" target=\"_blank\" rel=\"noopener\">Threat Intelligence Report of the Industrial Cybersecurity Observatory<\/a>, published by the Xunta de Galicia through <a href=\"https:\/\/amtega.xunta.gal\/es\/centro-de-ciberseguridad\" target=\"_blank\" rel=\"noopener\">AMTEGA<\/a> as part of the RETECH project, offers a structured overview of the actors, tactics and trends affecting OT and ICS systems in Galicia&#8217;s industrial landscape.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Drawing on the information gathered in the document, and from hands-on experience with OT systems, it is possible to reflect on how these threats translate into real-world environments and what they mean for risk management, security architecture and response capabilities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The report identifies campaign patterns, frequent attack vectors and profiles of actors with an interest in industrial infrastructure. From our experience, we recognise many of these behaviours: prior information gathering, scanning of exposed surfaces and exploitation of weaknesses in architecture or access management.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the report&#8217;s key strengths is that it turns threat intelligence into practical guidance: defining indicators of compromise, segmenting risk scenarios and suggesting good practices for detection and response. This enables organisations and public bodies not only to read threats, but to translate them into concrete protective measures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As part of the entities participating in the Industrial Cybersecurity Laboratory and Demonstration Centre awarded by the Xunta through AMTEGA, Inprotech acknowledges the coordination work carried out by the Xunta, AMTEGA and INCIBE, which has made it possible to consolidate this analysis. It allows us to better align our threat analysis practices, detection rule design and attack simulation configuration on industrial scale models.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The goal is for threat intelligence to move beyond the page and translate into exercises, training and real-world tests that help detect and respond before an actual incident occurs, thereby strengthening the industrial defence posture.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Threat Intelligence Report of the Industrial Cybersecurity Observatory, published by the Xunta de Galicia through AMTEGA as part of the RETECH project, offers a structured overview of the actors, tactics and trends affecting OT and ICS systems in Galicia&#8217;s industrial landscape. Drawing on the information gathered in the document, and from hands-on experience with&#8230;<\/p>\n","protected":false},"author":1,"featured_media":3083,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[17],"tags":[],"class_list":["post-3084","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-techpapers-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OT Threat Intelligence: how to read the Xunta&#039;s report and put it into practice - InprOTech<\/title>\n<meta name=\"description\" content=\"How to apply the Xunta&#039;s OT Threat Intelligence Report in practice: threat actors, attack vectors and concrete industrial protection measures.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OT Threat Intelligence: how to read the Xunta&#039;s report and put it into practice - InprOTech\" \/>\n<meta property=\"og:description\" content=\"How to apply the Xunta&#039;s OT Threat Intelligence Report in practice: threat actors, attack vectors and concrete industrial protection measures.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/\" \/>\n<meta property=\"og:site_name\" content=\"InprOTech\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-08T08:22:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-08T09:21:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/inprotech.es\/wp-content\/uploads\/2026\/05\/Techapaper-Inprosec.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\"},\"headline\":\"OT Threat Intelligence: how to read the Xunta&#8217;s report and put it into practice\",\"datePublished\":\"2026-05-08T08:22:48+00:00\",\"dateModified\":\"2026-05-08T09:21:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\\\/\"},\"wordCount\":286,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Techapaper-Inprosec.jpg\",\"articleSection\":[\"Techpapers\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\\\/\",\"url\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\\\/\",\"name\":\"OT Threat Intelligence: how to read the Xunta's report and put it into practice - InprOTech\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Techapaper-Inprosec.jpg\",\"datePublished\":\"2026-05-08T08:22:48+00:00\",\"dateModified\":\"2026-05-08T09:21:26+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\"},\"description\":\"How to apply the Xunta's OT Threat Intelligence Report in practice: threat actors, attack vectors and concrete industrial protection measures.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\\\/#primaryimage\",\"url\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Techapaper-Inprosec.jpg\",\"contentUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Techapaper-Inprosec.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/inprotech.es\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OT Threat Intelligence: how to read the Xunta&#8217;s report and put it into practice\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#website\",\"url\":\"https:\\\/\\\/inprotech.es\\\/\",\"name\":\"InprOTech\",\"description\":\"The Cybersecurity Solution for the Industrial Environment\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/inprotech.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/inprotech.es\"],\"url\":\"https:\\\/\\\/inprotech.es\\\/en\\\/author\\\/moon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OT Threat Intelligence: how to read the Xunta's report and put it into practice - InprOTech","description":"How to apply the Xunta's OT Threat Intelligence Report in practice: threat actors, attack vectors and concrete industrial protection measures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/","og_locale":"en_US","og_type":"article","og_title":"OT Threat Intelligence: how to read the Xunta's report and put it into practice - InprOTech","og_description":"How to apply the Xunta's OT Threat Intelligence Report in practice: threat actors, attack vectors and concrete industrial protection measures.","og_url":"https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/","og_site_name":"InprOTech","article_published_time":"2026-05-08T08:22:48+00:00","article_modified_time":"2026-05-08T09:21:26+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/inprotech.es\/wp-content\/uploads\/2026\/05\/Techapaper-Inprosec.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/#article","isPartOf":{"@id":"https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/"},"author":{"name":"admin","@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9"},"headline":"OT Threat Intelligence: how to read the Xunta&#8217;s report and put it into practice","datePublished":"2026-05-08T08:22:48+00:00","dateModified":"2026-05-08T09:21:26+00:00","mainEntityOfPage":{"@id":"https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/"},"wordCount":286,"commentCount":0,"image":{"@id":"https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/#primaryimage"},"thumbnailUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2026\/05\/Techapaper-Inprosec.jpg","articleSection":["Techpapers"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/","url":"https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/","name":"OT Threat Intelligence: how to read the Xunta's report and put it into practice - InprOTech","isPartOf":{"@id":"https:\/\/inprotech.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/#primaryimage"},"image":{"@id":"https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/#primaryimage"},"thumbnailUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2026\/05\/Techapaper-Inprosec.jpg","datePublished":"2026-05-08T08:22:48+00:00","dateModified":"2026-05-08T09:21:26+00:00","author":{"@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9"},"description":"How to apply the Xunta's OT Threat Intelligence Report in practice: threat actors, attack vectors and concrete industrial protection measures.","breadcrumb":{"@id":"https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/#primaryimage","url":"https:\/\/inprotech.es\/wp-content\/uploads\/2026\/05\/Techapaper-Inprosec.jpg","contentUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2026\/05\/Techapaper-Inprosec.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/inprotech.es\/en\/ot-threat-intelligence-how-to-read-the-xuntas-report-and-put-it-into-practice\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/inprotech.es\/en\/"},{"@type":"ListItem","position":2,"name":"OT Threat Intelligence: how to read the Xunta&#8217;s report and put it into practice"}]},{"@type":"WebSite","@id":"https:\/\/inprotech.es\/#website","url":"https:\/\/inprotech.es\/","name":"InprOTech","description":"The Cybersecurity Solution for the Industrial Environment","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/inprotech.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/inprotech.es"],"url":"https:\/\/inprotech.es\/en\/author\/moon\/"}]}},"_links":{"self":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/3084","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/comments?post=3084"}],"version-history":[{"count":1,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/3084\/revisions"}],"predecessor-version":[{"id":3085,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/3084\/revisions\/3085"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/media\/3083"}],"wp:attachment":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/media?parent=3084"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/categories?post=3084"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/tags?post=3084"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}