by Eugeniusz Wypior | 12 June 2023 | Blog-EN, Newest post
Eugene Wypior How to #StopRansomware – Prevention & Mitigation best practice – part 1 Just three weeks ago, we released an article highlighting the current trends in the ransomware industry, revealing a steady increase in the number of ransomware...
by Eugeniusz Wypior | 8 June 2023 | Blog-EN, Newest post
Eugene Wypior Threat Sources, Vulnerabilities, and Incidents – part 2 System Vulnerabilities and Predisposing Conditions Security controls must provide clear identification of the systems they apply to. These systems can vary greatly in size, scope, and...
by Eugeniusz Wypior | 5 June 2023 | Blog-EN, Newest post
Eugene Wypior VOLT TYPHOON – ‘Living of the Land’ – Tactics, Technics and Procedures On the 23rd of May CISA, with a number of other Cyber Security agencies, issued a joint Cybersecurity advisory to highlight a recently discovered cluster of activity of...
by Eugeniusz Wypior | 31 May 2023 | Blog-EN, Newest post
Eugene Wypior Threat Sources, Vulnerabilities, and Incidents – part 1 Several terms are used to describe the inter-related concepts of threat, threat source, threat event, and incident. A threat is any circumstance or event with the potential to adversely impact...
by Eugeniusz Wypior | 29 May 2023 | Blog-EN, Newest post
Eugene Wypior The Impact of the Russia-Ukraine Conflict on the Cybercrime Ecosystem The Russia-Ukraine conflict, which began in 2014, has had a profound impact on various aspects of society. One such area significantly affected is the global cybercrime ecosystem. The...