Blog

Blog

Havex’s Tactics and Techniques in the Enterprise domain + mitigations

Havex’s Tactics and Techniques in the Enterprise domain + mitigations

Havex is a Remote Access Trojan (RAT) that has been used in the Global Energy Sector Intrusion Campaign that started around the year 2013 and has been reported on by Seqred in its previous blog entries earlier this year – after Alert (AA22-083A), the Cybersecurity...
Smart Home Security & Privacy

Smart Home Security & Privacy

Smart technology is affecting all areas of our lives. The possibility to have the access and control over everything at our fingertips at any time from any place is very tempting and offers many advantages, however it all comes at a security and privacy cost...

read more
Critical ROCKWELL AUTOMATION  PLCs vulnerabilities

Critical ROCKWELL AUTOMATION PLCs vulnerabilities

On the last day of March this year, CISA released two industrial Controls System Advisories (CSAs) describing vulnerabilities affecting numerous versions of Rockwell’s Logix Controllers and several versions of its Studio 5000 Logix Designer application. The...

read more
Compute in the cloud relevant security considerations

Compute in the cloud relevant security considerations

Cloud computing is fundamentally based on pooling resources and virtualisation is the technology used to convert fixed infrastructure into these pooled resources. At its most basic, virtualisation abstracts resources from their underlying physical assets....

read more
TRITON’s Tactics and Techniques in the ICS domain

TRITON’s Tactics and Techniques in the ICS domain

TRITON malware was originally deployed in 2017 to disrupt the operations of a petrochemical plant in Saudi Arabia and it has recently made headlines on the occasion of an indictment by the U.S Department of Justice in a case of a Global Energy Sector...

read more
Mobile Device Security

Mobile Device Security

Last week we covered the topic of email security. And as mentioned at that time the second most common way used to communicate these days, apart from email, are mobile devices, especially smartphones. They are great devices that make our busy lives easier to...

read more
Email Security Enhancement

Email Security Enhancement

The first email was sent over 50 years ago, and it remains the most popular form of communication (along with the mobile phone) these days. According to Statista we have been sending approximately 320 billion emails every single day in 2021. And this figure...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.