by Eugeniusz Wypior | 24 August 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Resilience Improvement Guide. Part III – Protecting your organisation from Malware Part 3 – Protecting your organisation from Malware Malware is an abbreviation from ‘malicious software’ and is used to describe any...
by Eugeniusz Wypior | 19 August 2021 | Blog-EN, Newest post
Eugene Wypior Proactive Approach to Incident Response. Part 1 – Introduction OT infrastructure attacks Cyber-attacks on Operational Technology infrastructure are becoming more frequent and more sophisticated in recent years. Just to refresh our memory here is a...
by Eugeniusz Wypior | 18 August 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Resilience Improvement Guide. Part II – Backing up … Part 2 – Backing up your data Data is the backbone of any business – customer details, quotes, orders, payment details are only the most obvious kind of data...
by Józef Sulwiński | 12 August 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Resilience Improvement Guide. Part I – Introduction Introduction With the recent increase in ransomware attacks around the world the question shifts from “If we will get hacked” to “When will we get...
by Józef Sulwiński | 29 April 2021 | Blog-EN, Newest post
Krzysztof Swaczyński Let’s face it – Smart Buildings are insecure … … but that can be fixed! A glimpse of an eye at downtown in any of major cities in Poland is enough to say that we can be proud of most recent commercial real estate developments. Office...
by Justyna Thiede | 17 December 2020 | Blog-EN, Newest post
Maciej Miszczyk Multiple vulnerabilities in GameLoop – remote code execution, privilege escalation Gameloop is an Android emulator released by Tencent. During our tests, we have identified multiple vulnerabilities which can lead to code execution and privilege...