by Eugeniusz Wypior | 4 April 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 7 – DDoS attacks One of the most significant threats to IT systems is Distributed Denial of Service (DDoS), which aims to compromise system availability by depleting resources, resulting in...
by Eugeniusz Wypior | 29 March 2023 | Blog-EN, Newest post
Eugene Wypior The Legacy of ‘Insecure-by-Design’ In June 2022 Vedere Labs published the ‘OT Icefall’ report disclosing 56 CVEs related to insecure-by-design functions affecting devices from 10 major OT manufacturers. The impact these vulnerabilities have...
by Eugeniusz Wypior | 28 March 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 6 – Threats Against Data The importance of data as the driving force behind a data-driven economy has made it a primary target for cybercriminals. These criminals employ a range of threats...
by Eugeniusz Wypior | 23 March 2023 | Blog-EN, Newest post
Eugene Wypior ELECTRUM, ERYTHRITE & WASSONITE – 2022 update Continuing last week’s entry on the update on operations of the most noticeable Active Threat players from Dragos’ Year in Review Report 2022, today’s article is dedicated to ELECTRUM, ERYTHRITE,...
by Eugeniusz Wypior | 21 March 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 5 – Social Engineering Social engineering encompasses a wide range of activities that aim to exploit human errors or behaviour, with the ultimate goal of accessing information or services. It...
by Eugeniusz Wypior | 16 March 2023 | Blog-EN, Newest post
Eugene Wypior KOSTOVITE, KAMACITE & XENOTIME – 2022 update Alongside the CHERNOVITE and BENTONITE new threat groups which emerged in 2022, there have been several other Active Threat players which have emerged in recent years. In its Year in Review Report...