by Eugeniusz Wypior | 14 March 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 4 – Malware Malware is any software or firmware that performs unauthorised processes with negative impacts on system confidentiality, integrity, or availability. Examples of malicious code...
by Eugeniusz Wypior | 9 March 2023 | Blog-EN, Newest post
Eugene Wypior CHERNOVITE and BENTONITE – New Threats of 2022 Only some two weeks ago, towards the end of February 2023, Dragos released its 6th year running ‘ICS/OT Cybersecurity year in review’. Today we will look at the two new threat groups Dragos discovered...
by Eugeniusz Wypior | 7 March 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 3 – Ransomware In the 2022 report, ENISA’s Threat Landscape for Ransomware Attacks, ransomware is defined as an attack where the threat actors take control of someone’s assets and...
by Eugeniusz Wypior | 2 March 2023 | Blog-EN, Newest post
Eugene Wypior Asset visibility for defendable OT Asset visibility is a critical component of a strong OT cybersecurity strategy. It is the process of identifying and tracking all assets within an OT environment, including industrial control systems (ICS), endpoints,...
by Eugeniusz Wypior | 28 February 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 2 – Prime Threats by Proximity and Sector Prime Threats by Proximity to the EU In the context of the ENISA Threat Landscape, it is crucial to take into account the proximity of cyber threats...
by Eugeniusz Wypior | 23 February 2023 | Blog-EN, Newest post
Eugene Wypior How to effectively utilise MITRE ATT&CK for ICS MITRE ATT&CK is a knowledge base of cyber attacker TTPs that catalogs behaviours, providing a visual representation of attack patterns that can help detect and respond effectively to attacks....