by Eugeniusz Wypior | 18 May 2022 | Blog-EN, Newest post
Eugene Wypior Havex’s Tactics and Techniques in the Enterprise domain + mitigations Havex is a Remote Access Trojan (RAT) that has been used in the Global Energy Sector Intrusion Campaign that started around the year 2013 and has been reported on by Seqred in its...
by Eugeniusz Wypior | 16 May 2022 | Blog-EN, Newest post
Eugene Wypior Smart Home Security & Privacy Smart technology is affecting all areas of our lives. The possibility to have the access and control over everything at our fingertips at any time from any place is very tempting and offers many advantages, however it...
by Eugeniusz Wypior | 11 May 2022 | Blog-EN, Newest post
Eugene Wypior Critical ROCKWELL AUTOMATION PLCs vulnerabilities On the last day of March this year, CISA released two industrial Controls System Advisories (CSAs) describing vulnerabilities affecting numerous versions of Rockwell’s Logix Controllers and several...
by Eugeniusz Wypior | 9 May 2022 | Blog-EN, Newest post
Eugene Wypior Compute in the cloud relevant security considerations Cloud computing is fundamentally based on pooling resources and virtualisation is the technology used to convert fixed infrastructure into these pooled resources. At its most basic, virtualisation...
by Eugeniusz Wypior | 5 May 2022 | Newest post
Eugene Wypior TRITON’s Tactics and Techniques in the ICS domain TRITON malware was originally deployed in 2017 to disrupt the operations of a petrochemical plant in Saudi Arabia and it has recently made headlines on the occasion of an indictment by the U.S Department...
by Eugeniusz Wypior | 3 May 2022 | Blog-EN, Newest post
Eugene Wypior Mobile Device Security Last week we covered the topic of email security. And as mentioned at that time the second most common way used to communicate these days, apart from email, are mobile devices, especially smartphones. They are great devices that...