by Eugeniusz Wypior | 29 August 2022 | Blog-EN, Newest post
Eugene Wypior Chinese Campaign exploits Network Providers and Devices Worldwide Nearly two months ago, on the 7th of June, CISA published Alert (AA22-158A). This alert describes the ways in which Chinese state-sponsored cyber actors exploit known vulnerabilities to...
by Eugeniusz Wypior | 25 August 2022 | Blog-EN, Newest post
Krzysztof Swaczyński Eugene Wypior Cybersecurity of Smart Buildings When the topic of cybersecurity in Smart Buildings comes up, the question arises about the challenges related to the trend and technology, and who should be concerned about the topic. Building owners,...
by Eugeniusz Wypior | 22 August 2022 | Blog-EN, Newest post
Eugene Wypior Phishing Attacks & Mitigation – part 2 According to the CISCO’s 2021 Cybersecurity threat trends report, phishing accounts for around 90% of data breaches with at least one person having clicked a phishing link in around 86% of organisations....
by Eugeniusz Wypior | 16 August 2022 | Blog-EN, Newest post
Eugene Wypior Phishing Attacks & Mitigation – part 1 As more and more of our everyday professional (and personal) lives take place online, so do increase the nefarious activities of those actors who want to abuse this fact and profit by extracting...
by Eugeniusz Wypior | 11 August 2022 | Blog-EN, Newest post
Krzysztof Swaczyński Eugene Wypior Smart Meters in the context of Smart Grid and AMI architecture. Security, Vulnerability and Best Practice – Part 4 The power grid, one of the most crucial pieces of critical infrastructure, is on top of the list of interest to...
by Eugeniusz Wypior | 4 August 2022 | Blog-EN, Newest post
Krzysztof Swaczyński Eugene Wypior Smart Meters in the context of Smart Grid and AMI architecture. Security, Vulnerability and Best Practice – Part 3 The power grid, which is one of the most crucial pieces of critical infrastructure, is on top of the list of...