SEQRED
  • About
    • Seqred
    • Press Releases
  • Services
    • Cloud Cybersecurity
      • Cloud Services Security
    • Product Assessment
      • Mobile device security
      • Security code review
      • Secure Product Development
    • Offensive Cybersecurity
      • Penetration tests
      • Red Team
    • Infrastructure Cybersecurity
      • Cybersecurity for Faciliity Related Control Systems
      • CMMC assessment
      • Smart Building Cybersecurity
      • AMI system security
      • Network segmentation
    • NIS2 Directive
      • NIS Directive Audit
      • Security Audit ICS
      • Cybersecurity Bill of Materials
      • Critical Infrastructure protection
    • Threat Management
      • Open Source Intelligence / OSINT
      • Threat Intelligence
  • Products
    • SMX Secure Media Exchange
    • Secure Remote Access
  • Events
  • Blog
  • Contact
  • 
  • 
  • 
  • 
  • PLPL
Select Page
‘Insecure-by-Design’ – Impact and Mitigation

‘Insecure-by-Design’ – Impact and Mitigation

by Eugeniusz Wypior | 6 April 2023 | Blog-EN, Newest post

Eugene Wypior ‘Insecure-by-Design’ – Impact and Mitigation In its 2022 OT:ICEFALL report Vedere Labs has detected a group of 56 security flaws that impact devices manufactured by some of the most recognisable operational technology (OT) vendors....
ENISA’s Threat Landscape Report 2022 – Part 7 – DDoS attacks

ENISA’s Threat Landscape Report 2022 – Part 7 – DDoS attacks

by Eugeniusz Wypior | 4 April 2023 | Blog-EN, Newest post

Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 7 – DDoS attacks One of the most significant threats to IT systems is Distributed Denial of Service (DDoS), which aims to compromise system availability by depleting resources, resulting in...
The Legacy of ‘Insecure-by-Design’

The Legacy of ‘Insecure-by-Design’

by Eugeniusz Wypior | 29 March 2023 | Blog-EN, Newest post

Eugene Wypior The Legacy of ‘Insecure-by-Design’ In June 2022 Vedere Labs published the ‘OT Icefall’ report disclosing 56 CVEs related to insecure-by-design functions affecting devices from 10 major OT manufacturers. The impact these vulnerabilities have...
ENISA’s Threat Landscape Report 2022 – Part 6 – Threats Against Data

ENISA’s Threat Landscape Report 2022 – Part 6 – Threats Against Data

by Eugeniusz Wypior | 28 March 2023 | Blog-EN, Newest post

Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 6 – Threats Against Data The importance of data as the driving force behind a data-driven economy has made it a primary target for cybercriminals. These criminals employ a range of threats...
ELECTRUM, ERYTHRITE & WASSONITE  – 2022 update

ELECTRUM, ERYTHRITE & WASSONITE – 2022 update

by Eugeniusz Wypior | 23 March 2023 | Blog-EN, Newest post

Eugene Wypior ELECTRUM, ERYTHRITE & WASSONITE – 2022 update Continuing last week’s entry on the update on operations of the most noticeable Active Threat players from Dragos’ Year in Review Report 2022, today’s article is dedicated to ELECTRUM, ERYTHRITE,...
ENISA’s Threat Landscape Report 2022 – Part 5 – Social Engineering

ENISA’s Threat Landscape Report 2022 – Part 5 – Social Engineering

by Eugeniusz Wypior | 21 March 2023 | Blog-EN, Newest post

Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 5 – Social Engineering Social engineering encompasses a wide range of activities that aim to exploit human errors or behaviour, with the ultimate goal of accessing information or services. It...
« Older Entries
Next Entries »

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.

News

Search on blog

Categories

Tags

ABC security CMMC conference critical infrastructure cve cybersecurity Cybersecurity Maturity Model Certification energy fuzzing ICS information security IT security leadership management memory tagging messaging security news OT OT security PLC PLC security processors proptech ransomware research Response & recovery secure password Shodan smart building UPnP vulnerability

SEQRED Sp. z o.o.
SEQRED International Sp. z o.o.
Rzymowskiego 34, 02-697 Warszawa
tel. +48 22 292 32 23
fax +48 22 292 32 21
[email protected]

Privacy Policy All rights reserved © SEQRED 2021