by Eugeniusz Wypior | 16 March 2023 | Blog-EN, Newest post
Eugene Wypior KOSTOVITE, KAMACITE & XENOTIME – 2022 update Alongside the CHERNOVITE and BENTONITE new threat groups which emerged in 2022, there have been several other Active Threat players which have emerged in recent years. In its Year in Review Report...
by Eugeniusz Wypior | 14 March 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 4 – Malware Malware is any software or firmware that performs unauthorised processes with negative impacts on system confidentiality, integrity, or availability. Examples of malicious code...
by Eugeniusz Wypior | 9 March 2023 | Blog-EN, Newest post
Eugene Wypior CHERNOVITE and BENTONITE – New Threats of 2022 Only some two weeks ago, towards the end of February 2023, Dragos released its 6th year running ‘ICS/OT Cybersecurity year in review’. Today we will look at the two new threat groups Dragos discovered...
by Eugeniusz Wypior | 7 March 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 3 – Ransomware In the 2022 report, ENISA’s Threat Landscape for Ransomware Attacks, ransomware is defined as an attack where the threat actors take control of someone’s assets and...
by Eugeniusz Wypior | 2 March 2023 | Blog-EN, Newest post
Eugene Wypior Asset visibility for defendable OT Asset visibility is a critical component of a strong OT cybersecurity strategy. It is the process of identifying and tracking all assets within an OT environment, including industrial control systems (ICS), endpoints,...
by Eugeniusz Wypior | 28 February 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 2 – Prime Threats by Proximity and Sector Prime Threats by Proximity to the EU In the context of the ENISA Threat Landscape, it is crucial to take into account the proximity of cyber threats...