by Eugeniusz Wypior | 23 February 2023 | Blog-EN, Newest post
Eugene Wypior How to effectively utilise MITRE ATT&CK for ICS MITRE ATT&CK is a knowledge base of cyber attacker TTPs that catalogs behaviours, providing a visual representation of attack patterns that can help detect and respond effectively to attacks....
by Eugeniusz Wypior | 21 February 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 1 – Introduction For the past ten years, ENISA – The European Union Agency for Cybersecurity – has been comprising an annual report on the status of the cybersecurity threat landscape. The...
by Eugeniusz Wypior | 16 February 2023 | Blog-EN, Newest post
Eugene Wypior MITRE ATT&CK for ICS – a tool for challenging times As critical infrastructure around the world faces a growing number of potential industrial threats that could potentially disrupt an organization’s operational technology (OT)...
by Eugeniusz Wypior | 14 February 2023 | Newest post
Eugene Wypior Cloud Computing – 2022 Top Threats – part 6 Cloud Storage Data Exfiltration The exfiltration of data from cloud storage refers to the unauthorized access, viewing, theft, or usage of sensitive, confidential, or protected information by...
by Eugeniusz Wypior | 9 February 2023 | Newest post
Eugene Wypior Ransomware in OT – Response Strategy Last week we described how to best prepare for a potential ransomware attack in the OT environment from the perspective of the three main areas – people, processes, and technology. Today, we look at best...
by Eugeniusz Wypior | 6 February 2023 | Newest post
Eugene Wypior Cloud Computing – 2022 Top Threats – part 5 Misconfiguration and Exploitation of Serverless and Container Workloads The shift to cloud infrastructure and the implementation of DevOps practices have enabled IT teams to speed up the delivery of...