by Eugeniusz Wypior | 23 May 2022 | Blog-EN, Newest post
Eugene Wypior Sensible computing 95% of cyber security breaches are caused by human error, according to the 2020 IBM Cyber Security Intelligence Index Report. Below is a list of good computing practices to help you reduce the risk of falling victim to computing fraud....
by Eugeniusz Wypior | 18 May 2022 | Blog-EN, Newest post
Eugene Wypior Havex’s Tactics and Techniques in the Enterprise domain + mitigations Havex is a Remote Access Trojan (RAT) that has been used in the Global Energy Sector Intrusion Campaign that started around the year 2013 and has been reported on by Seqred in its...
by Eugeniusz Wypior | 16 May 2022 | Blog-EN, Newest post
Eugene Wypior Smart Home Security & Privacy Smart technology is affecting all areas of our lives. The possibility to have the access and control over everything at our fingertips at any time from any place is very tempting and offers many advantages, however it...
by Eugeniusz Wypior | 11 May 2022 | Blog-EN, Newest post
Eugene Wypior Critical ROCKWELL AUTOMATION PLCs vulnerabilities On the last day of March this year, CISA released two industrial Controls System Advisories (CSAs) describing vulnerabilities affecting numerous versions of Rockwell’s Logix Controllers and several...
by Eugeniusz Wypior | 9 May 2022 | Blog-EN, Newest post
Eugene Wypior Compute in the cloud relevant security considerations Cloud computing is fundamentally based on pooling resources and virtualisation is the technology used to convert fixed infrastructure into these pooled resources. At its most basic, virtualisation...