by Eugeniusz Wypior | 19 April 2022 | Blog-EN, Newest post
Eugene Wypior ‘Denonia’ – the first cryptominer built for AWS Lambda On the 6th April, CADO Security reported on its finding of the first known case of a cryptominer malware designed specifically to run in the AWS Lambda environment. The malware is...
by Eugeniusz Wypior | 14 April 2022 | Blog-EN, Newest post
Eugene Wypior New malicious tools targeting ICS / SCADA systems and mitigations ICS / SCADA systems under a new threat Yesterday, on the 13th April, CISA, DOE and FBI released a joint Cybersecurity Advisory – Alert (AA22-103A) – warning that certain APT...
by Eugeniusz Wypior | 12 April 2022 | Blog-EN, Newest post
Eugene Wypior Shared Responsibility for Security in the Public Cloud In general, cloud infrastructure can be broadly divided into two main layers. Firstly, there all are the hardware resources – the storage systems, servers, switches, routers, firewalls, etc – which...
by Eugeniusz Wypior | 7 April 2022 | Blog-EN, Newest post
Eugene Wypior Industrial Control Systems Best Practices Along with the US Department of Justice naming four Russian spies in late March this year and accusing them of hacking activities spanning nearly a decade impacting critical infrastructure across the globe, CISA...
by Eugeniusz Wypior | 5 April 2022 | Blog-EN, Newest post
Eugene Wypior Best Authentication Practices Authentication – one of the basic actions we perform day in, day out, often probably not giving much thought to it as it is so ‘basic’. And yet, as it often is in life, simple things can be amongst some of the most...