Category: Blog
-
The Hidden Cyber Threats in Smart Meters: Inside DLMS/COSEM Attacks
Posted on
by
The worldwide shift toward intelligent energy systems has reshaped the fundamental structure of power grid infrastructure. The modern power grid operates through smart meters along with digital control systems and real-time data exchanges instead of traditional one-way electricity transmission methods. The modernization
-
Towards Incident Response Orchestration and Automation for the Advanced Metering Infrastructure
Posted on
by
Author: UiO The Advanced Metering Infrastructure (AMI) represents a vital component of modern energy systems, facilitating the real-time collection and exchange of electricity consumption data through smart meters. These smart meters play a crucial role in maintaining grid stability, forecasting energy demand,
-
Assessing PHOENI2X’s Impactful Contribution to Cybersecurity Through Targeted Surveys
Posted on
by
In the ever-evolving landscape of cybersecurity, the PHOENI2X project stands as a beacon of innovation and resilience. Funded under the European Union’s Horizon Europe programme, PHOENI2X aims to bolster the cyber resilience of Operators of Essential Services (OES) across sectors such as
-
Mapping the Incident Responder: A Technical Perspective on Global Framework Diversity and the PHOENI2X Initiative
Posted on
by
In the realm of cybersecurity, Incident Responders serve as critical operators, safeguarding organizations against digital threats. While their core responsibilities—such as threat detection, incident triage, containment, remediation, and post-incident analysis—are universally acknowledged, the specific definitions and expectations of this role vary significantly
-
Building a Cyber Resilience Culture within Organizations
Posted on
by
Cyber threats continue to evolve, making it critical for organizations to cultivate a strong cyber resilience culture. The PHOENI2X project emphasizes the need for a proactive approach to cybersecurity, focusing not only on advanced technologies but also on fostering a resilient mindset
-
Leveraging CACAO Playbooks for Next-Generation Cyber Threat Intelligence and Response
Posted on
by
Introduction In the evolving landscape of cybersecurity, threats are becoming more sophisticated, and their impact is ever more disruptive. As organizations strive to remain resilient, the ability to systematically coordinate and automate responses to these threats is becoming a crucial part of
-
Anomaly detection in railway infrastructures
Posted on
by
Raúl Rabadán, Ester Simó, Eva Rodríguez Universitat Politècnica de Catalunya (UPC) Sensor based IoT devices are being increasingly integrated into critical infrastructures to enable continuous monitoring, enhancing operational performance and safety. Decisions related to operations, maintenance, and safety are made based on
-
The Role of Digital Forensics in Cyber Resilience: Insights from PHOENI2X
Posted on
by
Introduction Cybersecurity threats are becoming increasingly sophisticated, making it crucial for organizations to have robust mechanisms in place to detect, analyze, and mitigate incidents effectively. As part of the PHOENI2X project, digital forensics plays a pivotal role in helping organizations investigate cyber
-
Building Intelligent SOCs for NIS2 Incident Reporting Requirements: A Strategy for Success
Posted on
by
The PHOENI2X initiative is driving innovation in cybersecurity across critical sectors such as healthcare, energy, and transport. A key challenge is aligning with the NIS2 Directive, which introduces stringent requirements to bolster cybersecurity across the European Union. Among its core demands are
-
Backdoors and Breaches: How Supply Chain Attacks Threaten Healthcare and How to Fight Back
Posted on
by
The healthcare sector’s dependence on interconnected systems and third-party services has made it an attractive target for sophisticated supply chain attacks. In this blog post, we explore a potential real-world example of a malicious actor compromising a source code repository, injecting a










