Category: Blog
-
Building Intelligent SOCs for NIS2 Incident Reporting Requirements: A Strategy for Success
Posted on
by
The PHOENI2X initiative is driving innovation in cybersecurity across critical sectors such as healthcare, energy, and transport. A key challenge is aligning with the NIS2 Directive, which introduces stringent requirements to bolster cybersecurity across the European Union. Among its core demands are […]
-
Backdoors and Breaches: How Supply Chain Attacks Threaten Healthcare and How to Fight Back
Posted on
by
The healthcare sector’s dependence on interconnected systems and third-party services has made it an attractive target for sophisticated supply chain attacks. In this blog post, we explore a potential real-world example of a malicious actor compromising a source code repository, injecting a […]
-
Overview of Social Engineering Attacks on PHOENI2X Use Cases and Novel Mitigations
Posted on
by
Kristian Beckers, PhD; CEO; Social Engineering Academy GmbH, Germany Alejando Quintanar; CTO; Social Engineering Academy GmbH, Germany Social engineering is the acquisition of confidential, private or privileged information by methods including both technical and non-technical means e.g. such as shoulder surfing, dumpster […]
-
Achieving Cyber Resilience through standards-based, machine-processable & executable Incident Response & Business Continuity Playbooks
Posted on
by
Fysarakis Konstantinos, PhD; Chief Technology Officer; Sphynx Analytics Ltd, Cyprus Introduction Cybersecurity incidents are growing in frequency, complexity & impact, in tandem with the increasing pervasiveness of digital technologies, applications, and services in our societies and economies. There has been a surge […]
-
EU’s Cyber Resilience Act
Posted on
by
As hardware and software products become increasingly interconnected and more vulnerable to cyber-attacks with an estimated global annual cost of cybercrime of €5.5 trillion by 2021, the EU continuous to improve its cybersecurity posture. The proposal for a regulation on cybersecurity requirements […]
-
Understanding and Mitigating Cybersecurity Risks in IoT Environments
Posted on
by
Authors: Ioannis Kakogiannos, Ignasi Garcia-Milà, WORLDSENSING The Internet of Things (IoT) has revolutionised technology by enabling seamless connectivity and communication among devices. From smart homes and wearable technology to industrial automation and smart cities, IoT applications have become integral to modern life. […]
-
AMINet: An Industrial Honeynet for AMI Systems
Posted on
by
Researchers at the University of Patras (UPAT), as part of the Phoeni2x project, have recently developed and presented an innovative intrusion detection system called AMINet. AMINet is designed to enhance cybersecurity in Advanced Metering Infrastructure (AMI) systems. AMINet’s innovation relates to the […]
-
Empowering Cybersecurity Excellence: OTE’s Journey with PHOENI2X Innovations
Posted on
by
In today’s digital landscape, cybersecurity stands as the cornerstone of our interconnected world. Beyond being merely a technical concern, it emerges as a strategic imperative, especially for Operators of Essential Services (OESs) and critical infrastructures. These sectors, encompassing vital areas such as […]
-
Cyber-attacks received in the railway sector
Posted on
by
Critical infrastructures are increasingly exposed to possible cyber-attacks. Connectivity and the use of technology in all sectors has improved the service provided to citizens, optimising processes and resources, and improving the quality of each operator’s actions. But this connectivity also has its […]
-
Elevating Cybersecurity in the Energy Sector: Insights from the PHOENI2X Project
Posted on
by
The energy sector, serving as the backbone of modern society, finds itself increasingly at the crossroads of technological advancement and threats. As our world becomes more interconnected and reliant on digital technologies, the energy sector’s critical infrastructures, such as power grids, oil […]