Category: Blog
-
Overview of Social Engineering Attacks on PHOENI2X Use Cases and Novel Mitigations
Posted on
by
Kristian Beckers, PhD; CEO; Social Engineering Academy GmbH, Germany Alejando Quintanar; CTO; Social Engineering Academy GmbH, Germany Social engineering is the acquisition of confidential, private or privileged information by methods including both technical and non-technical means e.g. such as shoulder surfing, dumpster
-
Achieving Cyber Resilience through standards-based, machine-processable & executable Incident Response & Business Continuity Playbooks
Posted on
by
Fysarakis Konstantinos, PhD; Chief Technology Officer; Sphynx Analytics Ltd, Cyprus Introduction Cybersecurity incidents are growing in frequency, complexity & impact, in tandem with the increasing pervasiveness of digital technologies, applications, and services in our societies and economies. There has been a surge
-
EU’s Cyber Resilience Act
Posted on
by
As hardware and software products become increasingly interconnected and more vulnerable to cyber-attacks with an estimated global annual cost of cybercrime of €5.5 trillion by 2021, the EU continuous to improve its cybersecurity posture. The proposal for a regulation on cybersecurity requirements
-
Understanding and Mitigating Cybersecurity Risks in IoT Environments
Posted on
by
Authors: Ioannis Kakogiannos, Ignasi Garcia-Milà, WORLDSENSING The Internet of Things (IoT) has revolutionised technology by enabling seamless connectivity and communication among devices. From smart homes and wearable technology to industrial automation and smart cities, IoT applications have become integral to modern life.
-
AMINet: An Industrial Honeynet for AMI Systems
Posted on
by
Researchers at the University of Patras (UPAT), as part of the Phoeni2x project, have recently developed and presented an innovative intrusion detection system called AMINet. AMINet is designed to enhance cybersecurity in Advanced Metering Infrastructure (AMI) systems. AMINet’s innovation relates to the
-
Empowering Cybersecurity Excellence: OTE’s Journey with PHOENI2X Innovations
Posted on
by
In today’s digital landscape, cybersecurity stands as the cornerstone of our interconnected world. Beyond being merely a technical concern, it emerges as a strategic imperative, especially for Operators of Essential Services (OESs) and critical infrastructures. These sectors, encompassing vital areas such as
-
Cyber-attacks received in the railway sector
Posted on
by
Critical infrastructures are increasingly exposed to possible cyber-attacks. Connectivity and the use of technology in all sectors has improved the service provided to citizens, optimising processes and resources, and improving the quality of each operator’s actions. But this connectivity also has its
-
Elevating Cybersecurity in the Energy Sector: Insights from the PHOENI2X Project
Posted on
by
The energy sector, serving as the backbone of modern society, finds itself increasingly at the crossroads of technological advancement and threats. As our world becomes more interconnected and reliant on digital technologies, the energy sector’s critical infrastructures, such as power grids, oil
-
A comparison between incident report contents
Posted on
by
Introduction Directive (EU) 2016/1148 (NIS), requires that member states shall ensure that operators of essential services and digital service providers notify, without undue delay, the competent authority or the CSIRT of incidents having a significant impact on the continuity of the essential
-
Code Red: A large scale study on ChatGPT generated code vulnerabilities
Posted on
by
Recent observations have shown that Large Language Models (LLMs), when employed for code generation, can inadvertently produce vulnerable code. This issue has been highlighted in various small-scale studies, including blog posts and research articles, demonstrating its potential risks. However, the broader implications










