Zero-Day Vulnerability
As technology evolves, so do threats, especially malware. A special case of interest is zero-day malware that exploits unknown and unprotected vulnerabilities.
As technology evolves, so do threats, especially malware. A special case of interest is zero-day malware that exploits unknown and unprotected vulnerabilities.
The Diversification and Enhancement of an IDS Scheme for the Cybersecurity Needs of Modern Supply Chains PartnerTSIAuthorsDimitris Deyannis, Eva Papadogiannaki, Grigorios Chrysos, Konstantinos Georgopoulos, Sotiris IoannidisTitleThe Diversification and Enhancement of…
Web crawlers are special applications used to create a copy of all the visited web pages for later processing. Web crawling over dark web sites requires a set of initialisation steps...
On the 3rd of June 2022, CYRENE was invited by the DataPorts project to the workshop they organised in the context of the DataWeek 2022 event.
CYRENE was presented at the International Conference on the EU Cybersecurity Act that was held on May 24-25, 2022
Pro. Nineta Polemi, external advisor of CYRENE’s partner FP participated in the 2nd ECSCI Workshop on Critical Infrastructure Protection
Maggioli Spa in collaboration with Focal Point sprl and Hyperborea Srl is currently investigating, in the context of the CYRENE, potential cyber attack paths on interconnected Critical Infrastructures (CIs) which operate for the provision of supply chain services.
Centro Ricerche FIAT is participating to the Cyrene project that aims in developing methodologies, techniques and tools for the efficient evaluation and handling of security threats and vulnerabilities supporting the involved infrastructures for the provision of critical Supply Chain Services
Cybersecurity insurance is a new and emerging industry, and companies that purchase these products are considered as early adopters in a very dynamic and fluctuating environments where cybersecurity policies suddenly change depending on the severity of the associated cyber risks.
This blogpost will focus on the privacy and data protection layer of CYRENE’s solution that will enable Critical Information Infrastructures (CIIs) to set up security and data protection configurations based on existing legal and regulatory frameworks.