Think about the

Cyber

Security

Confidentiality, Integrity, Availability sounds familiar?

When Availability is top priority

Being compliant with NIS2 is huge challenge for the most companies. Align with our assessment to act before will be too late.

IT and OT Cyber Security

Although IT (Information Technology) and OT (Operational Technology) originate from distinct domains, their convergence is becoming increasingly evident. As industrial environments become more connected, the boundaries between these two worlds are blurring — introducing new cybersecurity challenges. Bridging IT and OT security is essential to ensure operational continuity, data integrity, and protection against emerging threats targeting critical infrastructure.

OT Security

Advanced OT Cyber Security Solutions for Industrial Environments

In the realm of Operational Technology, where industrial processes and critical infrastructures intersect, ensuring the security and continuity of operations is paramount. Our specialized OT cybersecurity services are designed to protect your industrial systems, machinery, and processes from cyber threats, allowing you to focus on driving efficiency and innovation.

IT Security

Comprehensive IT Cyber Security Services

In today’s digital age, safeguarding sensitive data and ensuring the uninterrupted operation of your business is paramount. Our IT cybersecurity services are tailored to protect your organization from evolving cyber threats, providing robust defenses and peace of mind.

We are part of the CYB3R ALLIANCE

Our Blog

Check our latest articles about IT, OT and Cyber Security

Follow the latest Cyber Security news

Stay ahead with real-time updates, expert insights, and critical threat intelligence.

  • GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data

    Cybersecurity researchers are calling attention to a new campaign dubbed GemStuffer that has targeted the RubyGems repository with more than 150 gems that use the registry as a data exfiltration channel rather than for malware distribution. "The packages do not appear designed for mass developer compromise," Socket said. "Many have little or no download activity, and the payloads are repetitive,

  • Android Adds Intrusion Logging for Sophisticated Spyware Forensics

    Google on Tuesday unveiled a new opt-in Android feature called Intrusion Logging for storing forensic logs to better analyze sophisticated spyware attacks. Intrusion Logging, available as part of Advanced Protection Mode, enables "persistent and privacy-preserving forensics logging to allow for investigation of devices in the event of a suspected compromise," the company said. The feature, it

  • New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution

    Exim has released security updates to address a severe security issue affecting certain configurations that could enable memory corruption and potential code execution. Exim is an open-source Mail Transfer Agent (MTA) designed for Unix-like systems to receive, route, and deliver email. The vulnerability, tracked as CVE-2026-45185, aka Dead.Letter, has been described as a use-after-free

  • RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded

    RubyGems, the standard package manager for the Ruby programming language, has temporarily paused account sign ups following what has been described as a "major malicious attack." "We're dealing with a major malicious attack on RubyGems right now," Maciej Mensfeld, senior product manager for software supply chain security at Mend.io, said in a post on X. "Signups are paused for the time being.

  • New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots

    Cybersecurity researchers have flagged a new version of the TrickMo Android banking trojan that uses The Open Network (TON) for command-and-control (C2). The new variant, observed by ThreatFabric between January and February 2026, has been observed actively targeting banking and cryptocurrency wallet users in France, Italy, and Austria. "TrickMo relies on a runtime-loaded APK  (dex.module),

  • Webinar: What the Riskiest SOC Alerts Go Unanswered - and How Radiant Security Can Help

    Why do the Riskiest SOC Alerts Go Unanswered? Security operations teams are drowning in alerts. But the real problem isn't always alert volume; it's the blind spots. The most dangerous alerts are the ones no one is investigating. A recent report from The Hacker News examined why certain high-risk alert categories - WAF, DLP, OT/IoT, dark web intelligence, and supply chain signals- consistently

Reduce the Cyber Risk in your Company

Contact US

Techmondo Arleta Płuska
Jarzębinowa 7
83-042 Graniczna WieĹ›
Poland
VAT: PL6423173857