Frontex Strengthens EU Border Security with Satellite Data and Integrated Technologies

Monitoring of external EU borders is of key importance for internal security. Frontex - the European Border and Coast Guard Agency - utilizes, among others, satellite data from the...

Hackers pretend to be recruiters and send malicious software

Cybercriminals linked to North Korea are posing as IT recruiters to install malicious software...

How AI will change the face of cybersecurity

Capgemini's latest report "New Security Systems, New Threats: What AI and Gen AI Bring...

How is the TSL industry becoming a target for financial fraud?

The transportation industry, like other sectors of the economy, is increasingly becoming a target...

Artificial Intelligence: A Double-Edged Sword in the Battle Against Investment Scams

Artificial intelligence is increasingly used by fraudsters who post manipulated ads with the participation...

Chinese cybercriminal activity is increasing. Governments, the transport industry, and – for the first time – EU diplomacy are being targeted

Cybercriminals linked to China are operating with increasing intensity, with their main targets being governments and the transportation industry, according to a report published...

Even 1700 attacks per week. Here is the ranking of main threats in the Polish network

The number of attacks using infostealers, tools designed to steal data from computers, is increasing. Among them we find Russian software that is...

A new wave of cyber attacks targeted at Ukraine and Poland

The Cisco Talos team, specializing in cyber threat analysis, has reported a new wave of attacks conducted by the Russian-speaking group UAT-5647, also known...

Silent Data Theft: Understanding and Preventing Man-in-the-Middle Attacks

A man-in-the-middle is a type of cyberattack in which a third party intercepts communication between parties without their knowledge, with the aim to steal...

The European Union is working on protection against disinformation

Fake news, disinformation – the spread of false information on the internet – is a widespread and dangerous phenomenon today. It is possible to...

Chinese cybercriminal groups escalate attacks on edge devices

Sophos reveals details of a five-year defensive operation against state-sponsored Chinese groups that attack edge devices, including Sophos firewalls. These groups have exploited security...

Data centers should be treated like critical infrastructure

The cost of a single failure in a data center is counted in amounts ranging from $100,000 to a million dollars. These facilities process...

Amazon Employees’ Data Leak

Nearly 3 million employee data records - including their email addresses and phone numbers - have leaked as a result of an incident related...

UODO imposes high penalty for violation of personal data protection rules after ransomware attack

The Office for Personal Data Protection (UODO) has fined a company, that sells including anti-burglary doors, a penalty exceeding 350,000 PLN. The fine was...

Poland Among Top Cyberattack Targets in Central Europe

In a weekly snapshot, the number of attacks on government and military institutions in Poland is about 2,100 - a level comparable with neighboring...

Cisco Talos Q3 2024: Identity Attacks Dominate Network Security Breaches

The latest report, Cisco Talos Incident Response Trends Q3 2024, examining network security breaches in the third quarter of 2024, indicates that identity-related attacks...

NIS2 Directive: A Cybersecurity Revolution for Polish Companies and Institutions

The implementation of the EU NIS2 directive on cybersecurity, the rollout of which in Poland will soon cover tens of thousands of entities across...

Industry and Education in the Crosshairs of Ransomware Groups

In 2024, ransomware attacks, despite the organized efforts of law enforcement, are experiencing another renaissance. The most frequently attacked countries are currently the United...

Court ordered the prosecutor’s office to investigate the data leak of Pandabuy.com store customers

The District Court for Warsaw Downtown has ordered the Warsaw Downtown-North District Prosecutor's Office to investigate the case of a personal data leak of...

- A word from our sponsors -

Follow us

HomeSECURITY