USA-China Tensions Transform Global Market

After the U.S. elections, relations between the...

Polish MP Scammed by Cybercriminals Posing as Police Officers: Fraudsters Steal PLN 150,000

A Polish Member of Parliament was scammed by cybercriminals who posed as police officers, resulting in a loss of PLN 150,000. The situation began when the fraudsters contacted the MP’s...

More Than Threefold Increase in Credential Theft in Europe

The year 2024 has marked a record surge in credential theft. Over the past...

Kraków in the Crosshairs of Hackers – Cyberattacks on MPK and Public Institutions

Critical infrastructure – including energy networks, transportation systems, healthcare networks, and other essential areas...

Implementation of the NIS2 Directive in Poland Threatens National Security and Economy, Experts Warn

The new project implementing the NIS2 directive contains such discretionary solutions that instead of...

35 years of ransomware: history, evolution and future

December 2024 is a unique moment in the history of cybersecurity - marking 35...

Poles fear for their data, but are willing to share it in exchange for benefits

The latest EY Future Consumer Index shows a paradox among Polish consumers regarding the protection of their digital data. A majority of the respondents...

North Korean soldiers’ involvement escalates conflict in Ukraine. European Parliamentarians call for increased defense cooperation in the EU

In mid-November, the American State Department and South Korean intelligence confirmed that North Korean troops are directly involved in Russia's war against Ukraine. The...

Frontex wants to create a digital twin of the EU’s external borders. This will allow for preparation against various scenarios and threats

In the first ten months of 2024, the number of illegal crossings at the external borders of the EU fell by 43% year-on-year to...

The Rapid Collapse of Syria’s Political Regime: An Unforeseen Turn of Events

On November 27, the forces of Hayat Tahrir al-Sham (HTS), an Islamist coalition representing segments of the Syrian opposition, launched an offensive from Idlib...

Proposed Cybersecurity Bill Sparks Corruption Concerns, Warn Experts

The proposed bill on the national cybersecurity system is a breeding ground for corruption, according to experts from the Adam Smith Center. "Why is the...

Mandate with QR code behind the wiper? This is a new method of fraudsters!

Cybercriminals are also actively operating in the real world. Impersonating services is nothing new, but suspicious-looking fines with QR codes are starting to appear...

Overregulation or Necessary Cybersecurity? Experts Warn of Risks in Poland’s National Cybersecurity Act

This project is an overregulation. Even better, it could be defined as over-implementation, a phenomenon commonly known as gold plating since it's a...

Global Anxiety Over Disinformation and Cyber Threats: How Poles Rank Above Average in Fear Levels

"World Affairs" is an annual report created by Ipsos in which respondents answer key questions related to social threats. This year's study involved 23,000...

Polish banks targeted by cybercriminals

Polish financial institutions are among the most vulnerable in the Central European region to hacker attacks. On average, there are 1,728 attacks per...

Bill on National Cybersecurity System Raises Concerns Among Entrepreneurs

The bill on the national cybersecurity system is completely detached from the realities of cyber threats, and at the same time very dangerous...

Over a Million Players at Risk. Popular Game Engine Godot Used by Cybercriminals

Even 1.2 million gamers could be at risk due to cybercriminals exploiting scripts of open-source gaming engines - warn cybersecurity analysts from Check Point...

German Citizen Detained by ABW for Illegal Export of Dual-Use Goods to Russia

On November 20, 2024, officers of the Internal Security Agency (ABW) detained a German citizen in the Lubuskie province. The man was accused of...

Administration, finance sector and IT need to strengthen open source security

According to the Open Source Maturity in Europe report from 2024, the IT industry (37% of responses), government administration (36%), and education (30%) can...

The Most Important Challenges for Cybersecurity in 2025

The dynamic development of technology is a double-edged sword. Besides the advancements in innovation, new forms and an increasing number of threats go hand...

- A word from our sponsors -

Follow us

HomeSECURITY