Court ordered the prosecutor’s office to investigate the data leak of Pandabuy.com store customers

The District Court for Warsaw Downtown has ordered the Warsaw Downtown-North District Prosecutor's Office to investigate the case of a personal data leak of Polish customers from the sales...

Artificial intelligence increasingly aids business operations. However, it’s not always safe

The adaptation of solutions based on artificial intelligence in companies is increasing, but businesses...

Kremlin’s Hybrid War – Russian intelligence destabilizes Europe through sabotage, surveillance and spreading fear

The Russian military intelligence service operates in a mode of conducting military operations. This...

New data storage rules by the Police – how can the CJEU ruling affect Polish law?

Under Article 20 of the Police Act, this formation can collect data about citizens...

Cyber criminals attempt to influence US election results

As the upcoming elections in the US approach, there is an increasing observation of...

War changes the cybersecurity situation in Europe

Cybercriminals are not idle, and the number of attacks in Europe is increasing rapidly, warns the European Union Agency for Cybersecurity (ENISA) in its...

Home IoT Devices in the Crosshairs of Hackers

Check Point Software indicates a sharp rise in the number of cyberattacks aimed at IoT devices, observed in all regions and sectors. Europe...

Data Leaks and Losses are Costing Companies More and More. Implemented Protections are Insufficient

The consequences of data breaches and losses are becoming increasingly severe for companies: last year, they cost an average of $2.61 million, accounted for...

DORA Regulation and the DORIAN System: How Financial Institutions Can Prepare for New Operational Resilience Standards in 2025

From 17th January 2025, the DORA (Digital Operational Resilience Act) regulation will be applied in all European Union countries. Its purpose is to increase...

8 out of 10 phishing attacks impersonate Microsoft, Apple, or Google

Microsoft, Apple, and Google's images were used in 8 out of 10 phishing attacks The technology industry remains the most frequently impersonated sector...

Increasing incidents at Polish airports

In aviation, there are often severe or dangerous situations. There is a whole range of so-called safety barriers – which should lead to a...

Financial fraud at a record level. Can AI stop the criminals?

The National Bank of Poland reported over 326,000 instances of fraud involving payment cards and bank transfer orders in 2023. The total value of...

Manipulation and Social Engineering Dominate Data Fraud in 2024: Key Insights from BIK’s Anti-Fraud Report

Manipulation and social engineering techniques with the use of artificial intelligence are the most popular methods of data fraud in 2024. Individuals who become...

Ransomware Threats Rise: 3.8% of Corporate Networks Targeted Globally, Polish Public Utilities Most Vulnerable

The importance of ransomware groups is increasing. Already 3.8% of corporate networks have experienced attempts of ransomware attack – warn Check Point Research experts....

The problem of illegal migration requires strengthening of the EU Border and Coast Guard Agency. MEPs appeal for more powers for Frontex

An increasing number of countries view the influx of migrants as a threat to Europe's security and identity. Berlin has implemented new border controls,...

Pokémon Hacked – Leak of Data Collected over Decades by the Game’s Producer

Game Freak, a Japanese video game developer known for the iconic Pokémon series, has suffered a significant data breach. The event, referred to as...

Poland’s Airspace Increasingly Violated: Balancing Security and Caution in Peacetime Response

The Polish airspace has been increasingly violated recently. Unfortunately, before an object is identified as alien, a significant amount of time passes. During this...

Japanese Hidankyo’s Nobel Peace Prize Laureate for Actions Toward Nuclear Disarmament

This year's Nobel Peace Prize for "efforts to achieve a world free of nuclear weapons and for demonstrating through witness testimonies that nuclear weapons...

GDPR and Cybersecurity: The Key Role of Industry Codes of Conduct According to KPMG

Since the introduction of the GDPR (General Data Protection Regulation) in 2018, compliance with personal data protection regulations has become a priority for companies...

- A word from our sponsors -

Follow us

HomeSECURITY