Friday, December 20, 2024

USA-China Tensions Transform Global Market

After the U.S. elections, relations between the...

Polish MP Scammed by Cybercriminals Posing as Police Officers: Fraudsters Steal PLN 150,000

A Polish Member of Parliament was scammed by cybercriminals who posed as police officers, resulting in a loss of PLN 150,000. The situation began when the fraudsters contacted the MP’s...

More Than Threefold Increase in Credential Theft in Europe

The year 2024 has marked a record surge in credential theft. Over the past...

Kraków in the Crosshairs of Hackers – Cyberattacks on MPK and Public Institutions

Critical infrastructure – including energy networks, transportation systems, healthcare networks, and other essential areas...

Implementation of the NIS2 Directive in Poland Threatens National Security and Economy, Experts Warn

The new project implementing the NIS2 directive contains such discretionary solutions that instead of...

35 years of ransomware: history, evolution and future

December 2024 is a unique moment in the history of cybersecurity - marking 35...

Specialists appeal for increased control over artificial intelligence

The number of solutions that automatically monitor the use and development of artificial intelligence (AI) is increasing rapidly. This is in response to issues...

Frontex Strengthens EU Border Security with Satellite Data and Integrated Technologies

Monitoring of external EU borders is of key importance for internal security. Frontex - the European Border and Coast Guard Agency - utilizes, among...

Hackers pretend to be recruiters and send malicious software

Cybercriminals linked to North Korea are posing as IT recruiters to install malicious software on the devices of job seekers. As reported by Palo...

How AI will change the face of cybersecurity

Capgemini's latest report "New Security Systems, New Threats: What AI and Gen AI Bring to Cybersecurity" reveals that as many as 92% of organizations...

How is the TSL industry becoming a target for financial fraud?

The transportation industry, like other sectors of the economy, is increasingly becoming a target for cyber criminals, who are using fake emails to extort...

Artificial Intelligence: A Double-Edged Sword in the Battle Against Investment Scams

Artificial intelligence is increasingly used by fraudsters who post manipulated ads with the participation of famous people on social media. The victims are usually...

Chinese cybercriminal activity is increasing. Governments, the transport industry, and – for the first time – EU diplomacy are being targeted

Cybercriminals linked to China are operating with increasing intensity, with their main targets being governments and the transportation industry, according to a report published...

Even 1700 attacks per week. Here is the ranking of main threats in the Polish network

The number of attacks using infostealers, tools designed to steal data from computers, is increasing. Among them we find Russian software that is...

A new wave of cyber attacks targeted at Ukraine and Poland

The Cisco Talos team, specializing in cyber threat analysis, has reported a new wave of attacks conducted by the Russian-speaking group UAT-5647, also known...

Silent Data Theft: Understanding and Preventing Man-in-the-Middle Attacks

A man-in-the-middle is a type of cyberattack in which a third party intercepts communication between parties without their knowledge, with the aim to steal...

The European Union is working on protection against disinformation

Fake news, disinformation – the spread of false information on the internet – is a widespread and dangerous phenomenon today. It is possible to...

Chinese cybercriminal groups escalate attacks on edge devices

Sophos reveals details of a five-year defensive operation against state-sponsored Chinese groups that attack edge devices, including Sophos firewalls. These groups have exploited security...

Data centers should be treated like critical infrastructure

The cost of a single failure in a data center is counted in amounts ranging from $100,000 to a million dollars. These facilities process...

Amazon Employees’ Data Leak

Nearly 3 million employee data records - including their email addresses and phone numbers - have leaked as a result of an incident related...

- A word from our sponsors -

Follow us

HomeSECURITY