Thursday, November 21, 2024

Frontex Strengthens EU Border Security with Satellite Data and Integrated Technologies

Monitoring of external EU borders is of key importance for internal security. Frontex - the European Border and Coast Guard Agency - utilizes, among others, satellite data from the...

Hackers pretend to be recruiters and send malicious software

Cybercriminals linked to North Korea are posing as IT recruiters to install malicious software...

How AI will change the face of cybersecurity

Capgemini's latest report "New Security Systems, New Threats: What AI and Gen AI Bring...

How is the TSL industry becoming a target for financial fraud?

The transportation industry, like other sectors of the economy, is increasingly becoming a target...

Artificial Intelligence: A Double-Edged Sword in the Battle Against Investment Scams

Artificial intelligence is increasingly used by fraudsters who post manipulated ads with the participation...

Pokémon Hacked – Leak of Data Collected over Decades by the Game’s Producer

Game Freak, a Japanese video game developer known for the iconic Pokémon series, has suffered a significant data breach. The event, referred to as...

Poland’s Airspace Increasingly Violated: Balancing Security and Caution in Peacetime Response

The Polish airspace has been increasingly violated recently. Unfortunately, before an object is identified as alien, a significant amount of time passes. During this...

Japanese Hidankyo’s Nobel Peace Prize Laureate for Actions Toward Nuclear Disarmament

This year's Nobel Peace Prize for "efforts to achieve a world free of nuclear weapons and for demonstrating through witness testimonies that nuclear weapons...

GDPR and Cybersecurity: The Key Role of Industry Codes of Conduct According to KPMG

Since the introduction of the GDPR (General Data Protection Regulation) in 2018, compliance with personal data protection regulations has become a priority for companies...

Germany Implements Temporary Border Controls Amid Criticism from EU Neighbors

Germany has introduced temporary controls at all land borders in an effort to curb illegal migration. Such measures are permitted when there is a...

Another Wave of Disinformation Targets Moldova’s EU Membership Efforts

Cybercriminals have launched a campaign against Moldova's bid for European Union membership, Check Point Research reports. The newly discovered instances of information manipulation exploit...

Experts Warn of Growing Cryptocurrency Scams: Fake Exchanges, Deepfake Ads, and “Pig Butchering” Target New Victims

Experts are warning that cybercriminals are increasingly employing new methods to commit fraud related to cryptocurrency investments. Simultaneously, they are still using old and...

Gamaredon Cyber-Espionage Group Targets Ukrainian and NATO Institutions, Including Poland

ESET analysts have discovered another series of cyberattacks from the cyber-espionage group Gamaredon, primarily targeting Ukrainian government and military institutions. Over the year...

“WalletConnect” App from Google Play Store Has Been Stealing Cryptocurrency from Users for 5 Months

Cybercriminals have once again targeted cryptocurrency holders. Researchers from Check Point Research discovered the existence of a malicious app called "WalletConnect" that operated unnoticed...

Ransomware Attacks Less Frequent in Poland but Remain a Significant Threat

In recent years, ransomware attacks have become one of the most serious threats to companies and institutions worldwide. In 2023, 59 percent of businesses...

Cyber Attack Hits Ochnik and New Balance Poland, Exposing Confidential Customer and Employee Data

In recent days, a cyber attack has targeted the company, Ochnik, among the leading Polish clothing brands, and the Polish representative of New Balance,...

20% of Employees in Polish Companies Have Fallen Victim to Cyber Attacks, CEOs and Managers Most at Risk

Already 20% of surveyed employees of Polish companies admit that they have fallen victim to a cyber attack at work, and as many as...

Scammers Target Borrowers by Impersonating Law Firms

In addition to the widely reported scams in the media, such as the "grandchild" or "policeman" scam, another version has emerged. Now, criminals are...

Cloud Security at Risk: 76% of Organizations Report a Shortage of Cybersecurity Experts

Throughout the last year, 61% of organizations encountered at least one incident related to the use of the public cloud. Another significant barrier is...

- A word from our sponsors -

Follow us

HomeSECURITY