Thursday, January 2, 2025

USA-China Tensions Transform Global Market

After the U.S. elections, relations between the...

Cyberattacks Target Browsers in 2024, with Hackers Demanding a Record $75 Million Ransom

In 2024, cybercriminals focused heavily on exploiting vulnerabilities in web browsers, according to a year-end report by Check Point Software. This year saw the largest ransom ever paid—to the...

Ukrainian Resistance Holds Key Positions Despite Russian Gains

Russian forces continue their offensive in the western part of the Donetsk region, aiming...

Polish MP Scammed by Cybercriminals Posing as Police Officers: Fraudsters Steal PLN 150,000

A Polish Member of Parliament was scammed by cybercriminals who posed as police officers,...

More Than Threefold Increase in Credential Theft in Europe

The year 2024 has marked a record surge in credential theft. Over the past...

Kraków in the Crosshairs of Hackers – Cyberattacks on MPK and Public Institutions

Critical infrastructure – including energy networks, transportation systems, healthcare networks, and other essential areas...

Data Leaks and Losses are Costing Companies More and More. Implemented Protections are Insufficient

The consequences of data breaches and losses are becoming increasingly severe for companies: last year, they cost an average of $2.61 million, accounted for...

DORA Regulation and the DORIAN System: How Financial Institutions Can Prepare for New Operational Resilience Standards in 2025

From 17th January 2025, the DORA (Digital Operational Resilience Act) regulation will be applied in all European Union countries. Its purpose is to increase...

8 out of 10 phishing attacks impersonate Microsoft, Apple, or Google

Microsoft, Apple, and Google's images were used in 8 out of 10 phishing attacks The technology industry remains the most frequently impersonated sector...

Increasing incidents at Polish airports

In aviation, there are often severe or dangerous situations. There is a whole range of so-called safety barriers – which should lead to a...

Financial fraud at a record level. Can AI stop the criminals?

The National Bank of Poland reported over 326,000 instances of fraud involving payment cards and bank transfer orders in 2023. The total value of...

Manipulation and Social Engineering Dominate Data Fraud in 2024: Key Insights from BIK’s Anti-Fraud Report

Manipulation and social engineering techniques with the use of artificial intelligence are the most popular methods of data fraud in 2024. Individuals who become...

Ransomware Threats Rise: 3.8% of Corporate Networks Targeted Globally, Polish Public Utilities Most Vulnerable

The importance of ransomware groups is increasing. Already 3.8% of corporate networks have experienced attempts of ransomware attack – warn Check Point Research experts....

The problem of illegal migration requires strengthening of the EU Border and Coast Guard Agency. MEPs appeal for more powers for Frontex

An increasing number of countries view the influx of migrants as a threat to Europe's security and identity. Berlin has implemented new border controls,...

Pokémon Hacked – Leak of Data Collected over Decades by the Game’s Producer

Game Freak, a Japanese video game developer known for the iconic Pokémon series, has suffered a significant data breach. The event, referred to as...

Poland’s Airspace Increasingly Violated: Balancing Security and Caution in Peacetime Response

The Polish airspace has been increasingly violated recently. Unfortunately, before an object is identified as alien, a significant amount of time passes. During this...

Japanese Hidankyo’s Nobel Peace Prize Laureate for Actions Toward Nuclear Disarmament

This year's Nobel Peace Prize for "efforts to achieve a world free of nuclear weapons and for demonstrating through witness testimonies that nuclear weapons...

GDPR and Cybersecurity: The Key Role of Industry Codes of Conduct According to KPMG

Since the introduction of the GDPR (General Data Protection Regulation) in 2018, compliance with personal data protection regulations has become a priority for companies...

Germany Implements Temporary Border Controls Amid Criticism from EU Neighbors

Germany has introduced temporary controls at all land borders in an effort to curb illegal migration. Such measures are permitted when there is a...

Another Wave of Disinformation Targets Moldova’s EU Membership Efforts

Cybercriminals have launched a campaign against Moldova's bid for European Union membership, Check Point Research reports. The newly discovered instances of information manipulation exploit...

- A word from our sponsors -

Follow us

HomeSECURITY