Mondelez is investing over $40 million in a proprietary generative AI tool, developed in collaboration with Publicis and Accenture, to…
The leak of 4 TB of EY backups is yet another example of how companies still fail to…
F5 is facing serious consequences from a recent major breach of its own systems. In response to the…
Cyberattacks are becoming faster, more automated, and powered by artificial intelligence. New data from Palo Alto Networks shows…
The attack on F5, one of the key providers of cybersecurity solutions, shows that even the guardians of…
British police have arrested two people in connection with a ransomware attack on the Kido International nursery chain,…
Attackers have changed their strategy, targeting not millions of users, but the heart of corporate infrastructure through unknown…
Renault UK has confirmed a customer data breach following a cyberattack on one of its external suppliers. The…
A cybercriminal group calling itself “Scattered LAPSUS$ Hunters” claims to have stolen nearly a billion records belonging to…
A ransomware cyberattack on an aviation software provider paralyzed operations at key European airports from London to Berlin…
Analysis of Russian services' strategies and forecast of threats to the Polish IT sector and critical infrastructure.
Double extortion in ransomware attacks is no longer enough for cybercriminals, who are escalating to a four-phase blackmail…
On November 2, 1988, a program consisting of just 99 lines of code, written by a single student,…
Clickjacking has remained on the periphery of security departments' attention for years - regarded more as a threat…
Just a decade ago, the industrial production line was a closed world. Machines ran on isolated networks and…
Every IT leader and security director knows this scenario all too well: the endless stream of security alerts,…
Poland's economy is at the heart of a digital paradox. On the one hand, the country is dynamically…
Companies are investing in dozens of tools to protect their growing infrastructure. However, this intuitive action creates a…
Oprogramowanie open source stało się fundamentem współczesnych aplikacji – odpowiada dziś średnio za 77% całego kodu w rozwiązaniach…
More and more companies are investing in cyber insurance, seeing it as the last line of defence against…
For years, phishing meant suspicious emails with attachments, typos and links leading to fake login pages. Not surprisingly,…
The ransomware incident that affected Herbapol-Lublin is another wake-up call for food companies in Poland. While for years…
To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.
Sign in to your account