A new iPhone and a cool market reaction

In response to criticism regarding its lack of innovation, Apple unveiled a radically redesigned iPhone Air model. It is the…

Hybrid threat: How drones over Poland translate into cyber risk

Analysis of Russian services' strategies and forecast of threats to the Polish IT sector and critical infrastructure.

Akamai Technologies warns: 4-step blackmail defines the new face of ransomware

Double extortion in ransomware attacks is no longer enough for cybercriminals, who are escalating to a four-phase blackmail…

The lost innocence of the web: the story of the first great cyber attack

On November 2, 1988, a program consisting of just 99 lines of code, written by a single student,…

Clickjacking as part of the attack chain: an underestimated threat in security architecture

Clickjacking has remained on the periphery of security departments' attention for years - regarded more as a threat…

Why every cable in a factory today is a potential entry point for a hacker

Just a decade ago, the industrial production line was a closed world. Machines ran on isolated networks and…

AI in cyber security, or how to save $1.76m and reduce attack response by 108 days

Every IT leader and security director knows this scenario all too well: the endless stream of security alerts,…

Poland’s alarming skills gap. Why are we such an easy target for hackers?

Poland's economy is at the heart of a digital paradox. On the one hand, the country is dynamically…

The more tools, the worse? The cyber security paradox that is destroying businesses

Companies are investing in dozens of tools to protect their growing infrastructure. However, this intuitive action creates a…

The Open Source Paradox – How innovation became the biggest threat to business

Oprogramowanie open source stało się fundamentem współczesnych aplikacji – odpowiada dziś średnio za 77% całego kodu w rozwiązaniach…

Cyber insurance is not enough. Why don’t policies cover real losses after an attack?

More and more companies are investing in cyber insurance, seeing it as the last line of defence against…

Vishing and smishing – a new wave of threats that IT is not on the radar

For years, phishing meant suspicious emails with attachments, typos and links leading to fake login pages. Not surprisingly,…

Ransomware attack on Herbapol. Cyber criminals demand $900,000 ransom

The ransomware incident that affected Herbapol-Lublin is another wake-up call for food companies in Poland. While for years…

Cyber paradox: Why, despite billions for cyber security, are companies increasingly vulnerable?

Today's digital landscape presents business leaders with a paradox: despite increasing investment in cyber security, the number and…