Cybercriminals are increasingly operating in broad daylight, exploiting the advertising industry's infrastructure rather than hiding in the darknet. The latest…
The Polish-Romanian company Orbotix Industries has secured €6.5 million in funding for the development of autonomous drone systems…
Polish companies are investing more and more in cybersecurity, expanding their teams and increasing their budgets, but at…
The manufacturing industry has become one of the main targets of cybercriminals, and the scale of attacks is…
European companies are increasingly facing a double challenge: a growing number of cyberattacks and a dramatic shortage of…
In 2025, digital identity ceased to be merely a passive trace of our online activity, becoming one of…
Progress Software has released a new version of Flowmon ADS 12.5, in which artificial intelligence is used to…
The era of simple cyberattacks is over, replaced by a new generation of threats driven by the commercialization…
Contemporary cybersecurity is no longer the domain of technology, but is becoming a key element of business strategy…
The scale and sophistication of cyber threats in Poland necessitates a fundamental change in the approach to IT…
Israeli startup Vega has raised $65 million in funding at a valuation of $400 million, challenging existing standards…
In 2025, the world of cybersecurity is dominated by Zero Trust, but the growing popularity of this philosophy…
The growing number of cyberattacks and the deepening shortage of specialists pose a critical threat to the European…
As we predicted, the drone attack on Poland marked the beginning of a coordinated disinformation campaign. According to…
For years, the traditional approach to data security forced companies to make an unfavorable trade-off between robust protection…
Analysis of Russian services' strategies and forecast of threats to the Polish IT sector and critical infrastructure.
Imagine assets that can be acquired at virtually no cost, but whose future value could be unimaginable. This…
The traditional approach to backup is no longer a sufficient guarantee of security. The key to survival is…
The days when cybersecurity ended at the edge of your own network are long gone, and today the…
IT leaders face a strategic dilemma regarding the organization of cyber defense. They must decide whether it is…
The incident with Ursula von der Leyen's plane, whose navigation systems were deliberately disrupted during landing, was not…
As part of the unprecedented Operation Serengeti 2.0, Interpol, in cooperation with forces from 18 African countries, arrested…
To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.
Sign in to your account