A secret supply route for Russian armaments has been uncovered. Traces lead to Siemens and China

Russian state-owned arms factory Biysk Oleum (BOZ) has acquired advanced production automation equipment from Siemens, despite the sanctions in place.…

Clickjacking as part of the attack chain: an underestimated threat in security architecture

Clickjacking has remained on the periphery of security departments' attention for years - regarded more as a threat…

Why every cable in a factory today is a potential entry point for a hacker

Just a decade ago, the industrial production line was a closed world. Machines ran on isolated networks and…

The cyber security market is not slowing down. Here’s what’s driving it

Global spending on cyber security is growing at a double-digit rate. According to the latest forecasts from analyst…

The biggest security gap in AI is not the code. It’s the people

In 2023, a quiet drama unfolded in the corridors of tech giant Samsung. It was not a hacking…

Second-hand ransomware. How copying code lowers the barrier to entry to cybercrime

If cybercrime had its own GitHub, Nitrogen ransomware and LukaLocker would be its popular forks. An increasing number…

ReVault: Five serious security vulnerabilities in over 100 Dell laptop models

Cisco Talos has disclosed five serious vulnerabilities in the Dell ControlVault3 firmware and associated Windows APIs. Collectively named…

AI in cyber security, or how to save $1.76m and reduce attack response by 108 days

Every IT leader and security director knows this scenario all too well: the endless stream of security alerts,…

Technological arms race – who is using and who is fighting deepfake?

The rise of deepfake fraud is accelerating, forcing companies into a technological arms race. As artificial intelligence becomes…

Post Quantum Cryptography: Business implications of algorithm choice

Today's digital economy rests on an invisible but fundamental pillar: public key cryptography. Algorithms such as RSA and…

OT cyber security at the target of ransomware. How one mistake leads to production paralysis

The convergence of information technology (IT) and operational technology (OT) is accelerating, but its implementation is still fraught…

AI as a hacker? Researchers have investigated its capabilities and the results are worrying

Large language models can no longer just write lines and code, but can autonomously plan and execute complex…

An investment that pays off – implementing Zero Trust architecture

Traditional security models are no longer effective. The 'castle and moat' concept - assuming that everything inside the…

The evolution of phishing: From fake invoices to job interview invitations

The job market has become a new hunting ground for cybercriminals. Instead of classic malware, they are reaching…

Poland’s alarming skills gap. Why are we such an easy target for hackers?

Poland's economy is at the heart of a digital paradox. On the one hand, the country is dynamically…

The more tools, the worse? The cyber security paradox that is destroying businesses

Companies are investing in dozens of tools to protect their growing infrastructure. However, this intuitive action creates a…

The Open Source Paradox – How innovation became the biggest threat to business

Oprogramowanie open source staล‚o siฤ™ fundamentem wspรณล‚czesnych aplikacji โ€“ odpowiada dziล› ล›rednio za 77% caล‚ego kodu w rozwiฤ…zaniach…

Cyber insurance is not enough. Why don’t policies cover real losses after an attack?

More and more companies are investing in cyber insurance, seeing it as the last line of defence against…

Cybersecurity in chaos: how an excess of tools is ruining IT security

In theory, every new security tool increases a company's protection. In practice - the more tools, the more…

What does a cyber attack on Microsoft SharePoint mean for business?

The ongoing 'ToolShell' cyberattack campaign against local Microsoft SharePoint servers is not just another security incident. It is…

Cyber security is not a sprint. Companies need to stop putting out fires and start planning

The increasing number of cyber attacks, new regulatory obligations and limited human resources make cyber security one of…

SOC report: Why modern security centres are becoming a pillar of business continuity

In a digital ecosystem where the lines between innovation and threat are blurring by the second, the Security…

Wyselekcjonowane specjalnie dla Ciebie treล›ci w oparciu o Twoje preferencje myBIT.