For years, IT security has been designed around one principle: strengthen the perimeter - the boundaries of the…
Despite growing cyber threats and increasing regulatory pressure, the industrial sector continues to delay the integration of cyber…
Until recently, social engineering was mainly associated with a suspicious email from a 'finance director' or a phone…
For years, phishing meant suspicious emails with attachments, typos and links leading to fake login pages. Not surprisingly,…
The ransomware incident that affected Herbapol-Lublin is another wake-up call for food companies in Poland. While for years…
The EU dispute over the rights of publishers and the obligations of online platforms has just entered a…
Escalating geopolitical tensions in the Middle East are increasingly translating into escalating cyber activity. According to analysis by…
The European Data Protection Board (EDPB), responsible for coordinating compliance with the RODO in the EU, has announced…
A new vulnerability in Citrix NetScaler - designated CVE-2025-5777 and unofficially named 'Citrix Bleed 2' - puts administrators…
In May 2025, the cyber threat landscape became noticeably more turbulent. According to data published by Acronis, we…
The failure of Ingram Micro 's systems was caused by a ransomware attack, the company confirms in an…
The growing interest in AI-based tools such as ChatGPT and InVideo AI has not escaped the attention of…
Managing privileged access is such a complex task that getting the right support in this area should not…
Two US congressmen - from both sides of the political spectrum - have called on the US Department…
Germany and Israel are planning to set up a joint cyber research centre to lay the foundation for…
Citrix is once again grappling with serious security vulnerabilities in its NetScaler ADC and Gateway appliances. The three…
Modern business is migrating en masse to the public cloud, often citing enhanced security as one of the…
At the beginning of May 2025, a government bill on a national cyber security certification system was submitted…
Recent years have seen a sharp rise in cyber threats, with ransomware being one of the most acute.…
While the risk of cyber attacks is increasing, data protection has become a priority for businesses and individual…
Today's internet is facing a rising tide of unwanted traffic generated by bots. According to Imperva's 'Bad Bot…
To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.
Sign in to your account