Data Centric Security is the future. Is your IT security keeping up?

For years, IT security has been designed around one principle: strengthen the perimeter - the boundaries of the…

Cyber security OT: Why is the industry still standing still?

Despite growing cyber threats and increasing regulatory pressure, the industrial sector continues to delay the integration of cyber…

How deepfake is changing the tactics of social engineering attacks

Until recently, social engineering was mainly associated with a suspicious email from a 'finance director' or a phone…

Vishing and smishing – a new wave of threats that IT is not on the radar

For years, phishing meant suspicious emails with attachments, typos and links leading to fake login pages. Not surprisingly,…

Ransomware attack on Herbapol. Cyber criminals demand $900,000 ransom

The ransomware incident that affected Herbapol-Lublin is another wake-up call for food companies in Poland. While for years…

Meta vs Italy: CJEU settles dispute over publisher fees

The EU dispute over the rights of publishers and the obligations of online platforms has just entered a…

Cyber attacks on the rise through Middle East conflict – companies must be vigilant

Escalating geopolitical tensions in the Middle East are increasingly translating into escalating cyber activity. According to analysis by…

EDPB simplifies RODO – new tools and support for companies

The European Data Protection Board (EDPB), responsible for coordinating compliance with the RODO in the EU, has announced…

Citrix Bleed 2 – new NetScaler vulnerability dangerous after all? Experts have their doubts

A new vulnerability in Citrix NetScaler - designated CVE-2025-5777 and unofficially named 'Citrix Bleed 2' - puts administrators…

Cyber attacks increase by 36% in one month

In May 2025, the cyber threat landscape became noticeably more turbulent. According to data published by Acronis, we…

Ingram Micro victim of ransomware attack. Global distribution operations disrupted

The failure of Ingram Micro 's systems was caused by a ransomware attack, the company confirms in an…

Fake ChatGPT and InVideo AI. This is how hackers infect ransomware systems

The growing interest in AI-based tools such as ChatGPT and InVideo AI has not escaped the attention of…

Segura opens Europe’s first Center of Excellence PAM in Katowice and establishes partnership with Dagma

Managing privileged access is such a complex task that getting the right support in this area should not…

OnePlus on target in Washington. Will the US market tighten its grip on China again?

Two US congressmen - from both sides of the political spectrum - have called on the US Department…

Germany and Israel create a joint cyber security centre. The “Cyberdome” project is being established

Germany and Israel are planning to set up a joint cyber research centre to lay the foundation for…

Citrix under fire: three critical vulnerabilities in NetScaler ADC and Gateway

Citrix is once again grappling with serious security vulnerabilities in its NetScaler ADC and Gateway appliances. The three…

Public cloud: safe or colander? 97% of confidential data within reach of hackers

Modern business is migrating en masse to the public cloud, often citing enhanced security as one of the…

Not just NIS2, or the new cyber security certification regulations

At the beginning of May 2025, a government bill on a national cyber security certification system was submitted…

Sustainability in IT? Only if you don’t lose data in an attack – Dariusz Szwed, Canon

Recent years have seen a sharp rise in cyber threats, with ransomware being one of the most acute.…

Cyber security for NAS devices: How Synology simplifies data protection

While the risk of cyber attacks is increasing, data protection has become a priority for businesses and individual…

Bots versus businesses – Artur Cyganek of BotGuard on the real cost of bad bots to businesses

Today's internet is facing a rising tide of unwanted traffic generated by bots. According to Imperva's 'Bad Bot…

Wyselekcjonowane specjalnie dla Ciebie treści w oparciu o Twoje preferencje myBIT.