Traditional security models are no longer effective. The 'castle and moat' concept - assuming that everything inside the…
The job market has become a new hunting ground for cybercriminals. Instead of classic malware, they are reaching…
Poland's economy is at the heart of a digital paradox. On the one hand, the country is dynamically…
Companies are investing in dozens of tools to protect their growing infrastructure. However, this intuitive action creates a…
Oprogramowanie open source stało się fundamentem współczesnych aplikacji – odpowiada dziś średnio za 77% całego kodu w rozwiązaniach…
More and more companies are investing in cyber insurance, seeing it as the last line of defence against…
In theory, every new security tool increases a company's protection. In practice - the more tools, the more…
The ongoing 'ToolShell' cyberattack campaign against local Microsoft SharePoint servers is not just another security incident. It is…
The increasing number of cyber attacks, new regulatory obligations and limited human resources make cyber security one of…
In a digital ecosystem where the lines between innovation and threat are blurring by the second, the Security…
For years, IT security has been designed around one principle: strengthen the perimeter - the boundaries of the…
Despite growing cyber threats and increasing regulatory pressure, the industrial sector continues to delay the integration of cyber…
Until recently, social engineering was mainly associated with a suspicious email from a 'finance director' or a phone…
For years, phishing meant suspicious emails with attachments, typos and links leading to fake login pages. Not surprisingly,…
The ransomware incident that affected Herbapol-Lublin is another wake-up call for food companies in Poland. While for years…
The EU dispute over the rights of publishers and the obligations of online platforms has just entered a…
Escalating geopolitical tensions in the Middle East are increasingly translating into escalating cyber activity. According to analysis by…
The European Data Protection Board (EDPB), responsible for coordinating compliance with the RODO in the EU, has announced…
A new vulnerability in Citrix NetScaler - designated CVE-2025-5777 and unofficially named 'Citrix Bleed 2' - puts administrators…
In May 2025, the cyber threat landscape became noticeably more turbulent. According to data published by Acronis, we…
The failure of Ingram Micro 's systems was caused by a ransomware attack, the company confirms in an…
To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.
Sign in to your account