A revolution in SOC? Israeli startup Vega has $65m for new security analytics

Israeli startup Vega has raised $65 million in funding at a valuation of $400 million, challenging existing standards…

Cyber Security 2025: How many companies have really implemented Zero Trust?

In 2025, the world of cybersecurity is dominated by Zero Trust, but the growing popularity of this philosophy…

Billions of attacks and a lack of experts. Is the financial sector ready for the crisis

The growing number of cyberattacks and the deepening shortage of specialists pose a critical threat to the European…

The drone attack launched a digital front. Anatomy of Russian disinformation in Poland

As we predicted, the drone attack on Poland marked the beginning of a coordinated disinformation campaign. According to…

Shadow IT: Enemy or unwanted ally? How to use it for innovation

For years, the traditional approach to data security forced companies to make an unfavorable trade-off between robust protection…

Hybrid threat: How drones over Poland translate into cyber risk

Analysis of Russian services' strategies and forecast of threats to the Polish IT sector and critical infrastructure.

The quantum time bomb is ticking. The problem is the present, not the future

Imagine assets that can be acquired at virtually no cost, but whose future value could be unimaginable. This…

Backup is not enough. How data immutability is redefining cyber security

The traditional approach to backup is no longer a sufficient guarantee of security. The key to survival is…

Beyond your own walls: How to secure the digital supply chain?

The days when cybersecurity ended at the edge of your own network are long gone, and today the…

SOC internal or external? A key decision for IT security

IT leaders face a strategic dilemma regarding the organization of cyber defense. They must decide whether it is…

An invisible front over the Baltic. How Russia’s electronic warfare is testing Europe’s resilience

The incident with Ursula von der Leyen's plane, whose navigation systems were deliberately disrupted during landing, was not…

Interpol operation: 1,200 detainees, $100 million recovered

As part of the unprecedented Operation Serengeti 2.0, Interpol, in cooperation with forces from 18 African countries, arrested…

Cyber security is moving from the server room to the boardroom. How do you talk about DORA and NIS2 with your board?

Conversations about cyber security budgets are finally moving from the server room straight into the boardroom. Thanks to…

If not chat control, then what? Smart and effective ways to combat online crime

In the debate about online security, we are often confronted with a false choice: either we sacrifice privacy…

Chinese hackers exploited a zero-day vulnerability in Citrix for months

A critical vulnerability in Citrix Netscaler systems has been exploited for months by hackers linked to the Chinese…

European Union strengthens defence against GPS jamming. New satellites will go into low orbit

The European Union, in response to escalating GPS signal interference attributed to Russia, plans to strengthen its space…

AI eating its own tail? Who is really generating web traffic and why

The Internet, which we knew as a global platform for humans, is quietly transforming into an automated data…

Back to School, Back to Risk: Are schools ready for digital risks

With the first bell ringing, millions of students log into school systems, beginning a new year full of…

Akamai Technologies warns: 4-step blackmail defines the new face of ransomware

Double extortion in ransomware attacks is no longer enough for cybercriminals, who are escalating to a four-phase blackmail…

The lost innocence of the web: the story of the first great cyber attack

On November 2, 1988, a program consisting of just 99 lines of code, written by a single student,…

Phishing training is losing its lustre: why effectiveness is lower than the market promises

The largest study to date on the effectiveness of phishing training shows that the effects of employee education…