NBC Logo

CERT Poland 2024 reports – what’s new in cyber security?

The latest CERT reports on cyber security in Poland were published in March 2025. They were prepared by two key institutions: CERT Polska (operating within NASK) and CERT Orange Polska. The documents summarize the events of 2024 and are an important source of knowledge about current threats on the network, the ways in which cyber […]

Assassination of UnitedHealthcare CEO – is AI linked to it?

The assassination of UnitedHealthcare’s CEO happened on December 4, 2024. Brian Thompson, was shot dead in a precisely planned attack in Manhattan, in front of the Hilton Hotel while preparing for an investor meeting. Police determined that the attacker fired at close range, and the suspect’s backpack containing counterfeit money and clothing was found in […]

Operators in Poland increased user security from September 2024

Increased user security, thanks to new regulations in Polish telecommunications, are aimed at blocking unwanted phone numbers, as well as fake SMS messages, known as smishing, and calls impersonating legitimate institutions, or spoofing. As of September 26, 2024, telecom operators are required by the Law on Combating Fraud in Electronic Communications to monitor and block […]

Operators in Poland increased user security from September 2024

Increased user security, thanks to new regulations in Polish telecommunications, are aimed at blocking unwanted phone numbers, as well as fake SMS messages, known as smishing, and calls impersonating legitimate institutions, or spoofing. As of September 26, 2024, telecom operators are required by the Law on Combating Fraud in Electronic Communications to monitor and block […]

Phishing in the Flood of 2024: How to Protect Your Data?

In September 2024, as southern Poland struggled to cope with tragic flooding, cybercriminals took advantage of the chaos by launching numerous phishing attacks. Their main goal was to phish for personal information and deceive people who wanted to support those affected financially. Fake collections and links to phishing sites began to appear en masse on […]

Polish voiceover replaced by AI – Change in Google Maps

Google Maps has accompanied us on our travels for years, and the voice of Jaroslaw Juszkiewicz has become an integral part of navigation for many users in Poland. However, Google recently decided to make a significant change, which caused quite a stir among users. In May 2020, Google tried to replace Juszkiewicz’s voice with a […]

Darknet and Boystown – BKA’s Fight Against Crime Online

In an era of increasing digitization, the Darknet is becoming a hotbed for illegal activities, far from the control and censorship of the Internet. One of the most important topics related to the Darknet is the Boystown platform, which has become the subject of intense investigations by German security services. In this post, we’ll take […]

AI in Polish radio – the future or a temporary curiosity?

The experiment with AI at OFF Radio Krakow is one of the most interesting media events of recent months, which has sparked a wave of discussion in Poland. Instead of using traditional presenters, the radio station decided to use synthetic voices generated by AI, which is expected to bring cost-saving benefits and allow testing of […]

How does DLP protect your data and the data of your customers?

In today’s cyber-security-driven digital world, data protection has become a key challenge for companies and institutions. One solution that is gaining popularity is DLP, or Data Loss Prevention. What exactly does it mean, how does it work, and why should you invest in it? What is DLP? DLP (Data Loss Prevention) is a set of […]

Zero Trust Architecture: What is it and why is it important?

In today’s world, where more and more data is stored in the cloud and cybercrime is becoming more common, information security is becoming crucial. Zero Trust architecture has been developed in response to these challenges. But what does it actually mean and how can it help you or your organization? What is this? Zero Trust […]

1 2