READ THE LATEST NEWS
If we are discussing cyber security issues, we must admit that a safe child is a safe parent. If you take proper care of your children’s digital safety, you will avoid the risk of data theft, hacking attacks, data [...]
Here are some tips from our cyber risk experts. Read on to enjoy a safe vacation! We are excited to search for the perfect vacation, trying to provide ourselves and our loved ones with a beautiful time and [...]
Phishing training for employees is one of the most effective ways to strengthen your company’s defences against malware, ransomware, data loss and Business E-mail Compromise (BEC) attacks. Experience shows that awareness campaigns result in a significantly reduced click-through rate after [...]
Our experts in media
LIST OF OUR PUBLICATIONS
Technology, the development of which is intended to help humanity, is also used for evil purposes. More and more often, artificial intelligence becomes an ally of criminals, which helps them manipulate information, distort reality or blackmail. Business is often the victim.
About the situation in Ukraine in the second day of the war, its chances in the clash with Russia, the courage, but also terror of the Ukrainians, about former soldiers of the special units “Grom” evacuating personnel from Polish companies, and about Putin’s aggression, to which the West will not respond with the same strength.
AI systems need access to large amounts of data to train and improve their algorithms. Often this is confidential company information, used to make their work easier. To guard against such risks, companies should bet on employee education and training.
LIST OF ARTICLES
Asked why he’d robbed banks, a notorious American gangster from the Great Depression era famously replied: ‘If they kept money in candy stores, I would rob candy stores.’ Is there any connection between old-style robbers and the plight of modern l law firms? On the surface, not really. After all, what can you steal from […]
Phishing is a form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries […]
Double extortion’ is the term given to an evolving ransomware tactic: first, steal confidential data, then encrypt the victim’s files. Cybercriminal uses a database encryption attack to extort money but with an additional initial attack to ensure that the backup does not render the attack useless. Before a cybercriminal attack with ransomware, he hacks […]