Medusa ransomware – a threat from the depths of cyberspace

Medusa ransomware is one of the most dangerous cyber threats of recent years. It operates on a ransomware-as-a-service model, making its tools available to other criminals in exchange for a share of the profits. The group operating Medusa has gained notoriety for its attacks on schools, financial institutions and public offices. Its operations are aggressive, […]
Ransomware: Fake ransom demands delivered by mail – a new method of cybercriminals

In May 2025, Barracuda reported on a new phenomenon – scammers sending physical letters with ransom demands. Victims, mainly in the healthcare sector, receive correspondence signed by purported representatives of the ransomware group BianLian. The letters contain threats to expose data and a QR code to pay the ransom. This type of action is a […]
EU AI Act – what you need to know and how to prepare

The introduction of the Artificial Intelligence Regulation (EU AI Act) by the European Union marks a breakthrough in the regulation of AI technology. The act aims to ensure that AI systems are safe, ethical and in compliance with basic human rights. For organizations using AI, this means that data management processes and compliance with the […]
Growing threat from email attachments – Barracuda 2025 report

In 2025, cybercriminals are increasingly using email attachments as an effective tool to launch attacks. The rise of phishing campaigns and malware hidden in files is an alarming trend. According to the Barracuda report, these threats are becoming increasingly difficult to detect and require more sophisticated defense strategies. Protecting email security is becoming one of […]
Checkmk’s new Notification Hub – smart notifications for better cyber security

In a world of constantly evolving IT systems, effective management of alerts has become essential. Traditional methods have often led to information overload or, conversely, important alerts being overlooked. Checkmk ‘s new Notification Hub addresses these challenges by offering intelligent, configurable and scalable message management. It’s a solution that significantly increases the efficiency of cyber […]
Real-time threat monitoring – how does OPSWAT defeat cyber threats?

In an era of constantly evolving cyber threats, traditional methods of protection are proving insufficient. The key to effective defense is rapid incident response and an in-depth understanding of the context of attacks. The solutions offered by OPSWAT enable organizations to analyze threats in real time, allowing them to detect and neutralize dangers immediately. This […]
Cortex Cloud – a new era of cloud security from Palo Alto Networks

In an era of intense digital transformation, cloud security is gaining critical importance for organizations in every industry. Traditional methods of data protection often fail to keep up with the pace of threat development. In response to these challenges, Palo Alto Networks is introducing Cortex Cloud, a modern platform that combines the capabilities of existing […]
Data security management – the foundation of modern digital protection

In a world where data is becoming an organization’s most valuable asset, managing its security is becoming critical. With the development of technology and the transfer of processes to digital environments, the risk of data loss or leakage is growing by the day. Effective data security management is not only about meeting regulatory requirements, but […]
End-to-end email record management: automating Gimmal compliance

Emails are one of the main channels of communication in organizations today, carrying information of strategic importance – from contracts to employee data. Unfortunately, in many companies, the management of this data is chaotic and manual, which generates the risk of legal and security violations. In the era of RODO, KRI and internal compliance policies, […]
Hunting for threats – how does proactive cyber security work?

Threats in the digital world are increasingly sophisticated, and cybercriminals are constantly developing their methods of operation. Traditional security systems, while important, are often unable to detect an attack in time or identify it at all. That’s why more and more companies and institutions are turning to the advanced security strategy of threat hunting, also […]