Skip to content
Knowledge base Updated: February 5, 2026

Cybersecurity Trends in Poland 2023

Discover cybersecurity trends in Poland for 2023. Learn about the threats and challenges facing companies and what strategies and technologies will be key to protecting data and IT systems.

We would like to draw your attention to the latest THREAT INTELLIGENCE REPORT for Poland, prepared by Check Point Research. This report provides unique information presenting current cybersecurity trends that may affect the security of your business.

According to the report, organizations in Poland are attacked on average 1,273 times per week, which is higher than the global average of 1,214 attacks per organization. The report also reveals that Qbot is the most widespread malware in Poland, and 79% of malicious files are delivered via email.

Important Topics Covered in the Report:

Data Exploitation as an Alternative to Ransomware:

Faced with challenges posed to cybercriminals, more and more groups are opting to use data exploitation instead of encryption.

Destructive Wipers:

In 2022, there was an increase in the scale of destructive malware deployments related to cyber espionage activities.

Hacktivism:

The boundaries between state cyber operations and hacktivism are becoming increasingly blurred, as more and more hacktivist groups are state-affiliated and promote national narratives.

Cloud:

Third-party threat: In 2022, there was a 48% increase in the number of attacks on cloud-based organizations compared to 2021, indicating a shift in preferences for attackers.

Weaponization of Legitimate Tools:

In the fight against advanced cybersecurity solutions, threat actors are developing and refining their attack techniques, increasingly using signature-free tools.

The report also presents analyses of attacks on organizations in Poland, which showed the involvement of various APT groups, such as Fancy Bear (APT28), Ghostwriter (UNC1151), and Mustang Panda (TA416).

Learn key terms related to this article in our cybersecurity glossary:

  • Security Operations Center (SOC) — Security Operations Center (SOC) is a central location where a team of security…
  • Ransomware — Ransomware is a type of malicious software (malware) that blocks access to a…
  • SOC as a Service — SOC as a Service (Security Operations Center as a Service), also known as…
  • Network Security — Network security is a set of practices, technologies, and strategies aimed at…
  • Cybersecurity — Cybersecurity is a collection of techniques, processes, and practices used to…

Learn More

Explore related articles in our knowledge base:


📚 Read the complete guide: SOC: Security Operations Center - czym jest, jak działa, jak wybrać

Explore Our Services

Need cybersecurity support? Check out:

Share:

Talk to an expert

Have questions about this topic? Get in touch with our specialist.

Product Manager
Grzegorz Gnych

Grzegorz Gnych

Sales Representative

Response within 24 hours
Free consultation
Individual approach

Providing your phone number will speed up contact.

Want to Reduce IT Risk and Costs?

Book a free consultation - we respond within 24h

Response in 24h Free quote No obligations

Or download free guide:

Download NIS2 Checklist