We would like to draw your attention to the latest THREAT INTELLIGENCE REPORT for Poland, prepared by Check Point Research. This report provides unique information presenting current cybersecurity trends that may affect the security of your business.
According to the report, organizations in Poland are attacked on average 1,273 times per week, which is higher than the global average of 1,214 attacks per organization. The report also reveals that Qbot is the most widespread malware in Poland, and 79% of malicious files are delivered via email.
Important Topics Covered in the Report:
Data Exploitation as an Alternative to Ransomware:
Faced with challenges posed to cybercriminals, more and more groups are opting to use data exploitation instead of encryption.
Destructive Wipers:
In 2022, there was an increase in the scale of destructive malware deployments related to cyber espionage activities.
Hacktivism:
The boundaries between state cyber operations and hacktivism are becoming increasingly blurred, as more and more hacktivist groups are state-affiliated and promote national narratives.
Cloud:
Third-party threat: In 2022, there was a 48% increase in the number of attacks on cloud-based organizations compared to 2021, indicating a shift in preferences for attackers.
Weaponization of Legitimate Tools:
In the fight against advanced cybersecurity solutions, threat actors are developing and refining their attack techniques, increasingly using signature-free tools.
The report also presents analyses of attacks on organizations in Poland, which showed the involvement of various APT groups, such as Fancy Bear (APT28), Ghostwriter (UNC1151), and Mustang Panda (TA416).
Related Terms
Learn key terms related to this article in our cybersecurity glossary:
- Security Operations Center (SOC) — Security Operations Center (SOC) is a central location where a team of security…
- Ransomware — Ransomware is a type of malicious software (malware) that blocks access to a…
- SOC as a Service — SOC as a Service (Security Operations Center as a Service), also known as…
- Network Security — Network security is a set of practices, technologies, and strategies aimed at…
- Cybersecurity — Cybersecurity is a collection of techniques, processes, and practices used to…
Learn More
Explore related articles in our knowledge base:
- Who Does the National Cybersecurity System Cover? Entities, Operators, Providers and Authorities
- Automotive cybersecurity: How to protect modern, connected vehicles?
- Cyber Threats 2023: Practical Guide Based on Fortinet Threat Landscape Report
- Cybersecurity Threats and Strategies for Local Governments - Comprehensive Guide
- How does an OT cybersecurity audit become the key to winning the £1.3 million
📚 Read the complete guide: SOC: Security Operations Center - czym jest, jak działa, jak wybrać
Explore Our Services
Need cybersecurity support? Check out:
- Security Audits - comprehensive security assessment
- Penetration Testing - identify vulnerabilities in your infrastructure
- SOC as a Service - 24/7 security monitoring
