Defence24.pl…
- Dziś do Polski dotarły pierwsze egzemplarze samolotów F-35. Oficjalne powitanie maszyn miało miejsce w 32. Bazie Lotnictwa Taktycznego w Łasku. Redakcja Defence24 była obecna na miejscu.
- Ponad 20 zastępów straży pożarnej i dwa samoloty walczą z pożarem na toruńskim poligonie. Ogień objął kilka hektarów, ale powierzchnia działań gaśniczych jest wielokrotnie większa.
- Umowa na budowę bloku rufowego drugiej fregaty programu Miecznik wzmacnia kooperację w ramach Polskiej Grupy Zbrojeniowej i potwierdza model local content realizowany przez Konsorcjum PGZ-Miecznik, w skład którego wchodzą Polska Grupa Zbrojeniowa S.A. i PGZ Stocznia Wojenna, przy największym kontrakcie w historii polskiego przemysłu okrętowego.
- Amerykanie wstrzymują sprzedaż broni na Tajwan. Co jest powodem pauzy w dostarczaniu pakietu wartego nawet kilkanaście miliardów dolarów?
- Przedstawiciele Sił Zbrojnych USA odwiedzili 17-21 maja Polskę w celu zapoznania się z realizacją inwestycji w infrastrukturę wojskową.
- Prezydent Donald Trump osobiście zaangażował się w odwrócenie kontrowersyjnej decyzji Pentagonu o wstrzymaniu rotacji amerykańskich wojsk do Polski, zarzucając szefowi resortu obrony Pete’owi Hegsethowi, że USA nie powinny „źle traktować” jednego ze swoich najbliższych sojuszników. Sprawa, której kulisy opisał „Wall Street Journal”, wywołała zaskoczenie zarówno w Kongresie, jak i wśród europejskich partnerów.
- F-35 jest na dobrej drodze, by stać się najliczniejszym samolotem bojowym w Europie. Czy Lightning II zmieni lotniczy układ sił na Starym Kontynencie? Liczby są jednoznaczne.
- Podczas tegorocznej, 8. edycji konferencji Defence24 Days rozmawialiśmy z Joanną Siecińską, Wiceprezes PKP Intercity. Tematami rozmowy były rola PKP Intercity w systemie obrony państwa, nowe projekty mające uchronić transporty przed potencjalnymi aktami sabotażu oraz o zadaniach, jakie będą stały przed spółką w sytuacji zagrożenia.
- Niemiecki koncern technologiczny Rohde & Schwarz oraz ukraiński INFOZAHYST podpisały porozumienie dotyczące wspólnego rozwoju systemów walki radioelektronicznej i rozwiązań antydronowych. Współpraca została ogłoszona podczas targów AOC Europe 2026 w Helsinkach.
- Przy okazji przylotu do Polski pierwszych polskich myśliwców 5. generacji, warto zastanowić się, co zmienia ta maszyna dla Sił Zbrojnych RP i polskiej obronności. A zmiana jest kopernikańska.
- Wiceszef MON Cezary Tomczyk powiedział w czwartek PAP, że szczegóły tego, co w praktyce będzie oznaczać decyzja Donalda Trumpa o wysłaniu „dodatkowych 5 tys. żołnierzy” do Polski, zostaną ustalone w rozmowach MON i Sztabu Generalnego z dowódcą wojsk USA w Europie gen. Alexusem Grynkewichem.
- O jaką stałą obecność Wojsk Lądowych USA na naszym terytorium powinniśmy zabiegać? W niniejszym materiale spróbujemy odpowiedzieć na to zagadnienie z punktu widzenia obecnych struktur US Army.
- Po raz pierwszy prezydent Rosji Władimir Putin i prezydent Białorusi Aleksander Łukaszenka wspólnie poprowadzili atomowe ćwiczenia obu państw.
- Dr Hubert Cichocki, prezes Sieci Badawczej Łukasiewicz, komentuje inwestycje w nowoczesne technologie i autonomizację na polu walki. Czy Polska powinna inwestować w AI? Jakie projekty realizuje Sieć Badawcza Łukasiewicz? Jak wypadają polscy inżynierowie w sferze przemysłu obronnego? – o tych zagadnieniach rozmawiamy z doktorem Hubertem Cichockim.
- Na Defence24Days swoje rozwiązania zaprezentowali innowatorzy z USA, UK, Szwecji, Grecji i Danii, którzy pracowali nad nimi w ramach sześciomiesięcznego programu akceleracyjnego NATO DIANA. Było to możliwe dzięki FORT-owi Kraków – wspólnej inicjatywie Krakowskiego Parku Technologicznego i Akademii Górniczo-Hutniczej na rzecz rozwoju branży defence i dual-use.
- Prezydent USA Donald Trump ogłosił, że z uwagi na dobre relacje z prezydentem Karolem Nawrockim kieruje do Polski dodatkowych pięć tysięcy żołnierzy. Pojawia się więc pytanie: skąd mogą zostać skierowani na teren RP?
- W amerykańskich mediach szeroko komentowana jest decyzja prezydenta Donalda Trumpa o wysłaniu dodatkowych 5000 żołnierzy do Polski. Sprawa wywołała duże poruszenie nie tylko dlatego, że dotyczy wzmocnienia wschodniej flanki NATO, ale przede wszystkim dlatego, że pojawiła się w atmosferze wyraźnych sprzeczności w działaniach Pentagonu i Białego Domu.
- Prezydent Ukrainy Wołodymyr Zełenski poinformował w piątek o ataku na rafinerię w rosyjskim mieście Jarosław i oświadczył, że przenoszenie wojny na terytorium wroga jest działaniem sprawiedliwym.
- Zapowiedź wysłania do Polski kolejnych pięciu tysięcy amerykańskich żołnierzy wywołała szerokie komentarze wśród przedstawicieli polskich władz. Decyzję ogłoszoną przez prezydenta USA Donalda Trumpa politycy rządu ocenili jako ważny sygnał dla bezpieczeństwa regionu oraz potwierdzenie silnych relacji Warszawy z Waszyngtonem.
- Sekretarz generalny NATO Mark Rutte oświadczył podczas spotkania szefów dyplomacji państw NATO w Helsingborgu w Szwecji, że z zadowoleniem przyjmuje zapowiedź prezydenta USA Donalda Trumpa o wysłaniu większej liczby żołnierzy do Polski.
TVN wiadomości…
Błąd RSS: Retrieved unsupported status code "403"
Wyborcza Kraj…
Wystąpił błąd, co prawdopodobnie oznacza, że kanał nie działa. Spróbuj ponownie później.
Wyborcza Świat…
Wystąpił błąd, co prawdopodobnie oznacza, że kanał nie działa. Spróbuj ponownie później.
The Hacker News…
- The Belarus-aligned threat actor known as Ghostwriter (aka UAC-0057 and UNC1151Ukraine's National Security and Defense Council) has been observed using lures related to Prometheus, a Ukrainian online learning platform, to target government organizations in the country. The activity, per the Computer Emergency Response Team of Ukraine (CERT-UA), involves sending phishing emails to government
- Cybersecurity researchers have disclosed details of a new automated campaign called Megalodon that has pushed 5,718 malicious commits to 5,561 GitHub repositories within a six-hour window. "Using throwaway accounts and forged author identities (build-bot, auto-ci, ci-bot, pipeline-bot), the attacker injected GitHub Actions workflows containing base64-encoded bash payloads that exfiltrate CI
- 1 Introduction This article provides a technical analysis of how many Windows kernel mode drivers can be interacted with from user mode without the hardware they were developed for. This work was motivated by driver-oriented vulnerability research and the need to evaluate the exploitability of individual findings, which frequently affect code whose reachability is hardware-gated. […]
- The U.S. Department of Justice (DoJ) on Thursday announced the arrest of a Canadian man in connection with allegedly operating a distributed denial-of-service (DDoS) botnet known as Kimwolf. In tandem, Jacob Butler (aka Dort), 23, Ottawa, Canada, has been charged with offenses related to the development and operation of the botnet. Kimwolf is assessed to […]
- The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Langflow and Trend Micro Apex One to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities in question are listed below – CVE-2025-34291 (CVSS score: 9.4) – An origin validation error vulnerability in Langflow that could
- Cisco has rolled out updates for a maximum-severity security flaw impacting Secure Workload that could allow an unauthenticated, remote attacker to access sensitive data. Tracked as CVE-2026-20223 (CVSS score: 10.0), the vulnerability arises from insufficient validation and authentication when accessing REST API endpoints. "An attacker could exploit this vulnerability if they are able to send
- Cybersecurity researchers have disclosed details of a new Linux malware dubbed Showboat that has been put to use in a campaign targeting a telecommunications provider in the Middle East since at least mid-2022. "Showboat is a modular post-exploitation framework designed for Linux systems, capable of spawning a remote shell, transferring files, and functioning as a […]
- This week starts small. A token leaks. A bad package slips in. A login trick works. An old tool shows up again. At first, it feels like the usual mess. Then you see the pattern: attackers are not always breaking in. They are using the parts we already trust. That is what makes it worrying. […]
- Microsoft has disclosed that a privilege escalation and a denial-of-service flaw in Defender has come under active exploitation in the wild. The former, tracked as CVE-2026-41091, is rated 7.8 on the CVSS scoring system. Successful exploitation of the flaw could allow an attacker to gain SYSTEM privileges. "Improper link resolution before file access ('link following') […]
- Consider a cached access key on a single Windows machine. It got there the way most cached credentials do – a user logged in, and the key stored itself automatically. Standard AWS behavior. No one misconfigured anything or violated a policy. Yet that single key, which was easily accessible to a minor-league attacker, could have […]
- Cybersecurity researchers have disclosed details of a vulnerability in the Linux kernel that remained undetected for nine years. The vulnerability, tracked as CVE-2026-46333 (CVSS score: 5.5), is a case of improper privilege management that could permit an unprivileged local user to disclose sensitive files and execute arbitrary commands as root on default installations of several […]
- GitHub on Wednesday officially confirmed that the breach of its internal repositories was the result of a compromise of an employee device involving a poisoned version of the Nx Console Microsoft Visual Studio Code (VS Code) extension. The development comes as the Nx team revealed that the extension, nrwl.angular-console, was breached after one of its […]
- Drupal has released security updates for a "highly critical" security vulnerability in Drupal Core that could be exploited by attackers to achieve remote code execution, privilege escalation, or information disclosure. The vulnerability, now tracked as CVE-2026-9082, carries a CVSS score of 6.5 out of 10.0, per CVE.org. Drupal said the vulnerability resides in a database […]
- Microsoft has unveiled two new open-source tools called RAMPART and Clarity to assist developers in better testing the security of artificial intelligence (AI) agents. RAMPART, short for Risk Assessment and Measurement Platform for Agentic Red Teaming, functions as a Pytest-native safety and security testing framework for writing and running safety and security tests for AI […]
- Microsoft on Tuesday said it disrupted a malware-signing-as-a-service (MSaaS) operation that weaponized the company's Artifact Signing system to deliver malicious code and conduct ransomware and other attacks, compromising thousands of machines and networks across the world. The tech giant attributed the activity to a threat actor it calls Fox Tempest, which it said offered the […]
- Cybersecurity researchers have flagged fresh activity from a China-aligned threat actor known as Webworm in 2025, deploying custom backdoors that employ Discord and Microsoft Graph API for command-and-control (C2 or C&C) communications. Webworm, first publicly documented by Broadcom-owned Symantec in September 2022, is assessed to be active since at least 2022, targeting government agencies
- New Industry Data Just Released Suggests Not. On May 19th, 2026, Orchid Security released the results of our Identity Gap: Snapshot 2026. Among the findings, "identity dark matter" (the unseen, unmanaged elements of identity) now overshadows the visible elements 57% vs. 43%. And it couldn't have occurred at a worse time, with enterprises embracing Agent […]
- GitHub on Tuesday said it's investigating unauthorized access to its internal repositories after the notorious threat actor known as TeamPCP listed the platform's source code and internal organizations for sale on a cybercrime forum. "While we currently have no evidence of impact to customer information stored outside of GitHub's internal repositories (such as our customers' […]
- AI-generated lookalike domains are now embedded inside the third-party scripts running on your web properties. Here's why your current stack can't see them, and what detection actually requires. Download the CISO Expert Guide to Typosquatting in the AI Era → TL;DR Typosquatting is no longer a user problem. Attackers now embed lookalike domains inside legitimate […]
- Microsoft on Tuesday released a mitigation for a BitLocker bypass vulnerability named YellowKey following its public disclosure last week. The zero-day flaw, now tracked as CVE-2026-45585, carries a CVSS score of 6.8. It has been described as a BitLocker security feature bypass. "Microsoft is aware of a security feature bypass vulnerability in Windows publicly referred […]
SANS Internet Storm Center…
- I found a Node.js stealer that looked pretty well obfuscated. The file was not running out-of-the-box because it was uploaded on VT as âextracted-decoded.jsâ (and reformated). The SHA256 is 049300aa5dd774d6c984779a0570f59610399c71864b5d5c2605906db46ddeb9[1]. It did not run properly in a sandbox so only a static analysis was performed.
- (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
- Recently, Rob wrote about a tool, Proxifier, that can intercept requests from specific processes. Proxifier is available for Windows, macOS, and Android. But I have not seen a generic Linux option yet. The advantage of a tool like Proxifier is the ability to target specific software. For debugging, reverse engineering, and similar tasks, selecting a […]
- (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
- ISC Stormcast For Wednesday, May 20th, 2026 https://isc.sans.edu/podcastdetail/9938, (Wed, May 20th)(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
- (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
- Since the last update, the TeamPCP supply chain campaign produced its loudest stretch since the March Trivy disclosure: an officially confirmed Checkmarx Jenkins plugin compromise and a new self-spreading Mini Shai-Hulud worm across npm and PyPI.
- 
 
 :root {
 –isc-maroon: #7a1f1f;
 –isc-maroon-dark: #5e1717;
 –isc-link: #0066cc;
 –isc-text: #1a1a1a;
 –isc-muted: #555;
 –isc-rule: #d0d0d0;
 –isc-code-bg: #f4f4f4;
 –isc-code-text: #c0392b;
 –isc-block-bg: #1e1e1e;
 –isc-block-text: #e6e6e6;
 –isc-callout-bg: #fafafa;
 –isc-table-header: #ececec;
 }
- (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
- Besides serving as a place where Microsoft Outlook places suspected spam, the Outlook Junk folder has one additional function that can be quite helpful when it comes to identifying malicious messages. Any e-mail placed in this folder is stripped of all formatting, and destinations of all links included in the message become visible to the […]
Cybersecurity Avast…
- A call saying someone you love has been arrested and needs money ASAP can feel so real that you act before you think. Learn how bail bond scams work and what to watch for to help protect you and your family from falling for the scheme.
- Latest news We launched a new Avast One experience in 2026. Discover what’s new, see how it compares to the previous version, and learn how it makes your digital life simpler and more secure. In the ever-evolving landscape of the digital world, safeguarding your online presence has become more a necessity than a choice. […]
- If you've ever mentioned something in passing and then seen an ad for it shortly after, you're not imagining things. Learn how ads can sometimes follow you from real life to your screen, and how secure browsers with built-in ad blockers can help you take back control of what you see online.
- Spring break scams are out to ruin your vacation, but they don't have to. With a little awareness and Avast Free Antivirus protecting your devices, you can hit the beach without handing criminals an opening.
- You just sold a stack of old books for $100 on Facebook Marketplace. The buyer seemed eager, messaged instantly, and offered to pay extra. Sounds too good to be true? It probably is. Learn how to spot fake buyers before you lose both your money and your stuff.
- Scammers are using deepfake technology to replicate your child's voice in a kidnapping hoax, catfish with AI-generated video dates, and impersonate executives to steal millions. Learn how to spot deepfake fraud, and use Avast Deepfake Guard to help verify what's real before it's too late.
- Adoption fraud can blindside even the most prepared families, especially when emotions run high. Understanding common adoption scams and how to stay safe can help you move forward with more peace of mind.
- Facebook may feel like a safe place to connect, but scammers are increasingly using its ads, posts, and messages to deceive users. Here’s how cybercriminals are turning your feed into a gateway for fraud and what you can do to stay protected.
- If someone is blackmailing you with private photos or threats, do not pay. We know it's scary, but you don't need to comply. Learn how to handle sextortion threats, and discover how Avast can help secure your privacy.
- How a simple “I found your photo” message can quietly take over your account
Cybersecurity Kaspersky…
- Cybercriminals using ASCII art to create pseudographics QR codes with embedded phishing links.
- A cheap Android TV box promising free subscriptions can easily become the backbone for cybercriminal botnets and proxy servers. We break down how these streaming boxes lease out your IP address, and how to choose a device that’s secure.
- Key methods for cutting off AI access to an organization’s core IT assets.
- How can family subscriptions turn into a cyberthreat? What kind of phishing emails are scammers sending to subscribers? And most importantly, how do you use these services safely? We cover all this and more in this post.
- How and why Kaspersky’s Product Security Team utilizes Kaspersky Container Security.
- An analysis of attacks on Ollama, LM Studio, AutoGPT, and LangServe servers, and recommendations on protecting your organization from the LLMjacking threat.
- The evolution of correlation rules in the Kaspersky Unified Monitoring and analysis SIEM system.
- Using just a powerful graphics card, hackers can crack 60% of real user passwords in less than an hour. Even more alarming, 48% of passwords take less than a minute to compromise! Read our report to learn about the methods attackers use, the common password patterns folks resort to, and what you can do to […]
- The VoidStealer malware employs a new technique to circumvent Chrome’s App-Bound Encryption mechanism, gaining access to session cookies and other sensitive user data.
- Kaspersky experts have detected a supply chain attack using the popular DAEMON Tools software.
We Live Security…
- ESET researchers describe new tools and techniques that the Webworm APT group recently added to its arsenal
- A complete decoupling from US technology is neither realistic nor necessary, but the changing environment does require nations and companies to reassess their relationships and dependencies
- Conflict is a boon for opportunistic fraudsters. Look out for their ploys.
- ESET researchers uncovered new activities attributed to FrostyNeighbor, updating its compromise chain to support the group’s continual cyberespionage operations
- Smart glasses allow anyone to track and record the world around them. That could put your data and the privacy of those nearby at risk.
- ESET researchers uncovered fraudulent apps on Google Play that claim to provide the call history “for any number” and had been downloaded more than seven million times before being taken down
- How come it’s still possible to ‘secure’ an online account with a six-digit string?
- ESET researchers have investigated an ongoing attack by the ScarCruft APT group that targets the Yanbian region via backdoor-laced Windows and Android games
- Warnings about helpdesk impersonation scams and Iran-linked hackers targeting critical sectors in the US, plus the most damaging scams of 2025 – here's some of what made the headlines this month
- A breach claims the systems as well as the confidence that was, in retrospect, a major vulnerability
- ESET Research has discovered a new China-aligned APT group that we’ve named GopherWhisper, which targets Mongolian governmental institutions
- ESET researchers discover another iteration of NGate malware, this time possibly developed with the assistance of AI
- An attack is what you see, but a business operation is what you’re up against
- Ignoring a real breach notification invites risk, but falling for a bogus one could be even worse. Stop reacting on autopilot.
- Your biggest risk may be a vendor you trust. How can SMBs map their third-party blind spots and build operational resilience?
- If you’ve been a victim of fraud, you’re likely already a lead on a ‘sucker list’ – and if you’re not careful, your ordeal may be about to get worse.
- Threat actors are using AI to supercharge tried-and-tested TTPs. When attacks move this fast, cyber-defenders need to rethink their own strategy.
- Fraudsters often target the accounts of the deceased or their grieving relatives. Here’s how to keep the scammers at bay.
- The past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization needs a well-thought-out cyber-resilience plan
- This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations haven't caught up with