cybersecwaw.hashnode.devLove, Lies, and Attack VectorsFebruary 13th is not just Valentine’s Day Eve.It’s also one of the most active days of the year for online scammers. Dating apps spike. Emotions run high. Critical thinking drops.From a cybersecurity perspective, this combination is… dangerous. As a ...Feb 7·6 min read
cybersecwaw.hashnode.devMobile Payment Fraud Escalates: In-Depth Look at BLIK Scams and Global PatternsIn a recent case highlighted by cybersecurity expert Piotr Brogowski on LinkedIn, Polish authorities dismantled a large, organized cybercrime group responsible for one of the most extensive social-engineering-based fraud operations in recent years. T...Feb 6·4 min read
cybersecwaw.hashnode.devUnderstanding QR Code Security Risks in Public InfrastructureMunicipal services increasingly rely on QR codes to provide fast, frictionless access to information. A recent example is Zarząd Dróg Miejskich (Board of City Roads) placing QR codes on poles and public infrastructure that redirect users to a map sho...Feb 3·5 min read
cybersecwaw.hashnode.devUrgent Zero-Day Security Breach Hits Before Company ReactionA serious cybersecurity incident has recently come to light involving a large Polish flower and agricultural wholesale company, highlighting once again how dangerous unpatched vulnerabilities can be when attackers act faster than software providers. ...Feb 1·3 min read
cybersecwaw.hashnode.devUnderstanding the Cyber Attack on Poland's Energy Infrastructure and Its ImpactAt the end of December 2025, Poland experienced one of the most serious cyberattacks on its critical energy infrastructure in years. According to the newly released incident report by CERT Polska, the coordinated operation targeted renewable energy i...Jan 31·3 min read