We are pleased to share that ACIG, recently indexed in Scopus, has been ranked Q3 in the latest SCImago Journal Rank evaluation. Its current score can be tracked live via the new widget on our website. This result reflects the continued development of the journal under the leadership of Editor-in-Chief, Prof. @agasztold. The ranking confirms the journal’s growing international visibility and academic quality.
We would like to sincerely thank our authors, reviewers, editorial board members, and readers for their trust, engagement, and valuable contribution to this success.
Read the Online First articles now shaping vol. 5, no. 1, and discover the latest contributions in the field of applied cybersecurity: https://www.acigjournal.com/.

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute

Living in an interconnected world does not entail exclusively positive developments, like the ability to stay in touch with others or broadening of the scope of work opportunities. It is no secret that sometimes digital technologies become tools of violence. This #cyberFriday we encourage you to look at the issue from the point of view analysed by Aaron Brantly in his paper “Targeting the Weak: Exploring Transnational Digital Repression.” The article examines the available data on cyberattacks against civil-society activists and minorities living in a diaspora carried out by regimes of their authoritarian states of origin.
Available on our website: https://www.acigjournal.com/Targeting-the-Weak-Exploring-Transnational-Digital-Repression,203788,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#humanRights #cybersecurity #sovereignty #repression

❗ "Ministerstwo Cyfryzacji wspólnie z Naukową i Akademicką Siecią Komputerową – Państwowym Instytutem Badawczym zakończyło pracę nad pierwszym polskim, bezpłatnym narzędziem do bezpiecznej komunikacji: Komunikator mSzyfr, który przeznaczony jest dla:

Podmiotów administracji publicznej;
Podmiotów krajowego systemu cyberbezpieczeństwa (zarejestrowanych w wykazie podmiotów kluczowych i ważnych);
Innych podmiotów, po wyrażeniu zgody przez Ministra Cyfryzacji.
Komunikator mSzyfr, jest pierwszym bezpiecznym komunikatorem będący pod w pełni pod jurysdykcja Polski. Serwery obsługujące komunikator mSzyfr, znajdują się na terytorium Polski i administrowane są przez osoby posiadające stosowe poświadczenie bezpieczeństwa osobowego"

P.S. Po prostu wdrożono #Matrix
https://chat.komunikator.narodowy.gov.pl/

Więcej:
https://www.gov.pl/web/baza-wiedzy/komunikator-mszyfr

#NASK #MinCyfry #MinisterstwoCufryzacji #Cyfra #komunikator

mSzyfr

SECURE 2026 i 30 lat CERT Polska

Trzy dekady pracy na rzecz bezpieczeństwa internetu i zagrożenia, których nie możemy ignorować. Opowiemy o nich na 29. konferencji SECURE, która odbędzie się 8 kwietnia 2026 roku w Warszawie. Jednym z najważniejszych punktów programu będzie premiera raportu o krajobrazie zagrożeń w polskiej cyberprzestrzeni w 2025 roku. Tegoroczna edycja wydarzenia ma...

Sekurak

SECURE 2026 i 30 lat CERT Polska

Trzy dekady pracy na rzecz bezpieczeństwa internetu i zagrożenia, których nie możemy ignorować. Opowiemy o nich na 29. konferencji SECURE, która odbędzie się 8 kwietnia 2026 roku w Warszawie. Jednym z najważniejszych punktów programu będzie premiera raportu o krajobrazie zagrożeń w polskiej cyberprzestrzeni w 2025 roku. Tegoroczna edycja wydarzenia ma...

#WBiegu #Cert #Konferencja #Nask #Patronat #Secure

https://sekurak.pl/secure-2026-i-30-lat-cert-polska/

SECURE 2026 i 30 lat CERT Polska

Trzy dekady pracy na rzecz bezpieczeństwa internetu i zagrożenia, których nie możemy ignorować. Opowiemy o nich na 29. konferencji SECURE, która odbędzie się 8 kwietnia 2026 roku w Warszawie. Jednym z najważniejszych punktów programu będzie premiera raportu o krajobrazie zagrożeń w polskiej cyberprzestrzeni w 2025 roku. Tegoroczna edycja wydarzenia ma...

Sekurak

One of the chief concerns related to the growing adoption of AI-based solutions is their impact on human work. Currently, most attempts at quantifying it analyse the character of different professions using lists of broadly defined, general tasks. Bin Mai, Marc Walker, and David Sweeney notice the need for a much more fine-grained way of tracking how AI adoption intertwines with human action. In their newly published paper “Of (AI) Machine and Human (Labour): An Integrated Nexus of Work Operating System Architecture for Orchestrating Human–AI Collaborations” they provide a theoretical framework for development of software infrastructure that could track the influence of AI on the basic professional activities – so called atomic tasks.
Read it online on ACIG website: https://www.acigjournal.com/Of-AI-Machine-and-Human-Labour-An-Integrated-Nexus-of-Work-Operating-System-Architecture,217714,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#AI #work #labour

This week’s #cyberFriday we would like to encourage you to read an article from our archive. It provides an analysis of the way in which modern communication technologies have enabled the proliferation of disinformation, both organically arising and intentionally manufactured.
“One of the core changes at the heart of the formation of today’s information environment has been the shift in emphasis from a supposed ‘information age’ towards a ‘post-truth era’. … Indeed, while previously the Internet was itself seen as a ‘liberation technology’, enabling networked individuals to self-organise in a struggle for democracy and freedom, currently the attention has shifted to the opposite end of the spectrum, namely manipulation, disinformation, and information warfare.”

“Post-Truth and Information Warfare in their Technological Context” by Ignas Kalpokas – now even more relevant, available in open access on our website: https://www.acigjournal.com/Post-Truth-and-Information-Warfare-in-their-Technological-Context,190407,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute

#postTruth #disinformation #informationWarfare #generativeAI

Increasing dependence of our daily lives on new communication technologies on the one hand, and the ever-increasing prevalence of attacks against digital infrastructure on the other translate to a growing demand for #cybersecurity services. But to what extent has the global financial market been reacting to this reality?
This #cyberFriday we bring you back the paper by Grzegorz Przekota, “Investment in Cybersecurity Companies in Times of Political and Economic Instability.” Read the analysis of how a war and a global health crisis did impact the financial standing of cybersecurity companies.
Available on our website: https://www.acigjournal.com/Investment-in-Cybersecurity-Companies-in-Times-of-Political-and-Economic-Instability,190342,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#stock #investments

🚨 New article now available online!

One of the negative consequences of recent rapid development in the field of #LLM technology is that every component of automated troll farms can now be run on consumer-grade hardware. As @LukaszOlejnik notes in the newly published paper “Artificial Intelligence Propaganda Factories with Language Models,” this puts conducting AI-driven influence operations within the reach of multiple actors. #AI propaganda enables numerous smaller perpetrators to run their own campaigns and multiplies the capacities of state-level and corporate entities.
However, the presented analysis suggests that the very consistency of AI propaganda bots might yield itself to statistical detection. Such a marker could serve as a signal for platforms and institutions to disrupt those campaigns.
Read the whole paper: https://www.acigjournal.com/Artificial-Intelligence-Propaganda-Factories-with-Language-Models,215416,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#propaganda #disinformation

On December 29th of the previous year Polish energy infrastructure suffered a coordinated cyberattack. According to the recently published report by CERT Polska (English version available at: https://cert.pl/uploads/docs/CERT_Polska_Energy_Sector_Incident_Report_2025.pdf), the perpetuators had been preparing the security breach for months and had one single objective of causing as much damage as possible. The attackers’ communication patterns were found to be characteristic of a malicious activity cluster known as “Static Tundra,” “Berserk Bear,” “Ghost Blizzard,” and “Dragonfly.” As the report notes, “this is the first publicly described destructive activity attributed to this cluster.”

We find this #cyberFriday to be an appropriate moment to remind you of a paper from our 2023 special issue on the Russian-Ukrainian war, “Cyberwarfare against Critical Infrastructures: Russia and Iran in the Gray Zone” by Guillermo Lopez-Rodriguez, Irais Moreno-Lopez, and José-Carlos Hernández-Gutiérrez. Read it online on our website: https://www.acigjournal.com/Cyberwarfare-against-Critical-Infrastructures-Russia-and-Iran-in-the-Gray-Zone,184301,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute.

#cybersecurity #cyberWarfare #cert #infrastructure