
Third suspect detained on suspicion of planning an attack in northeastern Poland
WARSAW, Poland — Polish security services have detained a 19-year-old man suspected of planning a terrorist attack, marking the third arrest in an ongoing investigation in the northeastern city of Olsztyn, a government official said Thursday.
The Internal Security Agency said the suspect, along with two others previously arrested, had gathered extensive materials related to firearms use, combat tactics, and explosive devices. Prosecutors allege the group trained at shooting ranges and conducted paramilitary-style drills.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Forbes
an hour ago
- Forbes
How Crime-As-A-Service Turned Hacking Into A Subscription Business
Recent cyberattacks on major UK retailers like Marks and Spencer cost hundreds of millions, ... More revealing how criminals now bypass advanced security systems by targeting employees instead of technology. A number of devastating and widely reported cyber attacks against UK retailers in recent weeks have once again exposed the fact that the impact of cybercrime on our lives is growing. As of writing, Marks and Spencer hasn't processed online orders for several weeks, following an attack in April estimated to have cost it $400 million. And the Co-Op group of over 2,500 stores is recovering from an attack in which customer data was stolen, and shelves were left bare. There are a few reasons retailers are often easy prey for cybercriminals. They handle lots of sensitive customer data, and they're very sensitive to supply chain disruption, meaning their operations can be brought to a costly halt by disrupting suppliers. On top of that, their infrastructure sprawls across online retail, mobile apps, and the point-of-sale terminals, tills and tablets of bricks 'n' mortar, giving criminals lots of potential ways in. With politicians raising fears that the escalation of this activity could result in serious threats to the food supply chain, it's becoming urgent to understand the factors behind the rise in these attacks. One thing that's becoming increasingly clear is that cybersecurity is no longer simply about making sure IT departments keep our firewalls and anti-malware up-to-date. I believe that these attacks tell us that cybersecurity is becoming less about technology and more about people. And this means that the way we defend ourselves has to change, too. Not too long ago, at least a small amount of technical know-how was needed by anyone who wanted to launch a cyberattack and disrupt the operations of a business. Today, though, an underground economy exists where anyone with the funds can access tools and expertise that can bring businesses to the ground. Referred to by security experts as crime-as-a-service, this involves the developers of hacker tools and apps charging via a subscription model, like any other software developer. Effectively, this means that just about anyone sitting behind a VPN can carry out a crime anonymously anywhere in the world. It's a 'democratization' of cybercrime. The motivation is usually money. Two of the most common attacks are ransomware attacks, where data is encrypted and a ransom is paid to have it returned, and denial-of-service attacks, which flood systems with data, causing them to stop working properly. The increasing accessibility of these tools is a factor in the growing number of attacks. The hacker group suspected of carrying out the Marks and Spencer attack is reported to have used a CaaS platform known as DragonForce. But another factor is a change in strategy. Increasingly, rather than targeting technology, criminals are striking directly at the weakest link in the cybersecurity chain, which is usually us humans. Although the details haven't been released and investigations are still ongoing, it's strongly suspected that the Marks and Spencer cyber attack was carried out through social engineering. With modern cloud security infrastructure being relatively robust, humans, who can be lazy, forgetful and tired, are generally the weakest link. Why would a hacker spend the vast amount of computing power and resources it would take to brute-force into a system and steal or encrypt data when they can just trick or bribe a human into letting them in? Surveys suggest that email and social media phishing were a factor in more than half of 2024's ransomware attacks and that 67% of people believe the rise of generative AI has increased their fear of ransomware. As well as human incompetence and our trusting nature, cybercriminals are increasingly exploiting our greed. In fact, 53 percent of organizations reported cybercrime by insiders in 2024. One high-profile recent example is the $20 million attempted extortion of cryptocurrency exchange Coinbase, where support staff are accused of taking bribes in exchange for giving criminals access. Criminals believe that retailers are big, rich targets that move slowly to respond to threats and are likely to comply with ransom demands rather than suffer business disruption. By targeting people with permission to access their systems, then all that IT spending on cyber security infrastructure—firewalls, secure email gateways, network security, access control, security tools—becomes irrelevant, and their criminal activities become a lot simpler. So, how can businesses, and we as professionals, employees and individuals, most effectively respond to this change? The first step could be to think about adopting a more human-centric security strategy. This means developing a culture of cyber-awareness that's active at all levels, from the boardroom to the shop floor. By understanding what criminals look for, how they try to gain access, and what's at stake if they succeed, everyone's awareness increases. Particular attention should be paid to ensuring everyone understands the growing threat of generative AI-powered deepfake crime. When it comes to this, as well as understanding the wider picture of where threats might exist in an organization, it's human skills that will be most valuable. This means that effectively communicating the importance of cyber vigilance, achieving buy-in, and understanding what makes us vulnerable to bribery and corruption are critical skills in the cybersecurity toolbox. Critically, when implementing these changes, the focus should be on limiting opportunities for threat actors to cause damage rather than monitoring the activities of individuals in a way that damages trust. Balancing this also requires skilled human judgment. Make no mistake, with 43% of UK companies reporting an attempted cyber attack last year, the threat is greater than ever, and the penalties for making mistakes are severe. But by switching to understanding, predicting and improving the behavior of humans rather than just technology, all businesses can reduce their chances of becoming victims.


CBS News
7 hours ago
- CBS News
Suspect arrested in San Jose hit-and-run that left motorcyclist hospitalized, police say
A suspect was arrested two days after a motorcyclist was hospitalized in a hit-and-run in San Jose, police said. The San Jose Police Department said it responded to a crash just before 6 a.m. on June 9 in the area of Fruitdale Avenue near Southwest Expressway. Police said a motorcyclist was riding west on Fruitdale Avenue when a black sedan traveling south on Corlista Drive made an illegal U-turn into the motorcyclist's path. The man riding the motorcycle suffered major injuries and was rushed to the hospital, police said. Police said the driver of the black sedan took off from the scene before they arrived. But the suspect was identified as 35-year-old Misael Lara-Moya of San Jose, police said. He was arrested on Wednesday.


Fox News
8 hours ago
- Fox News
Man who pledged loyalty to ISIS plotted attack on college football stadium, court records say
An Oklahoma man who pledged his loyalty to the Islamic State wanted to carry out a terrorist attack on the Oklahoma Sooners' football stadium in 2023, court records show. Landon Kyle Swinford said he and a source who turned out to be an undercover officer noticed flaws in the stadium's security situation and began scouting out the venue, according to the documents. Swinford "had looked at barricades and security and thought the stadium could be a potential target for an attack," the records say. Swinford and the undercover officer were in communication from May 2023 until that October, and Swinford told the undercover officer he intended to travel to Tunisia to fight for the Islamic State. Swinford said he "sadly" would have carried out the attack had he been able to afford it. Swinford also had an interest in attacking New Orleans, which was the site of a terror attack on New Year's Day. Swinford allegedly wanted to carry out an attack during Mardi Gras at the voodoo temple. Swinford pleaded guilty to charges of child pornography possession and transmitting a threat in interstate commerce. He's awaiting sentencing for those charges. The latest documents tying Swinford to ISIS communication were released Monday. Court records say Swinford told FBI officials he posted to influence others to bomb local synagogues and inspire others on behalf of ISIS. The Sooners have played at Gaylord Family — Oklahoma Memorial Stadium since 1923, and the venue was renovated ahead of the 2019 season. The stadium seats 80,126, but its largest attendance reached over 88,000 in 2017. Follow Fox News Digital's sports coverage on X, and subscribe to the Fox News Sports Huddle newsletter.