• +48 786 088 383
  • 94-102 Łódź, Nowe Sady 4 lok.14

What do the numbers say? 3 takeaways from the CERT Polska

What do the numbers say? 3 takeaways from the CERT Polska / CSIRT NASK report for December 2025

Numbers are not there to scare. They are there to help organizations prepare better

In cybersecurity, it is easy to focus on single incidents, high-profile campaigns or new attack techniques. However, it is sometimes worth stepping back and looking at the numbers. Data shows best which threats are not temporary trends, but a permanent part of the risk landscape. The CERT Polska / CSIRT NASK report for December 2025 offers exactly that kind of perspective.

In one month alone, the report recorded 51.8 thousand reports and 24.7 thousand incidents. The yearly figures were even stronger. In 2025, there were 658.3 thousand reports and 260.8 thousand incidents. This was a clear year-on-year increase. These numbers show one thing very clearly. The scale of threats is not shrinking. Moreover, many of those threats are still highly predictable. For organizations, this is an important signal. It means they do not always need to fight a completely new type of attack. Very often, they need to handle well the threats that have been working against users and companies for a long time.

Takeaway one: phishing remains the main problem

The strongest message from the report is simple. Phishing and online fraud still dominate. In December 2025 alone, 7.3 thousand phishing incidents were recorded. This shows that fake websites, spoofed messages and credential theft attempts are not a side issue. They are a permanent part of today’s cyber threat landscape.

For organizations, this means they need to build good user habits and strengthen the protection of email, browsers and account access. Technical knowledge alone is not enough if an employee still trusts every link or attachment. That is why phishing should not be treated as an occasional topic. It should be treated as an area of continuous education, control and monitoring.

Takeaway two: the scale of malicious domains proves that access control matters

The second key takeaway is the huge number of dangerous web addresses. In 2025, 244.3 thousand domains were added to the national warning list. In December alone, the number reached 23.5 thousand. This scale cannot be ignored. In practice, it means that a user may land on a malicious site not through a sophisticated attack, but through a simple click.

That is why access control mechanisms are so important. This includes traffic filtering, DNS and URL policies, and fast reporting of suspicious domains. The earlier an organization can block access to a dangerous site, the lower the risk of data loss, credential theft or further incident development. This is one of those areas where simple protection decisions can have a major impact on real security.

Takeaway three: SMS is still an effective attack channel

The report also shows that smishing and the SMS channel remain a real threat vector. In 2025, 295.2 thousand reports of suspicious text messages were registered. Based on identified patterns, a total of 1.9 million SMS messages were blocked. These figures clearly show the scale of the problem.

For companies, this means they need clear response rules. Users should know what to do with a suspicious link sent by text message. They should also know where to report it and how quickly to react. In practice, one simple process helps a lot. There should be one reporting channel and one clear rule: links sent by SMS should never be treated as trustworthy by default. In a working environment, especially one with many mobile devices, this is an important part of building operational resilience.

Data should help, not frighten

The most important conclusion from these figures is not that “things are getting worse.” A more useful conclusion is that we already know where the main sources of risk are. They are phishing. They are malicious domains. They are suspicious text messages. These areas can be monitored, reduced and managed through good procedures, access protection and user awareness.

That is why reports like this should be read calmly and practically. Their purpose is not to create fear. Their purpose is to improve data protection, organize internal processes and build good security habits. If you want to explore more analyses and practical threat scenarios, visit the Knowledge section on the ADQ website. It is a good place to turn numbers into real security decisions.

A stylized eagle appears on a blue cyber-themed background with four large numbers referring to cybersecurity reports and incidents; the graphic illustrates data from the CERT Polska / CSIRT NASK report.

    Comments are closed

    Nasz adres

    Nowe Sady 4 lok.14
    94-102 Łódź

    Zadzwoń
    do nas

    +48 786 088 383

    Napisz do nas

    info@adq.com.pl
    © 2026 ADQ Technologies | Wszystkie prawa zastrzeżone