This week, Poland's National Centre for Nuclear Research (NCBJ) He reported that his computer infrastructure was the subject of an attempt at intrusion. According to the institution itself, the defenses detected the maneuver in time and any alteration of critical systems was avoided.
In the official communication, the centre stressed that its protection mechanisms and internal protocols for early response were decisive: thanks to these, IT teams were able to block unauthorized access and secure the resources being attacked. The organization ensures that there was no commitment to the integrity of its systems and that essential operations continued without interruption.

The NCBJ is the main Polish institution dedicated to nuclear research, with activities covering nuclear physics, reactor technology, particle physics and radiation applications. In addition, it provides technical support to the country & apos; s nuclear road map and manages the MARIA reactor, which is used for research, neutron generation and medical isotope production; it is not an installation to produce electricity. For institutional context on the reactor, the public record available in open sources, such as Wikipedia.
The director of the centre, Professor Jakub Kupecki, has confirmed that the incident did not affect the operation of the MARIA reactor, which continues to operate normally. It also indicated that the competent national authorities have been notified and that an internal investigation has been opened to determine the scope and vector of the intrusion attempt, while the security teams remain on alert.
Although NCBJ did not publicly attribute the attack to any particular actor, international media such as Reuters they reported that preliminary investigations by the Polish authorities had identified indicators that point to Iran as possible origin. However, researchers warn that this trail can be deliberately misleading: in cyberspace, false flags are an increasingly used technique to confuse powers.
This episode comes in a tense geopolitical environment. At the beginning of the month, Polish Defense Minister Wladyslaw Kosiniak-Kamysz publicly stated that Poland would not participate in United States-led military operations against Iran, a position that can influence the diplomatic and security dimension of any cyber incident with alleged state connotation, according to the agency's coverage Anadolu.
Poland is not alien to high-impact cyber attacks. In January, intrusions were detected against parts of the power network, affecting multiple sites of distributed energy resources and delivery systems for heat and energy facilities, and Russian groups have been identified in several recent incidents. A report from the International Centre for Counter-Terrorism (ICT) It documents dozens of incidents attributed to Russian actors between 2025 and early 2026, placing Poland among the most active targets of these attacks.
The nature of the target - a nuclear research institute - shoots alarms and debates beyond the technical event itself. Although there was no operational involvement in this case, any attempt to compromise systems linked to nuclear installations requires a reminder that computer security is also public health and physical safety. International organizations such as the IAEA (IAEA) For years, they have been stressing the need for a comprehensive approach to protect both industrial control systems and the administrative support network.
In practice, attacks on critical scientific and infrastructure organizations often seek access to sensitive data, espionage or, in some cases, sabotage. The existence of early detection and well-trained responses - such as those described by NCBJ - is the difference between a contained incident and a crisis that may require national or international intervention. Resilience is not only technology: it is also processes, staff training and coordination with external authorities.
The episode in Warsaw highlights another challenge: attribution. In the current cyberconflict, conclusively demonstrating who is behind an attack requires time, international cooperation and detailed forensic analysis. Many State and non-State actors know and exploit tools to hide their trail, from the use of third-party infrastructure to the use of techniques that mimic tactics from other groups to divert research.

For institutions working with nuclear materials or facilities, the lesson is clear: continued investment in detection, network segmentation, verified backup and incident response exercises is not optional. It is also to maintain transparent communication channels with regulators and the public, because accurate and timely communication mitigates disinformation and avoids unnecessary panics.
As research in Poland progresses, it is worth noting how the partnerships between national agencies and international partners are developed. Recent incidents in the country on energy infrastructure and the attention they have received in specialized reports stress that the region is at the point of view of sophisticated actors. National security in the digital age requires both preventive intelligence and operational ability to react in minutes, not days.
In short, the frustrated attempt against NCBJ is a wake-up call. There was no apparent damage, but it underlines the inherent vulnerability of the connected systems and the need to maintain a high guard. If you want to deepen the official note of the centre, international coverage or analysis of the activity of State actors in the region, you can consult the links cited at the beginning of the article.
Related
More news on the same subject.

Safety alert Drug critical vulnerability of SQL injection in PostgreSQL requires immediate update
Drucal has published safety updates for a vulnerability qualified as "highly critical" which affects Drumal Core and allows an attacker to achieve arbitrary SQL injection in sit...

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...