• Advertising
  • Disclaimer
  • Copy Right
  • Contact us
  • About us
WTM News
  • Home
  • entertainment
    • All
    • games
    • movies
    • music
    • sports
    '1899': The creators assure that they are already working on the next seasons and a possible ending

    ‘1899’: The creators assure that they are already working on the next seasons and a possible ending

    Las películas españolas que más esperamos en 2023

    Las películas españolas que más esperamos en 2023

    From 'Appointment in St. Louis' to 'Fifteen Days of Pleasure': 10 Great Christmas Musicals in Film History

    From ‘Appointment in St. Louis’ to ‘Fifteen Days of Pleasure’: 10 Great Christmas Musicals in Film History

    'Dreamland' review, by Jason Momoa on Netflix

    ‘Dreamland’ review, by Jason Momoa on Netflix

    Review, 'Kings vs. Santa': Family Christmas spirit with a thug twist

    Review, ‘Kings vs. Santa’: Family Christmas spirit with a thug twist

    release date, cast, synopsis

    release date, cast, synopsis

  • business
    • All
    • startups
    How to Buy Cryptocurrency

    How to Buy Cryptocurrency

    The first retail site in the Middle East

    The first retail site in the Middle East!

    Submit your projects to duty cope professional freelancers!

    Submit your projects to duty cope professional freelancers!

    bitumen 60/70

    Iran Bitumen

    Study Smart: Tips and Tricks to Ace the GED Test

    Study Smart: Tips and Tricks to Ace the GED Test

    Things to Remember When Taking the GED Math Test

    Things to Remember When Taking the GED Math Test

    DutyCope is the newest freelance platform

    Dutycope is the newest freelance platform

    What plans does NASA have to continue working with Russia?

    What plans does NASA have to continue working with Russia?

    Dutycope, the introduction of one of the best freelance sites

    Dutycope, the introduction of one of the best freelance sites

  • Technology
    • All
    • apps
    • gadget
    • mobile
    profesiones tecnológicas tecnología circular

    Circular technology: this is how it will evolve

    Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

    Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

    Roberto Lopez Familia Martínez

    Interview with Roberto López, Corporate CTO Familia Martínez

    Cloudera Data Platform One

    Cloudera Data Platform One, accessible data analytics

    Cloud services to solve complex IT problems

    SAP deploys the first public cloud project at Cepsa

    appian world data fabric

    Appian joins the Low-Code Data Fabric

    Trending Tags

  • lifestyle
    • All
    • foods
    • health
    • travel
    Body Contouring

    Common Types of Body Contouring Methods

    Cyruscrafts decorative handicrafts

    Iranian Decorative Handicrafts

    3 Days in Dubai – Where to Visit in Dubai

    3 Days in Dubai – Where to Visit in Dubai

    Ata Ghotbi and the road to success

    Ata Ghoutbi and the Road to Success

    5 ways to open frozen pipes without damaging the pipe

    5 ways to open frozen pipes without damaging the pipe

    Why is it better not to use toilet paper?

    Why is it better not to use toilet paper?

    Trending Tags

  • Review
    Review of the first part of the fifth season of the Money Heist series

    Review of the first part of the fifth season of the Money Heist series

    Introduction of Solar Ash game

    Introducing and reviewing the interesting game Solar Ash

    Review Huawei WATCH FIT smartwatch

    Review Huawei WATCH FIT smartwatch

  • Videos
No Result
View All Result
  • Home
  • entertainment
    • All
    • games
    • movies
    • music
    • sports
    '1899': The creators assure that they are already working on the next seasons and a possible ending

    ‘1899’: The creators assure that they are already working on the next seasons and a possible ending

    Las películas españolas que más esperamos en 2023

    Las películas españolas que más esperamos en 2023

    From 'Appointment in St. Louis' to 'Fifteen Days of Pleasure': 10 Great Christmas Musicals in Film History

    From ‘Appointment in St. Louis’ to ‘Fifteen Days of Pleasure’: 10 Great Christmas Musicals in Film History

    'Dreamland' review, by Jason Momoa on Netflix

    ‘Dreamland’ review, by Jason Momoa on Netflix

    Review, 'Kings vs. Santa': Family Christmas spirit with a thug twist

    Review, ‘Kings vs. Santa’: Family Christmas spirit with a thug twist

    release date, cast, synopsis

    release date, cast, synopsis

  • business
    • All
    • startups
    How to Buy Cryptocurrency

    How to Buy Cryptocurrency

    The first retail site in the Middle East

    The first retail site in the Middle East!

    Submit your projects to duty cope professional freelancers!

    Submit your projects to duty cope professional freelancers!

    bitumen 60/70

    Iran Bitumen

    Study Smart: Tips and Tricks to Ace the GED Test

    Study Smart: Tips and Tricks to Ace the GED Test

    Things to Remember When Taking the GED Math Test

    Things to Remember When Taking the GED Math Test

    DutyCope is the newest freelance platform

    Dutycope is the newest freelance platform

    What plans does NASA have to continue working with Russia?

    What plans does NASA have to continue working with Russia?

    Dutycope, the introduction of one of the best freelance sites

    Dutycope, the introduction of one of the best freelance sites

  • Technology
    • All
    • apps
    • gadget
    • mobile
    profesiones tecnológicas tecnología circular

    Circular technology: this is how it will evolve

    Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

    Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

    Roberto Lopez Familia Martínez

    Interview with Roberto López, Corporate CTO Familia Martínez

    Cloudera Data Platform One

    Cloudera Data Platform One, accessible data analytics

    Cloud services to solve complex IT problems

    SAP deploys the first public cloud project at Cepsa

    appian world data fabric

    Appian joins the Low-Code Data Fabric

    Trending Tags

  • lifestyle
    • All
    • foods
    • health
    • travel
    Body Contouring

    Common Types of Body Contouring Methods

    Cyruscrafts decorative handicrafts

    Iranian Decorative Handicrafts

    3 Days in Dubai – Where to Visit in Dubai

    3 Days in Dubai – Where to Visit in Dubai

    Ata Ghotbi and the road to success

    Ata Ghoutbi and the Road to Success

    5 ways to open frozen pipes without damaging the pipe

    5 ways to open frozen pipes without damaging the pipe

    Why is it better not to use toilet paper?

    Why is it better not to use toilet paper?

    Trending Tags

  • Review
    Review of the first part of the fifth season of the Money Heist series

    Review of the first part of the fifth season of the Money Heist series

    Introduction of Solar Ash game

    Introducing and reviewing the interesting game Solar Ash

    Review Huawei WATCH FIT smartwatch

    Review Huawei WATCH FIT smartwatch

  • Videos
No Result
View All Result
WTM News
No Result
View All Result
  • Home
  • entertainment
  • business
  • Technology
  • lifestyle
  • Review
  • Videos
Home Technology

Cyber ​​attacks multiply since the invasion of Ukraine and become more frequent, diverse and complex | Technology

News writer by News writer
April 8, 2022
in Technology
7 0
A A
0
Cyber ​​attacks multiply since the invasion of Ukraine and become more frequent, diverse and complex |  Technology

Cyber ​​attacks multiply since the invasion of Ukraine and become

153
SHARES
235
VIEWS
Share on FacebookShare on Twitter

Cyber ​​attacks multiply since the invasion of Ukraine and become more frequent, diverse and complex | Technology
is the headline of the news that the author of WTM News has collected this article. Stay tuned to WTM News to stay up to date with the latest news on this topic. We ask you to follow us on social networks.

A monitor from the US Cyber ​​Threat Intelligence Center shows the degree of exposure of infrastructures to possible computer attacks.
A monitor from the US Cyber ​​Threat Intelligence Center shows the degree of exposure of infrastructures to possible computer attacks.CLIFF-OWEN

Cyber ​​attacks have multiplied and intensified. Up to 39% of companies and 30% of entities have reported weekly digital breaches of their systems, according to the UK Digital Department. It is ratified by the FBI (Federal Bureau of Investigation) in the United States and the European Chamber of Accounts, which concludes in a report: “The community of institutions, bodies and agencies of the EU has not reached a level of cyber preparation commensurate with the threats. The attacks are more frequent, sophisticated and diverse, including all devices and all areas: also the private sector and humanitarian aid NGOs. Companies in the sector corroborate the increase. Ricardo Sanz, director of cybersecurity at Evolutio, assures: “Since the invasion of Ukraine, some companies that have maintained activity with Russia have registered an increase in attacks of 1,000%”.

The Digital Department of the British Government has no doubts: “The new figures show that the frequency of cyber attacks is increasing”. According to data from the public body, a quarter of NGOs have been added to the list of companies and entities that are victims of this activity.

The FBI has joined the warning. As explained by Bryan Vorndran, director of the security division of the US federal entity, to the House Judiciary Committee: “Cases of Russian scanning have increased.” It refers to the programs developed to know the activity of an organization and its weaknesses. According to Vorndran, “Moscow-linked computers have been probing the networks for vulnerabilities to a series of cyberattacks, possibly in the works.” “Scanning activity,” he explained, “is similar to reconnaissance missions, in that cyber actors are trying to see what security systems look like before setting up an attack.”

This Wednesday, the attorney general of the United States Merrick Garland has reported that, with the help of governments, they have removed a Russian malicious program from computer networks around the world. According to Garland, it was a program controlled by Russian intelligence and created to massively infect private computers. “Fortunately, we were able to remove it before it could be used,” Garland said.

Europe is not spared. Unlike. According to the latest report from the EU Chamber of Accounts, “the number of cyber incidents is on the rise [hasta diez veces más que hace cuatro años]” and are becoming more sophisticated: “They usually involve the use of new methods and technologies and can take weeks, if not months, to investigate and recover systems.” The institution points out, as an example, the cyber attack on the European Medicines Agency, where sensitive data was leaked and manipulated “in a way designed to undermine confidence in vaccines.”

The European institution warns that the preparation is not adequate to the level of risk and that this weakness, given the interconnection of community entities and private and public organizations, “can expose several other organizations to cyber threats.” The Chamber of Accounts also concludes that good preventive practices are not always followed, “including some essential controls”, and that the entire digital environment is not covered. According to Bettina Jakobsen, head of audit at the European Court of Auditors, “The EU needs to do more to protect its own authorities.”

increase due to war

Cybersecurity companies agree on the analysis of public bodies and point out that the Russian invasion of Ukraine has been a trigger. The Check Point company has detected an increase in digital attacks to more than 1,500 per week per organization, 39% in Ukrainian entities and 17% in Russia in the days after the start of the war. According to this company, “the trend of cyberattacks directed at NATO countries continues to grow.”

Eusebio Nieva, Check Point’s technical director for Spain and Portugal, explains that, after the war, the increase in attacks is recorded in all areas: “It seems that cybercriminals are increasing their efforts to take advantage of the situation. The trend is visible not only in the two countries involved, but throughout the world. I think they are trying to take advantage of the hype and interest around the war, as they seek to attack organizations that span the public sector as well as non-profit entities or the private sector.”

More information

The trend detected is that war is not only the goal of cyberattacks, but also the excuse. In this sense, Bitdefender Labs has published an investigation into new fraudulent email campaigns with alleged charitable purposes to send financial aid to Ukraine. In the same vein, Check Point points out that “cybercriminals are using lures ranging from official-looking writing to news articles and job postings” to access everything typed on the keyboard (keylogging), steal user credentials and passwords stored in browsers (Credential Harvesting), copy files, screenshots or clipboard data, and even take control of computers.

In this way, not only large companies, such as Iberdrola, which suffered an attack last week, are threatened by cyberattacks. According to the company Avast, 29.25% of global users are at risk of suffering from them. And as the report from the EU Chamber of Accounts explains, they are becoming more sophisticated every day. In this sense, Jakub Kroustek, Director of Research at malware Avast explains: “In the past, malware was often designed to perform a single action. Today, these programs are like Swiss Army knives, capable of more than one intervention and often designed to do more harm.”

According to Ricardo Sanz, head of security for companies at Evolutio, “solidarity is another attack vector and it will be more sophisticated and difficult to detect the more attractive the target is and the more money there is involved.” The basic recommendation is to avoid clicking on the links that come to us by mail or SMS. Sanz explains it with a simple example: “If you meet someone you don’t know on the street, you normally don’t say hello; Well, you don’t have to click on something that comes from an unknown source, an email address or a strange phone number. That is the first step. The second is to pay attention to details, even if they seem to come from entities we know.”

Vulnerable devices have also diversified. According to Sanz, “attacks have adapted and, if people use mobile phones or tablets more, obviously there will be many more attacks against them.” According to the company Proofpoint, mobile malware infection attempts in Europe have grown by 500% since February.

The Police have warned of the proliferation of scams through unknown WhatsApp numbers that pretend to be an acquaintance or a relative who has changed their mobile and asks for money. It is best not to answer, but if there is any doubt, the interlocutor can be challenged with a question or information that only the person they claim to be knows. If the answer is ambiguous or incorrect, the interlocutor has assumed the identity of another person.

The introduction of a double authentication factor (through mobile phones) or biometric elements (such as fingerprints or facial scans) is a general practice in some economic transactions. But among ordinary citizens, preparation is still lacking.

Jesús Cabet, from Persán, pointed out during the first Andalusian Cybersecurity Congress, held at the end of last month: “The problem is the low level of cybersecurity in society. In companies, there are people who normally have a very low level of personal cybersecurity” Sanz agrees: “Not all people are prepared.” According to a Proofpoint survey, 68% of Spanish IT security managers consider human error to be the biggest cyber vulnerability in their organization. These mistakes are clicking malicious links, downloading compromised files, and not having a strong password (not changing or reusing it).

You can write to us [email protected]will follow THE COUNTRY TECHNOLOGY on Facebook Y Twitter and sign up here to receive our weekly newsletter

Exclusive content for subscribers

read without limits

Source: elpais.com

Tags: AttackscomplexcyberdiversefrequentinvasionmultiplyTechnologyUkraine
Previous Post

In the Châteaudun market little is said about the presidential elections in France | International

Next Post

‘Doctor Strange in the Multiverse of Madness’ beats ‘The Batman’ in pre-sale tickets

News writer

News writer

I try to find the best news for you and publish it on WTM News. Follow my articles to become an up-to-date person!

Related Posts

profesiones tecnológicas tecnología circular
Technology

Circular technology: this is how it will evolve

November 23, 2022
Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology
Technology

Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

November 23, 2022
Roberto Lopez Familia Martínez
Technology

Interview with Roberto López, Corporate CTO Familia Martínez

November 23, 2022
Cloudera Data Platform One
Technology

Cloudera Data Platform One, accessible data analytics

November 22, 2022
Cloud services to solve complex IT problems
Technology

SAP deploys the first public cloud project at Cepsa

November 22, 2022
appian world data fabric
Technology

Appian joins the Low-Code Data Fabric

November 22, 2022
Next Post
'Doctor Strange in the Multiverse of Madness' beats 'The Batman' in pre-sale tickets

'Doctor Strange in the Multiverse of Madness' beats 'The Batman' in pre-sale tickets

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Trending
  • Comments
  • Latest
Tesla's new update notifies the driver of tire wear

Tesla’s new update notifies the driver of tire wear

December 16, 2021
'Stranger Things': Jamie Campbell Bower opens up about her secret role for the first time

‘Stranger Things’: Jamie Campbell Bower opens up about her secret role for the first time

May 31, 2022
Introduction of Solar Ash game

Introducing and reviewing the interesting game Solar Ash

July 25, 2021
Time Magazine introduced Elon Musk as the character of 2021!

Time Magazine introduced Elon Musk as the character of 2021!

July 24, 2021
Introduction of Solar Ash game

Introducing and reviewing the interesting game Solar Ash

0
Added the ability to check voice messages before sending to WhatsApp!

Added the ability to check voice messages before sending to WhatsApp!

0
Time Magazine introduced Elon Musk as the character of 2021!

Time Magazine introduced Elon Musk as the character of 2021!

0
Review of the first part of the fifth season of the Money Heist series

Review of the first part of the fifth season of the Money Heist series

0
At least one dead and 19 injured by two explosions at bus stops in Jerusalem |  International

At least one dead and 19 injured by two explosions at bus stops in Jerusalem | International

November 23, 2022
profesiones tecnológicas tecnología circular

Circular technology: this is how it will evolve

November 23, 2022
Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

November 23, 2022
Li Qiang, Xi Jinping's loyal lieutenant |  International

Li Qiang, Xi Jinping’s loyal lieutenant | International

November 23, 2022

Latest News

At least one dead and 19 injured by two explosions at bus stops in Jerusalem |  International

At least one dead and 19 injured by two explosions at bus stops in Jerusalem | International

November 23, 2022
profesiones tecnológicas tecnología circular

Circular technology: this is how it will evolve

November 23, 2022
Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

November 23, 2022
Li Qiang, Xi Jinping's loyal lieutenant |  International

Li Qiang, Xi Jinping’s loyal lieutenant | International

November 23, 2022

Suggest application sites

Weltnachrichten

Nachrichten Star

Dutycope

Freelance sites

Marze Safar

Food Cake

Arabic news

BackPack Travel

Travel Vision

Cooking

Drinks & Foods

WTM News

WTM News is a smart magazine that collects new and important technology news of the world for you from all over the web.
Our goal is to compile the best news so that you can more easily get the latest technology news in the world.

Follow us

News Categories

  • apps
  • business
  • entertainment
  • Environment
  • foods
  • gadget
  • games
  • health
  • lifestyle
  • mobile
  • movies
  • music
  • News
  • Other
  • Review
  • science
  • sports
  • startups
  • Technology
  • travel
  • Videos

Freelancer | Logo design | Hervess | Nachrichten Star | News Pro | Arabic news

Buy sponsor post | Marze Safar | BackPack Travel | Food Cake

How to cook any thinks | Learning how to make cakes and sweets

latest news

Review of the first part of the fifth season of the Money Heist series

The fifth season of Money Heist series

The points given are based solely on the personal taste of
Introduction of Solar Ash game

Solar Ash game

Score against the average score of this game on the site

WTM NEWS Magazine is just a portal for republishing news in various fields. All news will be placed on the site by mentioning the source. WTM NEWS has no legal responsibility for the accuracy of the news and articles and only reposts the news. © 2022 WTM NEWS

No Result
View All Result
  • Home
  • entertainment
  • business
  • Technology
  • lifestyle
  • Review
  • Videos

WTM NEWS Magazine is just a portal for republishing news in various fields. All news will be placed on the site by mentioning the source. WTM NEWS has no legal responsibility for the accuracy of the news and articles and only reposts the news. © 2022 WTM NEWS

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist