• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

A Wider Range of Cyber Threat Vectors Emerged Since Ukraine Invasion, Found ENISA

flyytech by flyytech
November 4, 2022
Home Security
Share on FacebookShare on Twitter


The European Cybersecurity Agency (ENISA)’s threat landscape annual report 2022 is heavily influenced by the impact of the Russian invasion of Ukraine on the cyber landscape.

Covering the period from July 2021 up to July 2022, the report was presented under the title Volatile Geopolitics Shake the Trends of the 2022 Cybersecurity Threat Landscape during the Prague Security Conference on November 3, 2022.

“The geopolitical situations, particularly the Russian invasion of Ukraine, have acted as a game changer over the reporting period for the global cyber domain,” reads the report.  

Examining the monthly breakdown of cyber incidents, the report shows an increase in February and March 2022, around the time the Russian invasion of Ukraine in late February.

Overall, however, 2022 saw a reduction in number of incidents compared to 2021 – partly because incident handling and analysis are still ongoing and because of the open-source nature of the information collected by ENISA.

“In particular, the category NEAR has a steady high number of observed incidents related to prime threats, which implies their significance in the context of the EU,” reads the report. This category represents incidents within EU borders on networks and systems controlled within EU borders – two of the other types, MID and FAR, account for networks and systems with less reliance on EU controls and the GLOBAL type represent incidents with global impact.

Same Actors, Similar Threats, Still Rising

Overall, prominent threat actors (state-sponsored, cyber-criminal gangs, hacker-for-hire actors and hacktivists) remain the same as last year’s. Similarly, the eight prime threat categories identified (ransomware, malware, social engineering, threats against data, denial of service, internet threats, disinformation-misinformation and supply chain attacks) also appeared in the 2021 edition of the report – only cryptojacking does not make this year’s report.

With more than 10 TB of data stolen monthly during the covered period, ransomware remains a prime threat, ENISA said. More generally, the use of malware was on the rise again after the decrease that was noticed in 2021 and linked to the COVID-19 pandemic.

ENISA also noticed an increase in denial-of-service attacks from the summer of 2022. Noticeably, a DDoS attack that targeted an Eastern European customer of the American firm Akamai in July 2022 proved to be the largest ever launched in Europe.

A Wider Range of Vectors

These trends may be familiar, but the devil is in the details. Since the Russian invasion of Ukraine, ENISA has seen a wider range of vectors emerge. “As a result, more malicious and widespread attacks emerge having more damaging impact,” reads the report.

Among them, the agency mentioned:

  • Zero-day exploits gaining traction
  • A new wave of hacktivism
  • Extortion techniques are further evolving with the widespread use of leak sites.
  • AI-enabled disinformation, deepfakes and disinformation-as-a-service
  • New forms of phishing arising (spear-phishing, whaling, smishing and vishing)
  • DDoS attacks getting larger and more complex, moving toward mobile networks and the Internet of Things (IoT)
  • Destruction of internet infrastructure, outages and rerouting of internet traffic

The Public Sector Remains a Prime Target

The threat distribution across sectors shows that, while no industry was spared, public and government administrations were still the number one target, accounting for 24.21% of all reported incidents. Public sector attacks, together with those targeting digital service providers and the general public, made up 50% of all threats, with the other half shared by all other sectors of the economy.

“Today’s global context inevitably drives major changes in the cybersecurity threat landscape. The new paradigm is shaped by the growing range of threat actors. We enter a phase which will need appropriate mitigation strategies to protect all our critical sectors, our industry partners and therefore all EU citizens,” Juhan Lepassaar, ENISA’s executive director, stated in the report.

Composed of open-sourced content such as media articles, expert opinions, intelligence reports, incident analysis and security research reports, as well as interviews with members of the ENISA Cyber Threat Landscapes (CTL) working group, ENISA’s annual threat landscape report aims at helping decision-makers, policymakers and security specialists define strategies to defend citizens and organizations in the EU member states.



Source_link

flyytech

flyytech

Next Post
Huawei Mate 50 Pro Review: Variable Aperture Really Works

Huawei Mate 50 Pro Review: Variable Aperture Really Works

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Microsoft Reclassifies SPNEGO Extended Negotiation Security Vulnerability as ‘Critical’

Microsoft Reclassifies SPNEGO Extended Negotiation Security Vulnerability as ‘Critical’

December 16, 2022
Preowned Canon EOS R5 C $3738 (Reg $4399)

Preowned Canon EOS R5 C $3738 (Reg $4399)

January 29, 2023

Trending.

Shop now. Pay later. on the App Store

Shop now. Pay later. on the App Store

February 25, 2023
Volla Phone 22 review

Volla Phone 22 review

March 26, 2023
USIU student team qualifies for Microsoft Imagine Cup World Championship

USIU student team qualifies for Microsoft Imagine Cup World Championship

April 5, 2023
Google 3D animals & AR objects: Full list & gallery

Google 3D animals & AR objects: Full list & gallery

December 27, 2022
Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

September 27, 2022

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

TSMC Is Sprinting to 2nm to Satisfy Demand From Nvidia, Apple

TSMC Is Sprinting to 2nm to Satisfy Demand From Nvidia, Apple

June 5, 2023
Mass Exploitation of Zero-Day Bug in MOVEit File Transfer Underway

Mass Exploitation of Zero-Day Bug in MOVEit File Transfer Underway

June 5, 2023

Copyright © 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright © 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT