DPO PARTAGE
No Result
View All Result
  • Login
  • Accueil
  • Cybersécurité
    Cyber threat Overview 2021

    Cyber threat Overview 2021 – CERT-FR

  • Votre conformité RGPD (Tarifs)
  • Secteurs d’activité
  • Contact
Premium
S'INSCRIRE
  • Accueil
  • Cybersécurité
    Cyber threat Overview 2021

    Cyber threat Overview 2021 – CERT-FR

  • Votre conformité RGPD (Tarifs)
  • Secteurs d’activité
  • Contact
No Result
View All Result
DPO PARTAGE
No Result
View All Result
Home security US

Fog of War: The Cyber Impacts of the Ukrainian Conflict

DPO Partagé by DPO Partagé
18 February 2023
in security US
Reading Time: 2 mins read
0
Fog of War

Fog of War

The Ukrainian conflict, which began over seven years ago, saw Russia invade and annex Crimea and support pro-Russian separatists in eastern Ukraine. Since then, the war has continued, and cyber operations have played an increasingly important role in the conflict: the Fog of War.

A lire aussi sur DPO PARTAGE

What about the GDPR with the European Commission’s proposal for a digital driving license?

My iPhone has been stolen, what should I do?

European NIS 2 directive: a new challenge for DPOs and cybersecurity.

Google recently released a report titled “Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape” to better understand the importance of cyber threats in this conflict. The report is based on analysis from Google’s Threat Analysis Group (TAG), Mandiant, and Trust & Safety.

The Google report reveals that government-backed attackers from Russia have conducted an aggressive and multi-dimensional effort to gain a decisive wartime advantage in cyberspace. Threat actors have adopted spear-phishing tactics targeting NATO countries, a significant increase in the use of destructive attacks on Ukrainian government, military, and civilian infrastructure, and cyber operations designed to further multiple Russian objectives.

The report also shows a significant increase in targeting Ukraine by government-backed attackers from Russia. In 2022, Russia increased targeting of users in Ukraine by 250% compared to 2020. Attackers are heavily focused on Ukrainian government and military entities, but the campaigns that Google disrupted also show a strong focus on critical infrastructure, utilities and public services, and the media and information space.

The report also reveals that Russia has used the full spectrum of information operations (IO), from overt state-backed media to covert platforms and accounts, to shape public perception of the war. These operations aim to undermine the Ukrainian government, fracture international support for Ukraine, and maintain domestic support in Russia for the war.

The Google report highlights the complexity of Russian IO operations, which attempt to circumvent Google’s policies. The covert Russian IO operations that Google disrupted primarily focused on maintaining Russian domestic support for the war in Ukraine, with over 90% of instances in the Russian language.

The report also notes that the war in Ukraine has caused a notable shift in the Eastern European cybercriminal ecosystem that will likely have long-term implications for the coordination between criminal groups and the scale of cybercrime worldwide. Some groups have split over political allegiances and geopolitics, while others have lost prominent operators, which has an impact on our traditional understanding of their capabilities. Additionally, the report reveals a trend towards specialization in the ransomware ecosystem, which makes definitive attribution more difficult. However, the report does not indicate a surge of attacks against critical infrastructure outside of Ukraine.

Audit RGPD / Conformité RGPD Audit RGPD / Conformité RGPD Audit RGPD / Conformité RGPD
ADVERTISEMENT

Google remains committed to supporting efforts to protect Ukraine and helping to counter cyber threats. Since the beginning of the conflict, the company has worked closely with the Ukrainian government to improve the security of critical infrastructure and protect government sites against DDoS attacks.

Overall, the Google report highlights the increasing importance of cyber threats in modern conflicts. The threat landscape has significantly evolved over the past few years, and it is clear that cyber operations will continue to play a crucial role in future conflicts. Governments, businesses, and organizations must be prepared to face these constantly evolving threats to protect their infrastructure and data.

Source: Google
Tweet21Share6
Previous Post

Plan of action over 12 months for maintaining your GDPR compliance.

Next Post

ASML accused of data theft by China.

DPO Partagé

DPO Partagé

Looking for a DPO? Entrust your mission to DPO PARTAGE - Contact us at +33 (0)7 56 94 70 90 or by email at contact@dpo-partage.fr. DPO PARTAGE is the leader in DPO services for health and sensitive data.

Related Posts

Digital driving license GDPR
GDPR

What about the GDPR with the European Commission’s proposal for a digital driving license?

5 March 2023
Theft of my iPhone
security US

My iPhone has been stolen, what should I do?

5 March 2023
European NIS 2 directive
GDPR

European NIS 2 directive: a new challenge for DPOs and cybersecurity.

1 March 2023
Privacy Sandbox sur Android
security US

Google is rolling out the beta version of Privacy Sandbox for Android, which marks the end of targeted advertising on Android devices

18 February 2023
Next Post
asml

ASML accused of data theft by China.

gmail error 502

Gmail Error 502: Users Struggle to Access Emails

DPO PARTAGE

Votre partenaire pilote de votre
conformité RGPD
  • - DPO Externalisé
  • - Audit Conformité RGPD
  • - Application Conformité RGPD
  • - Devis missions RGPD

Pour toute question
01 83 64 42 98.

Articles recommandés

Compliance Certificate

GDPR Compliance Certificate

1 March 2023
Sanctions Privacy by Design

Privacy by Design: A Complex but Essential Implementation

25 September 2023
Cyberattacks protect SMEs

Cyberattacks: How to protect your SME in 3 points

28 February 2023

Articles populaires

    DPO PARTAGE DPO externalisé

    DPO Partage se positionne comme un acteur clé dans le domaine de la protection des données personnelles, en offrant une gamme complète de services axés sur le Règlement Général sur la Protection des Données (RGPD). Notre structure fournit des informations régulières et pointues sur les dernières évolutions et exigences du RGPD, ce qui en fait une ressource précieuse pour les entreprises soucieuses de se conformer à la législation.

    Faites appel à DPO PARTAGE pour votre conformité RGPD.
    Contactez nous au 01 83 64 42 98
    En savoir plus »

    Recent Posts

    • Xerox Corp is reportedly the victim of a major cyberattack.
    • Navigating the Regulatory Landscape of Health Data Hosting: A Comparison of France and the United States with Advice for American Companies
    • Turning GDPR Compliance into Competitive Advantage: Unveiling the New Guide for American Enterprises
    • Web Analytics and GDPR Compliance: How Website Hosts Can Adhere in France
    • Data Breach at DecathlonThe Critical Importance of Cybersecurity Highlighted by the Recent Data Breach Involving Nearly 8,000 Employees and Customers of DecathlonData Breach at Decathlon
    • Mentions Légales
    • Politique de confidentialité
    • Politique cookies DPO Partagé
    • Nous contacter
    • Politique de cookies (UE)

    © 2024 DPO PARTAGE - Pilote de votre conformité RGPD

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In
    Gérer le consentement aux cookies
    Pour offrir les meilleures expériences, nous utilisons des technologies telles que les cookies pour stocker et/ou accéder aux informations des appareils. Le fait de consentir à ces technologies nous permettra de traiter des données telles que le comportement de navigation ou les ID uniques sur ce site. Le fait de ne pas consentir ou de retirer son consentement peut avoir un effet négatif sur certaines caractéristiques et fonctions.
    Fonctionnel Always active
    Le stockage ou l’accès technique est strictement nécessaire dans la finalité d’intérêt légitime de permettre l’utilisation d’un service spécifique explicitement demandé par l’abonné ou l’utilisateur, ou dans le seul but d’effectuer la transmission d’une communication sur un réseau de communications électroniques.
    Préférences
    Le stockage ou l’accès technique est nécessaire dans la finalité d’intérêt légitime de stocker des préférences qui ne sont pas demandées par l’abonné ou l’utilisateur.
    Statistiques
    Le stockage ou l’accès technique qui est utilisé exclusivement à des fins statistiques. Le stockage ou l’accès technique qui est utilisé exclusivement dans des finalités statistiques anonymes. En l’absence d’une assignation à comparaître, d’une conformité volontaire de la part de votre fournisseur d’accès à internet ou d’enregistrements supplémentaires provenant d’une tierce partie, les informations stockées ou extraites à cette seule fin ne peuvent généralement pas être utilisées pour vous identifier.
    Marketing
    Le stockage ou l’accès technique est nécessaire pour créer des profils d’utilisateurs afin d’envoyer des publicités, ou pour suivre l’utilisateur sur un site web ou sur plusieurs sites web ayant des finalités marketing similaires.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    Voir les préférences
    {title} {title} {title}
    No Result
    View All Result
    • Accueil
    • Cybersécurité
    • Votre conformité RGPD (Tarifs)
    • Secteurs d’activité
    • Contact

    © 2024 DPO PARTAGE - Pilote de votre conformité RGPD

    Are you sure want to unlock this post?
    Unlock left : 0
    Are you sure want to cancel subscription?