<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[CyberThreat Report: English]]></title><description><![CDATA[Cyberthreat.report's English-language news channel]]></description><link>https://www.cyberthreat.report/s/english</link><image><url>https://substackcdn.com/image/fetch/$s_!Lmtw!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50383b70-eecb-4f1b-8260-d05e48d1dbc9_256x256.png</url><title>CyberThreat Report: English</title><link>https://www.cyberthreat.report/s/english</link></image><generator>Substack</generator><lastBuildDate>Wed, 08 Apr 2026 10:07:36 GMT</lastBuildDate><atom:link href="https://www.cyberthreat.report/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[CyEx Kft.]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[ferencfresz@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[ferencfresz@substack.com]]></itunes:email><itunes:name><![CDATA[Ferenc Frész]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ferenc Frész]]></itunes:author><googleplay:owner><![CDATA[ferencfresz@substack.com]]></googleplay:owner><googleplay:email><![CDATA[ferencfresz@substack.com]]></googleplay:email><googleplay:author><![CDATA[Ferenc Frész]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Data Centers as Critical Infrastructure in the 2026 Middle East Conflict]]></title><description><![CDATA[Strategic Vulnerability and Kinetic Warfare]]></description><link>https://www.cyberthreat.report/p/data-centers-as-critical-infrastructure</link><guid isPermaLink="false">https://www.cyberthreat.report/p/data-centers-as-critical-infrastructure</guid><dc:creator><![CDATA[Ferenc Frész]]></dc:creator><pubDate>Sat, 07 Mar 2026 09:38:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!OoRw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998e81a2-f808-49ec-8ef9-259f2450f8b4_2752x1536.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OoRw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998e81a2-f808-49ec-8ef9-259f2450f8b4_2752x1536.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OoRw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998e81a2-f808-49ec-8ef9-259f2450f8b4_2752x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OoRw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998e81a2-f808-49ec-8ef9-259f2450f8b4_2752x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OoRw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998e81a2-f808-49ec-8ef9-259f2450f8b4_2752x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OoRw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998e81a2-f808-49ec-8ef9-259f2450f8b4_2752x1536.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OoRw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998e81a2-f808-49ec-8ef9-259f2450f8b4_2752x1536.jpeg" width="1456" height="813" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/998e81a2-f808-49ec-8ef9-259f2450f8b4_2752x1536.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:813,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3415417,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberthreat.report/i/190184088?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998e81a2-f808-49ec-8ef9-259f2450f8b4_2752x1536.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OoRw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998e81a2-f808-49ec-8ef9-259f2450f8b4_2752x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OoRw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998e81a2-f808-49ec-8ef9-259f2450f8b4_2752x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OoRw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998e81a2-f808-49ec-8ef9-259f2450f8b4_2752x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OoRw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F998e81a2-f808-49ec-8ef9-259f2450f8b4_2752x1536.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Generated with AI by Ferenc Fr&#233;sz.</figcaption></figure></div><p>The year 2026 has brought a fundamental shift at the intersection of global security policy and technological risk management. On March 1, 2026, when Iranian drone strikes reached Amazon Web Services (AWS) data centers in the United Arab Emirates and Bahrain, the world witnessed the first large-scale military action to directly and successfully paralyze the physical infrastructure of a global cloud provider. This event is not merely an episode in a local conflict, but a manifestation of a paradigm shift in modern warfare: digital infrastructure has now become as much a primary target as oil refineries or military bases once were.</p><p>The context of the attack was provided by Operations <strong>Epic Fury and Roaring Lion </strong>launched by the United States and Israel on February 28, 2026, which resulted in the death of the Iranian Supreme Leader, Ali Khamenei. The subsequent Iranian retaliation, Operation <strong>True Promise IV</strong> utilized a barrage of drones and missiles that targeted not only traditional military assets but also the data centers forming the economic backbone of the region. Patrick J. Murphy, executive director of the geopolitical advisory unit at Hilco Global, pointed out that while energy was previously in the crosshairs, these attacks prove that data centers are now viewed as strategic critical infrastructure.</p>
      <p>
          <a href="https://www.cyberthreat.report/p/data-centers-as-critical-infrastructure">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[How Our Brains Are Being Hacked – A Guide to Digital Traps]]></title><description><![CDATA[Why does it feel like everyone has gone mad on the internet?]]></description><link>https://www.cyberthreat.report/p/how-our-brains-are-being-hacked-a</link><guid isPermaLink="false">https://www.cyberthreat.report/p/how-our-brains-are-being-hacked-a</guid><dc:creator><![CDATA[Ferenc Frész]]></dc:creator><pubDate>Mon, 15 Dec 2025 17:11:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Dles!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e00c82e-14fb-46a4-a06a-8b854dfc5399_2752x1536.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dles!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e00c82e-14fb-46a4-a06a-8b854dfc5399_2752x1536.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dles!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e00c82e-14fb-46a4-a06a-8b854dfc5399_2752x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Dles!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e00c82e-14fb-46a4-a06a-8b854dfc5399_2752x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Dles!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e00c82e-14fb-46a4-a06a-8b854dfc5399_2752x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Dles!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e00c82e-14fb-46a4-a06a-8b854dfc5399_2752x1536.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dles!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e00c82e-14fb-46a4-a06a-8b854dfc5399_2752x1536.jpeg" width="1456" height="813" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9e00c82e-14fb-46a4-a06a-8b854dfc5399_2752x1536.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:813,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:915791,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberthreat.report/i/181693754?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e00c82e-14fb-46a4-a06a-8b854dfc5399_2752x1536.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Dles!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e00c82e-14fb-46a4-a06a-8b854dfc5399_2752x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Dles!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e00c82e-14fb-46a4-a06a-8b854dfc5399_2752x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Dles!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e00c82e-14fb-46a4-a06a-8b854dfc5399_2752x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Dles!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e00c82e-14fb-46a4-a06a-8b854dfc5399_2752x1536.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Generatedt with AI by Ferenc Fr&#233;sz</figcaption></figure></div><p>We often feel that two completely separate worlds exist on the internet, especially on platforms like Facebook or TikTok. On one side, they say &#8220;black,&#8221; and on the other, &#8220;white&#8221;; the two camps not only fail to understand one another, but it also seems as if they aren&#8217;t even living on the same planet.</p><p>Numerous studies ar&#8230;</p>
      <p>
          <a href="https://www.cyberthreat.report/p/how-our-brains-are-being-hacked-a">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Digital Dinosaurs and the Deepfake Asteroid]]></title><description><![CDATA[The Regulation of Deepfake and Artificially Generated Content in the European Union and Member States]]></description><link>https://www.cyberthreat.report/p/digital-dinosaurs-and-the-deepfake</link><guid isPermaLink="false">https://www.cyberthreat.report/p/digital-dinosaurs-and-the-deepfake</guid><dc:creator><![CDATA[Ferenc Frész]]></dc:creator><pubDate>Sat, 01 Nov 2025 12:35:49 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/177721446/d263b7585e989e7a5525eabd5f141a8d.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>The development of artificial intelligence (AI), which enables the creation of hyper-realistic, manipulated audiovisual content, carries both innovation potential and significant societal risks, from disinformation and election interference to financial fraud and severe violations of personal rights. Everyone and their brother uses the technology, mostly to generate harmless jokes or create more serious animations and short films, but unfortunately, like anything, this technology can be harmful in the hands of malicious people. Deepfake forgeries have become daily practice in organized crime circles as well as in the smear campaigns of political parties against each other and in information warfare operations. The use of technology for such purposes undermines the foundations of child protection and privacy, making digital tools using false content uncontrollable and unmanageable in committing crimes.</p><p>The European Union has responded to this challenge with a complex, multi-pillar regulatory strategy, which has not created a single, technology-specific &#8220;deepfake law,&#8221; but rather addresses the phenomenon along its entire lifecycle.</p><p>The backbone of the regulation is provided by three complementary EU legislative acts. First, the General Data Protection Regulation (GDPR) forms the basis, regulating the processing of personal, especially biometric, data used to train deepfake models, setting strict legal bases and conditions for developers. Second, the Artificial Intelligence Act (AI Act) directly targets the developers and deployers of AI systems, imposing default transparency obligations to label synthetic content. Third, the Digital Services Act (DSA) establishes the responsibility of online platforms to prevent the dissemination of harmful and illegal deepfake content, particularly through strict risk assessment and mitigation obligations imposed on Very Large Online Platforms (VLOPs).</p><p>This multi-layered approach creates a comprehensive, yet extremely complex and fragmented legal environment. While the AI Act draws the baseline for transparency, the DSA provides the primary mechanism for combating harmful content already in circulation, and the GDPR sets a fundamental limit on the use of personal data. The report highlights that these three laws together form a complementary &#8220;push-pull&#8221; system: the AI Act seeks to &#8220;push&#8221; labeled content into the digital ecosystem at the source, while the DSA seeks to &#8220;pull&#8221; harmful or illegal materials from it at the point of distribution.</p><p>The analysis at the Member State level reveals significant differences. France, with its 2024 SREN Act, has adopted a proactive criminal law approach, creating specific criminal offenses for the creation and distribution of non-consensual deepfakes, especially for pornographic content. In contrast, Germany has so far relied on its existing personality rights and defamation laws, although a new draft bill for a specific criminal law indicates a move towards the French model. Hungary is currently experiencing a legislative gap; there are no specific deepfake rules, and the existing offenses in the Criminal Code (e.g., defamation, harassment) do not necessarily provide a proportionate and effective response to the new types of threats posed by the technology.</p><h2>The Rise of Synthetic Media and the European Regulatory Response</h2><p>Deepfake technology, derived from the merging of the words &#8220;deep learning&#8221; and &#8220;fake,&#8221; </p>
      <p>
          <a href="https://www.cyberthreat.report/p/digital-dinosaurs-and-the-deepfake">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Impact of Autonomous AI Agents on Cybersecurity]]></title><description><![CDATA[Opportunities and Challenges in 2025 and Beyond]]></description><link>https://www.cyberthreat.report/p/the-impact-of-autonomous-ai-agents</link><guid isPermaLink="false">https://www.cyberthreat.report/p/the-impact-of-autonomous-ai-agents</guid><dc:creator><![CDATA[Ferenc Frész]]></dc:creator><pubDate>Thu, 14 Aug 2025 11:56:55 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!sMBR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e95cd3-4ccb-4474-8763-d7f4760fb160_2816x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sMBR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e95cd3-4ccb-4474-8763-d7f4760fb160_2816x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sMBR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e95cd3-4ccb-4474-8763-d7f4760fb160_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!sMBR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e95cd3-4ccb-4474-8763-d7f4760fb160_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!sMBR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e95cd3-4ccb-4474-8763-d7f4760fb160_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!sMBR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e95cd3-4ccb-4474-8763-d7f4760fb160_2816x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sMBR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e95cd3-4ccb-4474-8763-d7f4760fb160_2816x1536.png" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f8e95cd3-4ccb-4474-8763-d7f4760fb160_2816x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:5911483,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberthreat.report/i/170964865?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e95cd3-4ccb-4474-8763-d7f4760fb160_2816x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sMBR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e95cd3-4ccb-4474-8763-d7f4760fb160_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!sMBR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e95cd3-4ccb-4474-8763-d7f4760fb160_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!sMBR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e95cd3-4ccb-4474-8763-d7f4760fb160_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!sMBR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e95cd3-4ccb-4474-8763-d7f4760fb160_2816x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Generated with AI by Ferenc Fr&#233;sz</figcaption></figure></div><p>TL;DR</p><p>This report highlights the dual nature of the technology: on the one hand, it holds immense potential to revolutionize defense, and on the other, it creates unprecedented, complex risks. The most important lessons synthesized are as follows:</p><ol><li><p><strong>Paradigm shift in defense:</strong> AI agents enable cybersecurity to transition from a reactive, incident-focused model to a proactive, predictive, and highly automated strategy. Capabilities such as adaptive threat hunting, hyper-efficient SOC operations, and automated vulnerability management can dramatically increase defensive capabilities and reduce reaction times.</p></li><li><p><strong>New, abstract attack surfaces:</strong> The focus of risks is shifting from traditional, code- and network-level vulnerabilities to the manipulation of agents' perception, reasoning, and decision-making processes. Threats such as prompt injection, perception hijacking, and the cascading effects inherent in multi-agent systems require new ways of thinking and new defense strategies.</p></li><li><p><strong>The central role of governance:</strong> The biggest challenge is not technological, but one of governance. Organizations must urgently develop robust frameworks that ensure the safe, auditable, and ethical operation of autonomous agents. This includes strict permission management, continuous monitoring, human oversight, and the definition of clear responsibilities. The risk of the "algorithmic insider threat" is real and requires immediate attention.</p></li><li><p><strong>The transformation of the human role:</strong> Human expertise remains indispensable, but its role is shifting from execution to strategic direction, system design, agent training, and making complex, contextual decisions. The cybersecurity professionals of the future will need to be technologists, strategists, and "governors" of the digital workforce all at once.</p></li></ol><p>The future clearly points towards continuous, high-speed, machine-vs-machine cyber warfare. In this environment, the organizations that succeed will be those that not only invest in the latest technologies but also build an agile, adaptive security culture based on a close partnership between human and machine intelligence. </p><h2>The Revolution of Autonomous AI Agents in 2025</h2>
      <p>
          <a href="https://www.cyberthreat.report/p/the-impact-of-autonomous-ai-agents">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Cybersecurity Challenges of the 2026 Hungarian Parliamentary Elections]]></title><description><![CDATA[Risk Analysis and Information Warfare Scenarios]]></description><link>https://www.cyberthreat.report/p/cybersecurity-challenges-of-the-2026</link><guid isPermaLink="false">https://www.cyberthreat.report/p/cybersecurity-challenges-of-the-2026</guid><dc:creator><![CDATA[Ferenc Frész]]></dc:creator><pubDate>Wed, 13 Aug 2025 12:29:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!svEH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14d9f17f-93d4-4402-80e2-f28f96db392b_2816x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!svEH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14d9f17f-93d4-4402-80e2-f28f96db392b_2816x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!svEH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14d9f17f-93d4-4402-80e2-f28f96db392b_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!svEH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14d9f17f-93d4-4402-80e2-f28f96db392b_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!svEH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14d9f17f-93d4-4402-80e2-f28f96db392b_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!svEH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14d9f17f-93d4-4402-80e2-f28f96db392b_2816x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!svEH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14d9f17f-93d4-4402-80e2-f28f96db392b_2816x1536.png" width="2816" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/14d9f17f-93d4-4402-80e2-f28f96db392b_2816x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:2816,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:6920251,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberthreat.report/i/170869869?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba264362-89d2-4c1d-bd22-ebb4085a1417_2816x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!svEH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14d9f17f-93d4-4402-80e2-f28f96db392b_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!svEH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14d9f17f-93d4-4402-80e2-f28f96db392b_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!svEH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14d9f17f-93d4-4402-80e2-f28f96db392b_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!svEH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14d9f17f-93d4-4402-80e2-f28f96db392b_2816x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>TL;DR</h3><p>The information environment of the 2026 Hungarian parliamentary elections is expected to be defined by four main risk factors:</p><ul><li><p>The synergy of domestic government and foreign (primarily Russian, American, and Chinese) disinformation, creating a coordinated, mutually reinforcing narrative space.</p></li><li><p>Networked propaganda that bypasses the ban on paid politi&#8230;</p></li></ul>
      <p>
          <a href="https://www.cyberthreat.report/p/cybersecurity-challenges-of-the-2026">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Rising Tide of Hybrid Attacks: Europe's Cybersecurity Challenge]]></title><description><![CDATA[An effective cybersecurity strategy blends people, processes, and technology to mitigate risks like business disruption, financial loss, and reputational damage.]]></description><link>https://www.cyberthreat.report/p/the-rising-tide-of-hybrid-attacks</link><guid isPermaLink="false">https://www.cyberthreat.report/p/the-rising-tide-of-hybrid-attacks</guid><dc:creator><![CDATA[Ferenc Frész]]></dc:creator><pubDate>Fri, 02 May 2025 06:28:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!c9J1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83f4e94d-5053-47a6-9ad3-af52708a7003_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!c9J1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83f4e94d-5053-47a6-9ad3-af52708a7003_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!c9J1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83f4e94d-5053-47a6-9ad3-af52708a7003_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!c9J1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83f4e94d-5053-47a6-9ad3-af52708a7003_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!c9J1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83f4e94d-5053-47a6-9ad3-af52708a7003_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!c9J1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83f4e94d-5053-47a6-9ad3-af52708a7003_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!c9J1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83f4e94d-5053-47a6-9ad3-af52708a7003_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/83f4e94d-5053-47a6-9ad3-af52708a7003_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2676642,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberthreat.report/i/162646632?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83f4e94d-5053-47a6-9ad3-af52708a7003_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!c9J1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83f4e94d-5053-47a6-9ad3-af52708a7003_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!c9J1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83f4e94d-5053-47a6-9ad3-af52708a7003_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!c9J1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83f4e94d-5053-47a6-9ad3-af52708a7003_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!c9J1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83f4e94d-5053-47a6-9ad3-af52708a7003_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Cybersecurity is a cornerstone of our digital world, encompassing all measures taken to protect digital data and assets. An effective cybersecurity strategy blends people, processes, and technology to mitigate risks like business disruption, financial loss, and reputational damage. It's not just about technology; people and procedures are equally vital.</p><p>Europe is facing an escalating wave of hybrid attacks, a complex threat blending conventional and unconventional methods. A recent EBU Investigative Journalism Network report highlights the extent of Russian hybrid operations in Europe. These involve recruiting "disposable agents" via social media for cyberattacks, arson, vandalism, sabotage, and election interference. Over 60 confirmed or suspected Russian hybrid attacks have been documented since early 2024. EU officials and Dutch intelligence confirm this growing trend, emphasizing that these attacks target the entire continent, aiming to weaken and influence societies.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p>
      <p>
          <a href="https://www.cyberthreat.report/p/the-rising-tide-of-hybrid-attacks">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Major Security Breach at US Office of the Comptroller of the Currency (OCC) Undetected for Nearly Two Years]]></title><description><![CDATA[Attackers gained undetected access to the agency's email system for over a year and a half compromising approximately 150,000 emails.]]></description><link>https://www.cyberthreat.report/p/major-security-breach-at-us-office</link><guid isPermaLink="false">https://www.cyberthreat.report/p/major-security-breach-at-us-office</guid><dc:creator><![CDATA[Katalin Béres]]></dc:creator><pubDate>Thu, 01 May 2025 20:52:19 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162644830/52d723643f7221278a28331f3c514f30.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OJrA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29059e1e-d515-4209-8798-4d95616e35ab_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OJrA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29059e1e-d515-4209-8798-4d95616e35ab_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!OJrA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29059e1e-d515-4209-8798-4d95616e35ab_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!OJrA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29059e1e-d515-4209-8798-4d95616e35ab_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!OJrA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29059e1e-d515-4209-8798-4d95616e35ab_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OJrA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29059e1e-d515-4209-8798-4d95616e35ab_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/29059e1e-d515-4209-8798-4d95616e35ab_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2757044,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberthreat.report/i/162644830?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29059e1e-d515-4209-8798-4d95616e35ab_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OJrA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29059e1e-d515-4209-8798-4d95616e35ab_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!OJrA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29059e1e-d515-4209-8798-4d95616e35ab_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!OJrA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29059e1e-d515-4209-8798-4d95616e35ab_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!OJrA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29059e1e-d515-4209-8798-4d95616e35ab_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Generated with AI by Ferenc Fr&#233;sz.</figcaption></figure></div><p>A significant cyber and data security incident has impacted the Office of the Comptroller of the Currency (OCC), a crucial institution responsible for the stability of the United States financial system. Attackers gained undetected access to the agency's email system for over a year and a half, compromising approximately 150,000 emails.</p><h2>The Incident Unfolds</h2><p>The initial unauthorized access likely occurred around May-June 2023. However, the breach wasn't detected until February 2025, meaning the perpetrators remained hidden for nearly 20 months. The compromised emails included sensitive data and communications with major financial institutions like JPMorgan Chase and BNY Mellon.</p><p>Significantly, the attack wasn't carried out using ransomware or destructive methods. Instead, it was a quiet, stealthy operation focused on surveillance and data collection. This approach is particularly concerning for an institution that underpins the stability of the US banking sector.</p><p>The incident came to light on February 11, 2025, when Microsoft specialists detected suspicious activity within the OCC's email system. An administrator account was observed accessing user mailboxes in an unusual manner. Microsoft alerted the OCC, which launched an internal investigation and confirmed the incident the following day, February 12th.</p><h3><strong>Key Details of the Breach:</strong></h3><ul><li><p><strong>Start Date:</strong> May-June 2023.</p></li><li><p><strong>Detection:</strong> February 11, 2025, by Microsoft, not the OCC's internal security.</p></li><li><p><strong>Attack Vector:</strong> A compromised administrator account.</p></li><li><p><strong>Affected System:</strong> The OCC's on-premises Microsoft Exchange email system (not Microsoft 365 cloud service). This suggests the attack differs from known state-sponsored (potentially Chinese) operations targeting cloud-based systems.</p></li><li><p><strong>Affected Mailboxes:</strong> At least 103 email accounts, including those of senior officials and personnel handling confidential information.</p></li><li><p><strong>Attack Type:</strong> Passive surveillance and information gathering, with no file encryption, extortion, or system damage.</p></li></ul><p>The nature and duration of the attack, coupled with its external detection, raise serious questions about the effectiveness of the OCC's internal security monitoring and early detection capabilities.</p><h3>Extent of the Damage</h3><p>The compromised correspondence contained sensitive information, including results of bank supervision audits, evaluations, and details on the financial health of certain institutions. Following the attack, several financial institutions temporarily restricted sharing sensitive data with the OCC, indicating a potential erosion of trust.</p><p>While the OCC and the US Department of the Treasury emphasized that the incident had no direct impact on the financial system's operation, the volume and nature of the compromised data could pose long-term risks. Potential leaks of sensitive information could cause reputational damage and create future attack opportunities, such as targeted phishing or financial manipulation campaigns.</p><h3>Response and Investigation</h3><p>Upon confirmation, the OCC immediately disabled the compromised account. Further steps included:</p><ul><li><p>Engaging an external digital forensics team for investigation.</p></li><li><p>Reporting the incident to the US Cybersecurity and Infrastructure Security Agency (CISA).</p></li><li><p>Formally notifying Congress in late March 2025, classifying it as a "major incident" due to the involvement of non-public, controlled, and personally identifiable information.</p></li></ul><p>An OCC spokesperson stated the institution is committed to identifying security shortcomings, establishing internal accountability, and strengthening affected systems.</p><h3>Geopolitical Considerations</h3><p>While the attacker hasn't been officially identified, the incident's characteristics align with previous intrusions into US governmental and financial institutions, often linked to state-sponsored groups, particularly from China. These attacks typically aim for long-term information gathering and cyberespionage for strategic, political, or economic advantage, rather than immediate disruption. Groups like Salt Typhoon (APT40) have been associated with similar attacks. However, it's crucial to note that no official attribution has been made in the OCC case. The incident fits the trend of geopolitical tensions, especially between the US and China, increasingly playing out in cyberspace.</p><h2>Lessons Learned and Recommendations</h2><p>This attack highlights several systemic weaknesses:</p><ul><li><p><strong>Lack of Internal Detection:</strong> Reliance on an external partner (Microsoft) for detection indicates insufficient internal monitoring capabilities.</p></li><li><p><strong>Inadequate Control of Privileged Access:</strong> The compromised administrator account had extensive access, pointing to weaknesses in access and privilege management.</p></li><li><p><strong>Organizational Security Deficiencies:</strong> The incident likely exposed long-standing structural weaknesses and the risks associated with technical debt and delayed upgrades.</p></li><li><p><strong>Need for Improved Incident Communication:</strong> Issues with incident classification and the timing of information release suggest a lack of robust, predefined communication protocols.</p></li></ul><h3><strong>Recommendations for Organizations Handling Critical Data</strong></h3><ol><li><p><strong>Strengthen Privileged Access Management (PAM):</strong> Implement multi-factor authentication, the principle of least privilege, time-bound access, session logging, and regular audits.</p></li><li><p><strong>Build Advanced Detection and Response Capabilities:</strong> Deploy and enhance solutions like SIEM, EDR, NDR, behavioral analytics, and automated alerts.</p></li><li><p><strong>Adopt a Zero Trust Network Model:</strong> Minimize implicit trust, enforce continuous authentication and access control both internally and externally.</p></li><li><p><strong>Develop Transparent Incident Communication Protocols:</strong> Establish predefined procedures for handling incidents and informing stakeholders and the public.</p></li><li><p><strong>Foster an Organizational Cybersecurity Culture:</strong> Reinforce leadership accountability, allocate sufficient resources, and integrate awareness programs into daily operations.</p></li><li><p><strong>Review Communication Channel Security:</strong> Use dedicated, encrypted, and audited channels for highly sensitive information instead of general email.</p></li></ol><h2>Conclusion</h2><p>The cyberattack against the OCC is one of the most severe incidents affecting US regulatory authorities in recent years. It underscores the evolving nature of cyber threats and the vulnerabilities within internal security systems and processes. Furthermore, it highlights potential nation-state interest in sensitive financial regulatory data. The key takeaway is clear: strengthening technical, organizational, and cultural defense capabilities cannot be delayed. Continuous review and modernization of security practices are essential to prevent similar long-duration, stealthy attacks, especially where national or global financial stability is at stake.</p>]]></content:encoded></item><item><title><![CDATA[Hungary Grapples with Rising Crypto Crime]]></title><description><![CDATA[Listen now | Common Scams Targeting Hungarians]]></description><link>https://www.cyberthreat.report/p/hungary-grapples-with-rising-crypto</link><guid isPermaLink="false">https://www.cyberthreat.report/p/hungary-grapples-with-rising-crypto</guid><dc:creator><![CDATA[Ferenc Frész]]></dc:creator><pubDate>Sat, 26 Apr 2025 17:38:05 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162209967/c1b18c147eb8eee0fbef9e5d2c995ceb.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Hungarian authorities are increasingly warning about a rise in cryptocurrency-related crime, highlighting growing connections between these activities and Southeast Asian cybercrime networks. The very nature of cryptocurrencies &#8211; their decentralized and pseudonymous design &#8211; makes it challenging for law enforcement to trace illicit funds and identify perpetrators.</p><p><strong>Common Scams Targeting Hungarians</strong></p><p>Scammers employ a variety of methods. Watch out for:</p><ul><li><p><strong>Fake Investment Schemes:</strong> These often promise impossibly high returns. A notable example involved the "Samandriel Group," which operated a pyramid scheme disguised as a crypto investment, defrauding over 2,500 people out of significant sums. Scammers may even misuse the images of well-known local figures to lend false credibility to their schemes.</p></li><li><p><strong>Phishing:</strong> Fraudulent emails or SMS messages impersonating banks, delivery companies, or other trusted entities aim to trick you into revealing personal data (like passwords or card details) or clicking malicious links that install data-stealing malware.</p></li><li><p><strong>"Pig Butchering":</strong> A particularly insidious scam where criminals build a relationship (often romantic) with the victim over time before persuading them to invest large sums in fake crypto platforms.</p></li><li><p><strong>Money Laundering:</strong> Criminals use crypto transactions to obscure the origins of illegally obtained funds.</p></li><li><p><strong>Fake Mining Operations:</strong> Websites that promise crypto mining rewards but only collect fees from users without providing any real return.</p></li></ul><p><strong>Authorities Taking Action</strong></p><p>Hungarian authorities, including the police and the Hungarian National Bank (MNB), are actively working to combat this trend. Efforts include monitoring online activities, raising public awareness about risks and prevention, seizing crypto assets linked to crimes like drug trafficking, and participating in international collaborations. The MNB also emphasizes the risks associated with the largely unregulated crypto market.</p><p><strong>How to Protect Yourself</strong></p><p>While authorities are tackling the issue, individual vigilance is key:</p><ul><li><p><strong>Use Secure Wallets:</strong> Opt for wallets with strong security features like multi-factor authentication.</p></li><li><p><strong>Be Skeptical:</strong> Treat unsolicited messages, especially those containing links or promising high returns, with extreme caution. If an offer seems too good to be true, it probably is.</p></li><li><p><strong>Guard Your Data:</strong> Never share sensitive personal or financial information on unverified websites or in response to unsolicited requests.</p></li><li><p><strong>Stay Informed:</strong> Educate yourself about how cryptocurrencies work and the common types of scams.</p></li></ul><p>The rise in crypto-related crime underscores the need for caution in the digital asset space. By staying informed and practicing safe online habits, users can better protect themselves from becoming victims.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberthreat.report/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">CyberThreat Report is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[The Case of MITRE CVE, NIST NVD and Global Cybersecurity]]></title><description><![CDATA[Global Impacts of Instability in U.S. Federally Funded Cybersecurity Infrastructure]]></description><link>https://www.cyberthreat.report/p/the-case-of-mitre-cve-nist-nvd-and</link><guid isPermaLink="false">https://www.cyberthreat.report/p/the-case-of-mitre-cve-nist-nvd-and</guid><dc:creator><![CDATA[Ferenc Frész]]></dc:creator><pubDate>Fri, 25 Apr 2025 16:22:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rsWx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb56708b0-9116-47c6-a671-e2db069cab3f_1536x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rsWx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb56708b0-9116-47c6-a671-e2db069cab3f_1536x1024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rsWx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb56708b0-9116-47c6-a671-e2db069cab3f_1536x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rsWx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb56708b0-9116-47c6-a671-e2db069cab3f_1536x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rsWx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb56708b0-9116-47c6-a671-e2db069cab3f_1536x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rsWx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb56708b0-9116-47c6-a671-e2db069cab3f_1536x1024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rsWx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb56708b0-9116-47c6-a671-e2db069cab3f_1536x1024.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b56708b0-9116-47c6-a671-e2db069cab3f_1536x1024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:143930,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberthreat.report/i/162124870?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb56708b0-9116-47c6-a671-e2db069cab3f_1536x1024.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rsWx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb56708b0-9116-47c6-a671-e2db069cab3f_1536x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rsWx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb56708b0-9116-47c6-a671-e2db069cab3f_1536x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rsWx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb56708b0-9116-47c6-a671-e2db069cab3f_1536x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rsWx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb56708b0-9116-47c6-a671-e2db069cab3f_1536x1024.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Generated with AI by Ferenc Fr&#233;sz.</figcaption></figure></div><p>Two fundamental pillars of the global cybersecurity ecosystem, the Common Vulnerabilities and Exposures (CVE) Program operated by MITRE Corporation and the National Vulnerability Database (NVD) maintained by the National Institute of Standards and Technology (NIST), play critical roles in identifying and managing vulnerabilities worldwide. CVE provides unique identifiers for publicly known vulnerabilities, while NVD enriches this information with contextual data, such as severity scores. Recently, both organizations have faced significant funding and operational challenges: the CVE program is threatened by the expiration of its funding contract, while NVD struggles with severe and growing backlogs in processing incoming vulnerability data.</p><p>This entry analyzes the global consequences of these U.S.-centered problems. Our findings indicate that the instability of these fundamental infrastructures has serious and far-reaching effects on international organizations, governments, and the entire cybersecurity community. Key consequences include decreased efficiency in global vulnerability management processes, increased difficulty in risk assessment and patch prioritization, disruption of international vulnerability coordination efforts, and reduced reliability of cybersecurity tools (e.g., vulnerability scanners, SIEM systems) that rely on CVE and NVD data. Furthermore, the unreliability of U.S.-led fundamental cybersecurity infrastructure may undermine international trust in U.S.-led global cybersecurity initiatives and standards, potentially encouraging the development of alternative regional or national vulnerability databases, which could lead to ecosystem fragmentation.</p><h1><strong>The Essential Role of CVE and NVD</strong></h1><p>In today's modern digital world, identifying, cataloging, and managing cybersecurity vulnerabilities is essential for protecting organizations, governments, and individuals. In this complex environment, two U.S. federally funded programs have become de facto pillars of the global cybersecurity ecosystem: the Common Vulnerabilities and Exposures (CVE) Program operated by MITRE Corporation and the National Vulnerability Database (NVD) maintained by the National Institute of Standards and Technology (NIST).</p><p>The CVE program's mission is to identify, define, and catalog publicly known cybersecurity vulnerabilities. Each vulnerability receives a unique CVE identifier (e.g., CVE-2014-0160 for Heartbleed), enabling security professionals, researchers, software developers, and organizations worldwide to unambiguously and consistently reference the same issue. This unified nomenclature is essential for efficient information sharing and correlation of vulnerability data across different tools, databases, and reports.</p>
      <p>
          <a href="https://www.cyberthreat.report/p/the-case-of-mitre-cve-nist-nvd-and">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Vulnerabilities in Russian Government Information Systems]]></title><description><![CDATA[More than 1,200 vulnerabilities have been discovered in 100 operating government information systems, with most classified as high or critical level.]]></description><link>https://www.cyberthreat.report/p/vulnerabilities-in-russian-government</link><guid isPermaLink="false">https://www.cyberthreat.report/p/vulnerabilities-in-russian-government</guid><dc:creator><![CDATA[Ferenc Frész]]></dc:creator><pubDate>Fri, 21 Feb 2025 06:15:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!nyMS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6e03bf-d4bc-4246-8d5a-35adbc2fa0da_1920x1088.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nyMS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6e03bf-d4bc-4246-8d5a-35adbc2fa0da_1920x1088.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nyMS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6e03bf-d4bc-4246-8d5a-35adbc2fa0da_1920x1088.png 424w, https://substackcdn.com/image/fetch/$s_!nyMS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6e03bf-d4bc-4246-8d5a-35adbc2fa0da_1920x1088.png 848w, https://substackcdn.com/image/fetch/$s_!nyMS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6e03bf-d4bc-4246-8d5a-35adbc2fa0da_1920x1088.png 1272w, https://substackcdn.com/image/fetch/$s_!nyMS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6e03bf-d4bc-4246-8d5a-35adbc2fa0da_1920x1088.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nyMS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6e03bf-d4bc-4246-8d5a-35adbc2fa0da_1920x1088.png" width="1456" height="825" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ee6e03bf-d4bc-4246-8d5a-35adbc2fa0da_1920x1088.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:825,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2423832,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberthreat.report/i/157597869?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6e03bf-d4bc-4246-8d5a-35adbc2fa0da_1920x1088.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nyMS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6e03bf-d4bc-4246-8d5a-35adbc2fa0da_1920x1088.png 424w, https://substackcdn.com/image/fetch/$s_!nyMS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6e03bf-d4bc-4246-8d5a-35adbc2fa0da_1920x1088.png 848w, https://substackcdn.com/image/fetch/$s_!nyMS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6e03bf-d4bc-4246-8d5a-35adbc2fa0da_1920x1088.png 1272w, https://substackcdn.com/image/fetch/$s_!nyMS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6e03bf-d4bc-4246-8d5a-35adbc2fa0da_1920x1088.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Generated with AI by Ferenc Fr&#233;sz</figcaption></figure></div><p>A recent report by the Russian <strong>Federal Service for Technical and Export Control (FSTEC)</strong> reveals a troubling state of the country's IT systems security. <strong>According to the report, 47% of organizations operating within critical information infrastructure have critical vulnerabilities in their IT systems.</strong> This leaves Russian key institutions&#8212;including energy supply, transportation, financial sector, and government bodies&#8212;exposed to cyberattacks.</p>
      <p>
          <a href="https://www.cyberthreat.report/p/vulnerabilities-in-russian-government">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Russia opens a new era in cybersecurity ]]></title><description><![CDATA[The Russian government has announced a comprehensive package of measures to strengthen the fight against cybercrime, which could fundamentally change the country's digital security environment.]]></description><link>https://www.cyberthreat.report/p/russia-opens-a-new-era-in-cybersecurity</link><guid isPermaLink="false">https://www.cyberthreat.report/p/russia-opens-a-new-era-in-cybersecurity</guid><dc:creator><![CDATA[Ferenc Frész]]></dc:creator><pubDate>Sun, 16 Feb 2025 06:47:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!3Hen!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9682e6b-d0b2-4087-ac52-48726591926c_1920x1088.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3Hen!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9682e6b-d0b2-4087-ac52-48726591926c_1920x1088.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3Hen!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9682e6b-d0b2-4087-ac52-48726591926c_1920x1088.png 424w, https://substackcdn.com/image/fetch/$s_!3Hen!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9682e6b-d0b2-4087-ac52-48726591926c_1920x1088.png 848w, https://substackcdn.com/image/fetch/$s_!3Hen!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9682e6b-d0b2-4087-ac52-48726591926c_1920x1088.png 1272w, https://substackcdn.com/image/fetch/$s_!3Hen!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9682e6b-d0b2-4087-ac52-48726591926c_1920x1088.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3Hen!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9682e6b-d0b2-4087-ac52-48726591926c_1920x1088.png" width="1456" height="825" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a9682e6b-d0b2-4087-ac52-48726591926c_1920x1088.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:825,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2240440,&quot;alt&quot;:&quot;Android in a ruined office&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Android in a ruined office" title="Android in a ruined office" srcset="https://substackcdn.com/image/fetch/$s_!3Hen!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9682e6b-d0b2-4087-ac52-48726591926c_1920x1088.png 424w, https://substackcdn.com/image/fetch/$s_!3Hen!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9682e6b-d0b2-4087-ac52-48726591926c_1920x1088.png 848w, https://substackcdn.com/image/fetch/$s_!3Hen!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9682e6b-d0b2-4087-ac52-48726591926c_1920x1088.png 1272w, https://substackcdn.com/image/fetch/$s_!3Hen!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9682e6b-d0b2-4087-ac52-48726591926c_1920x1088.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Generated with AI by Ferenc Fr&#233;sz</figcaption></figure></div><h1>Comprehensive measures against digital crime </h1><p>The Russian government has announced a comprehensive package of measures to strengthen the fight against cybercrime, which could fundamentally change the country's digital security environment in 2025-2026. The initiative is particularly timely, as the number of cybercrimes has seen a dramatic increase: a 30% increase was registered in 2023 alone, which continued to grow in 2024.</p><h2>Key changes in the digital space</h2><p>The new regulation rests on several pillars, each of which aims to increase security: </p><ul><li><p><strong>Protection of state communication:</strong> A complete ban on the use of foreign messaging platforms in the state sphere, which can significantly reduce the risk of leaks and abuses.</p></li><li><p><strong>Stricter user identification:</strong> The introduction of mandatory identification for the use of online marketplaces and services, with particular attention to larger platforms.</p></li><li><p><strong>Protection against telephone fraud:</strong> Introduction of innovative solutions to identify the origin of calls and filter spam calls.</p></li></ul>
      <p>
          <a href="https://www.cyberthreat.report/p/russia-opens-a-new-era-in-cybersecurity">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Cyber Warfare: The New Frontline of Global Conflict]]></title><description><![CDATA[The Digital Claws of the GRU: Fancy Bear's Operations in Cyberspace]]></description><link>https://www.cyberthreat.report/p/cyber-warfare-the-new-frontline-of</link><guid isPermaLink="false">https://www.cyberthreat.report/p/cyber-warfare-the-new-frontline-of</guid><dc:creator><![CDATA[Ferenc Frész]]></dc:creator><pubDate>Fri, 07 Feb 2025 00:49:53 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/156642054/b998da62a95f2cedd43ab53cf136144d.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberthreat.report/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberthreat.report/subscribe?"><span>Subscribe now</span></a></p><h1><strong>Key points about APT28 (Fancy Bear):</strong></h1><p>APT28 is a state-sponsored hacker group linked to Russian military intelligence (GRU, Military Unit 26165) that has been active for over 20 years&#8288;.&#8288;&#8203;</p><ul><li><p>Their objectives include:</p></li><li><p>Intelligence gathering</p></li><li><p>Political influence operations</p></li><li><p>Weakening adversaries' critical infrastructure&#8288;&#8288;&#8203;</p></li></ul><p>The group has become increasingly active in cyber warfare, especially since the Russian-Ukrainian war began&#8288;. According to a recent Maverits analysis covering 2022-2024, the group has evolved into a well-organized cyber warfare unit within the military structure.</p><p>This is an AI podcast generated by Ferenc Fr&#233;sz using: <a href="https://try.elevenlabs.io/it48us3gulup">https://try.elevenlabs.io/</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberthreat.report/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">CyberThreat Report is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Digital Claws of the GRU: Fancy Bear's Operations in Cyberspace]]></title><description><![CDATA[Over the past three years, Russian APT28 (also known as Fancy Bear) has fine-tuned its cyber weapons and reshaped the digital battlefield through targeted attacks.]]></description><link>https://www.cyberthreat.report/p/the-digital-claws-of-the-gru-fancy</link><guid isPermaLink="false">https://www.cyberthreat.report/p/the-digital-claws-of-the-gru-fancy</guid><dc:creator><![CDATA[Katalin Béres]]></dc:creator><pubDate>Thu, 06 Feb 2025 23:25:55 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!N-mb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5555877-aa9f-44ed-b74a-d5f7c6a12ac3_1792x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!N-mb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5555877-aa9f-44ed-b74a-d5f7c6a12ac3_1792x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!N-mb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5555877-aa9f-44ed-b74a-d5f7c6a12ac3_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!N-mb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5555877-aa9f-44ed-b74a-d5f7c6a12ac3_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!N-mb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5555877-aa9f-44ed-b74a-d5f7c6a12ac3_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!N-mb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5555877-aa9f-44ed-b74a-d5f7c6a12ac3_1792x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!N-mb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5555877-aa9f-44ed-b74a-d5f7c6a12ac3_1792x1024.webp" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a5555877-aa9f-44ed-b74a-d5f7c6a12ac3_1792x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:660036,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!N-mb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5555877-aa9f-44ed-b74a-d5f7c6a12ac3_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!N-mb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5555877-aa9f-44ed-b74a-d5f7c6a12ac3_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!N-mb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5555877-aa9f-44ed-b74a-d5f7c6a12ac3_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!N-mb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5555877-aa9f-44ed-b74a-d5f7c6a12ac3_1792x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Cyber warfare has played an increasingly significant role in geopolitical conflicts in recent years, especially since the outbreak of the Russian-Ukrainian war.</p><p>APT28 - also known as Fancy Bear, Sofacy, or STRONTIUM - linked to Russian military intelligence (GRU, Military Unit 26165) is one of the most well-known and active state-sponsored hacker groups, closely tied to Russian military and geopolitical interests for more than 20 years.</p><p>This group not only conducts classical cyber espionage but has also become a key player in modern information warfare and cyber warfare. APT28's objectives include gathering intelligence, political influence operations, and weakening adversaries' critical infrastructure.</p><p>APT28 is therefore not simply a hacker group, but a well-organized cyber warfare unit that fits into military structure, continuously evolving and serving as a key player in the war being waged in cyberspace.</p><p>In a recently published analysis<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>, Maverits examined the activities of this group, APT28, between 2022 and 2024. It's worth noting that the cybersecurity firm conducting the analysis is headquartered in Ukraine, maintaining close ties with Ukrainian national security and defense organizations. This geographical and operational position enabled the report to rely on the most current and in-depth information possible.</p><p>The article aims to summarize the key findings of the Maverits report and place them in a broader context, demonstrating how APT28's activities fit into Russian military-diplomatic strategy and global cyber warfare trends.</p><div><hr></div><h1>APT28's Target Countries and Geopolitical Objectives</h1><p>APT28's activities have always been closely tied to Russia's geopolitical interests. However, in the past three years, the group's geographical focus of attacks has somewhat shifted as a consequence of the war that broke out in 2022. The analysis of target countries not only shows where APT28 is active, but</p>
      <p>
          <a href="https://www.cyberthreat.report/p/the-digital-claws-of-the-gru-fancy">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>