{"id":16536,"date":"2020-06-09T14:00:55","date_gmt":"2020-06-09T17:00:55","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=16536"},"modified":"2020-06-09T13:04:50","modified_gmt":"2020-06-09T16:04:50","slug":"covid-19-cyber-threat-assessment","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/covid-19-cyber-threat-assessment\/","title":{"rendered":"COVID-19 Cyber Threat Assessment"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-16537\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/06\/covid-19-cyber-threat-assessment.jpg\" alt=\"COVID-19 Cyber Threat Assessment\" width=\"145\" height=\"205\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/06\/covid-19-cyber-threat-assessment.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/06\/covid-19-cyber-threat-assessment-106x150.jpg 106w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>THALES<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> The aggravation of the COVID-19 crisis in Europe, which has become the new epicenter of the epidemic, implies an increase in the number of threat actors using decoys linked to this news to compromise their victims.<br \/>\nA change in this dynamic must in particular be taken into account by critical institutions and organizations. While the actors taking advantage of the news to carry out their attacks were initially cybercriminals, more and more state-sponsored groups (Advanced Persistent Threat) are now using this theme as part of their espionage campaigns.<br \/>\nAnother phenomenon to watch out for is the growing number of Android mobile applications being used to largely compromise the populations.<br \/>\nGlobally it appears today, according to several sources, that 50% of the domain names created since December and linked to the theme of COVID-19 or Coronavirus can lead to the injection of malicious software.<\/p>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2020\/06\/covid-19-cyber-threat-assessment.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>THALES R\u00e9sum\u00e9: The aggravation of the COVID-19 crisis in Europe, which has become the new epicenter of the epidemic, implies an increase in the number of threat actors using decoys linked to this news to compromise their victims. A change in this dynamic must in particular be taken into account by critical institutions and organizations. While the actors taking advantage of the news to carry out their attacks were initially&hellip; <\/p>\n","protected":false},"author":3,"featured_media":16537,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,6,112],"tags":[],"class_list":["post-16536","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-livros","category-download"],"views":113,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=16536"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16536\/revisions"}],"predecessor-version":[{"id":16538,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16536\/revisions\/16538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/16537"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=16536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=16536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=16536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}