{"id":13676,"date":"2022-06-08T09:34:20","date_gmt":"2022-06-08T09:34:20","guid":{"rendered":"http:\/\/3.126.211.109\/?p=13676"},"modified":"2024-03-24T17:32:17","modified_gmt":"2024-03-24T17:32:17","slug":"in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2022\/06\/08\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\/","title":{"rendered":"In global cyber warfare, the wolf may come dressed as a lamb"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h3><strong>Fake News, false charities, Phishing, and Spam for a borderless Cyberwar\u00a0\u00a0<\/strong>\u00a0<\/h3>\n<\/p>\n<p>The world is at war, and confusion reigns supreme. Viruses, airstrikes, energy shortages, skyrocketing fuel prices, widespread poverty, and Fake News. An apocalyptic scenario in which we no longer even know who the real enemy is and from where the various types of attacks can arrive. So, while TV and newspapers report on explosions and victims east of Europe, another great cyber warfare is being fought in cyberspace. The one waged by cybercriminals who always benefit enormously from confusion.\u00a0\u00a0<\/p>\n<\/p>\n<h5>C<strong>yber attacks,<\/strong>\u00a0different front-lines, and deployments\u00a0\u00a0<\/h5>\n<\/p>\n<p>The fronts are different here as well, however. According to the Threat Intelligence division of Check Point Software Technologies, cyberattacks targeting the government and military sector of Ukraine have increased by 196%, those targeting Ukrainian citizens, companies, and institutions by 20%. Also, against Russia, the increase in attacks has been remarkable. This is also because of famous circles such as Anonymous and GhostSec. The former claims to have stolen 20 terabytes of data from the Russian state-owned oil company Rosneft. The latter carried out some special attacks, such as the theft of a database containing the personal data of over 120,000 members of the Russian army, including phone numbers and addresses. These are joined by other hacker groups, such as Belarus activists, some Russian-speaking mercenary groups, and the Conti Group, which is well known in the cyber security world for its ransomware attacks. As you can easily imagine, all of this has severe repercussions on a global level. According to CheckPoint\u2019s monitoring, attacks on government and military sectors worldwide have already increased by 21% since the beginning of the conflict. This is an undeniable sign of how much the Russian-Ukrainian war is a global conflict and not only confined to the geographical space of the two protagonist countries.\u00a0\u00a0<\/p>\n<\/p>\n<h5><strong>Fake News, among manipulation and fraud\u00a0\u00a0<\/strong>\u00a0<\/h5>\n<\/p>\n<p>In short, real cyber guerilla warfare is full of conspiracies and unexpected twists, false information, and deception. For example, it seems that it is not true, as it was announced by some, that the collective AgainstTheWest had been resurrected to join Anonymous. Just as it seems not to be true that the Dubna Nuclear Power Plant systems have been hacked. In fact, the video used to claim the supposed cyber attack has been on YouTube for a year already. The list of Fake News is incredibly long. So long that distinguishing real news from fake news has become an actual undertaking. So much so that the BBC has decided to provide a list of valuable tips to defend against Fake News. Advice should help citizens untangle themselves from old videos, edited photos, propaganda, and fake fact-checking sites. In short, so much material that not even the most exciting cyber-thriller could be more inventive. Unfortunately, this is not a movie but the reality that we are all living.\u00a0\u00a0<\/p>\n<\/p>\n<h5>Charity: use only official sites<\/h5>\n<\/p>\n<p>Meanwhile, terrible images of war are being exploited by cybercriminals to appeal to a sense of compassion and a desire to help civilians in need. It\u2019s no coincidence that spam campaigns and scam campaigns targeting charitable efforts have intensified during this period. Thus, as new research on the latest wave of spam and phishing, presented by Bitdefender labs, has shown, cybercriminals posing as UNICEF, the Ukrainian government, the international aid agency Act for Peace, or other fundraising projects such as the Ukraine Crisis Relief Fund, are circulating in Europe and the US with a campaign saying \u201cSupport the people of Ukraine. We are now accepting donations in cryptocurrencies, including Bitcoin, Ethereum, and USDT.\u201d\u00a0<\/p>\n<\/p>\n<p>Obviously, the e-mails coming from Chinese IP addresses have only one goal: to scam unsuspecting users, inviting them to pay money. Therefore, it has nothing to do with charity and with aid to the Ukrainian people.\u00a0<\/p>\n<\/p>\n<h5><strong>A war that overflows with phishing emails and spamming<\/strong><\/h5>\n<\/p>\n<p>Many European manufacturing companies are victims of this war, targeted by a phishing e-mail campaign, \u201cSupplier Survey: Effect of the supply chain from the Ukraine\/Russia conflict.\u201d In the e-mail, the hackers, in disguise, solicit the receiving suppliers to fill in a form in attachment to signal eventual delays and backup planning. Fertile ground that exploits the worries caused by the war and the severe supply consequences. Obviously, the attached Excel form contains a well-known Malware-as-a-Service capable of stealing confidential data and information such as login credentials, keystrokes, and memo data. In such a scenario, Italy isn\u2019t at ease since the president of the Parliamentary Committee for the Security of the Republic, Antonio Urso, recently launched a warning cry on our country\u2019s vulnerability, pointing out cyber warfare as one of the significant risks that can affect us. The National Cybersecurity Agency has stepped up the pace by warning Italian companies of the urgency of \u201cconducting a risk analysis of the cybersecurity solutions used and considering the implementation of appropriate diversification strategies regarding, in particular: antivirus, web application firewall, e-mail protection; cloud services protection; managed security services.\u201d<\/p>\n<\/p>\n<p>No tool can guarantee total security because the weakest link is always human error. And it is only by limiting the latter the risks can be significantly reduced. There is only one way to do this: training, which must always be up-to-date, and practice, which must be constant and uninterrupted. Because only by getting to know the world of the web well and learning in the field to recognize the various types of attacks can we be confident of not encountering unpleasant surprises.\u00a0\u00a0<strong><\/strong><\/p>\n<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fake News, false charities, Phishing, and Spam for a borderless Cyberwar\u00a0\u00a0\u00a0 The world is at war, and confusion reigns supreme. Viruses, airstrikes, energy shortages, skyrocketing fuel prices, widespread poverty, and Fake News. An apocalyptic scenario in which we no longer even know who the real enemy is and from where the various types of attacks [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":11482,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:heading {\"level\":3} -->\n<h3><strong>Fake News, false charities, Phishing, and Spam for a borderless Cyberwar&nbsp;&nbsp;<\/strong>&nbsp;<\/h3>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>The world is at war, and confusion reigns supreme. Viruses, airstrikes, energy shortages, skyrocketing fuel prices, widespread poverty, and Fake News. An apocalyptic scenario in which we no longer even know who the real enemy is and from where the various types of attacks can arrive. So, while TV and newspapers report on explosions and victims east of Europe, another great cyber warfare is being fought in cyberspace. The one waged by cybercriminals who always benefit enormously from confusion.&nbsp;&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5>C<strong>yber attacks,<\/strong>&nbsp;different front-lines, and deployments&nbsp;&nbsp;<\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>The fronts are different here as well, however. According to the Threat Intelligence division of Check Point Software Technologies, cyberattacks targeting the government and military sector of Ukraine have increased by 196%, those targeting Ukrainian citizens, companies, and institutions by 20%. Also, against Russia, the increase in attacks has been remarkable. This is also because of famous circles such as Anonymous and GhostSec. The former claims to have stolen 20 terabytes of data from the Russian state-owned oil company Rosneft. The latter carried out some special attacks, such as the theft of a database containing the personal data of over 120,000 members of the Russian army, including phone numbers and addresses. These are joined by other hacker groups, such as Belarus activists, some Russian-speaking mercenary groups, and the Conti Group, which is well known in the cyber security world for its ransomware attacks. As you can easily imagine, all of this has severe repercussions on a global level. According to CheckPoint\u2019s monitoring, attacks on government and military sectors worldwide have already increased by 21% since the beginning of the conflict. This is an undeniable sign of how much the Russian-Ukrainian war is a global conflict and not only confined to the geographical space of the two protagonist countries.&nbsp;&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5><strong>Fake News, among manipulation and fraud&nbsp;&nbsp;<\/strong>&nbsp;<\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>In short, real cyber guerilla warfare is full of conspiracies and unexpected twists, false information, and deception. For example, it seems that it is not true, as it was announced by some, that the collective AgainstTheWest had been resurrected to join Anonymous. Just as it seems not to be true that the Dubna Nuclear Power Plant systems have been hacked. In fact, the video used to claim the supposed cyber attack has been on YouTube for a year already. The list of Fake News is incredibly long. So long that distinguishing real news from fake news has become an actual undertaking. So much so that the BBC has decided to provide a list of valuable tips to defend against Fake News. Advice should help citizens untangle themselves from old videos, edited photos, propaganda, and fake fact-checking sites. In short, so much material that not even the most exciting cyber-thriller could be more inventive. Unfortunately, this is not a movie but the reality that we are all living.&nbsp;&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5>Charity: use only official sites<\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Meanwhile, terrible images of war are being exploited by cybercriminals to appeal to a sense of compassion and a desire to help civilians in need. It\u2019s no coincidence that spam campaigns and scam campaigns targeting charitable efforts have intensified during this period. Thus, as new research on the latest wave of spam and phishing, presented by Bitdefender labs, has shown, cybercriminals posing as UNICEF, the Ukrainian government, the international aid agency Act for Peace, or other fundraising projects such as the Ukraine Crisis Relief Fund, are circulating in Europe and the US with a campaign saying \u201cSupport the people of Ukraine. We are now accepting donations in cryptocurrencies, including Bitcoin, Ethereum, and USDT.\u201d&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Obviously, the e-mails coming from Chinese IP addresses have only one goal: to scam unsuspecting users, inviting them to pay money. Therefore, it has nothing to do with charity and with aid to the Ukrainian people.&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5><strong>A war that overflows with phishing emails and spamming<\/strong><\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Many European manufacturing companies are victims of this war, targeted by a phishing e-mail campaign, \u201cSupplier Survey: Effect of the supply chain from the Ukraine\/Russia conflict.\u201d In the e-mail, the hackers, in disguise, solicit the receiving suppliers to fill in a form in attachment to signal eventual delays and backup planning. Fertile ground that exploits the worries caused by the war and the severe supply consequences. Obviously, the attached Excel form contains a well-known Malware-as-a-Service capable of stealing confidential data and information such as login credentials, keystrokes, and memo data. In such a scenario, Italy isn\u2019t at ease since the president of the Parliamentary Committee for the Security of the Republic, Antonio Urso, recently launched a warning cry on our country\u2019s vulnerability, pointing out cyber warfare as one of the significant risks that can affect us. The National Cybersecurity Agency has stepped up the pace by warning Italian companies of the urgency of \u201cconducting a risk analysis of the cybersecurity solutions used and considering the implementation of appropriate diversification strategies regarding, in particular: antivirus, web application firewall, e-mail protection; cloud services protection; managed security services.\u201d<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>No tool can guarantee total security because the weakest link is always human error. And it is only by limiting the latter the risks can be significantly reduced. There is only one way to do this: training, which must always be up-to-date, and practice, which must be constant and uninterrupted. Because only by getting to know the world of the web well and learning in the field to recognize the various types of attacks can we be confident of not encountering unpleasant surprises.&nbsp;&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:group {\"backgroundColor\":\"very-light-gray\"} -->\n<div class=\"wp-block-group has-very-light-gray-background-color has-background\"><!-- wp:paragraph {\"align\":\"center\",\"textColor\":\"luminous-vivid-orange\"} -->\n<p class=\"has-text-align-center has-luminous-vivid-orange-color has-text-color\"><a aria-label=\" (apre in una nuova scheda)\" rel=\"noreferrer noopener\" href=\"https:\/\/www.cyberguru.it\/soluzioni-cyber-security-awareness\/\" target=\"_blank\"><strong>To learn more about Cyber Guru Awareness <\/strong><\/a><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"center\",\"textColor\":\"luminous-vivid-orange\"} -->\n<p class=\"has-text-align-center has-luminous-vivid-orange-color has-text-color\"><a href=\"https:\/\/www.cyberguru.eu\/cyber-guru-phishing\/\"><strong>To learn more about Cyber Guru Phishing<\/strong><\/a>  <\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"center\",\"textColor\":\"luminous-vivid-orange\"} -->\n<p class=\"has-text-align-center has-luminous-vivid-orange-color has-text-color\"><a href=\"https:\/\/www.cyberguru.eu\/cyber-guru-channel\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>To learn more about Cyber Guru Channel<\/strong><\/a><\/p>\n<!-- \/wp:paragraph --><\/div>\n<!-- \/wp:group -->","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[422],"tags":[487,468,470,488,491],"class_list":["post-13676","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","tag-cyber-awareness-en-2","tag-cyber-security-en-2","tag-cyber-security-awareness-en-3","tag-cybersecurity-trends-en-2","tag-hackers-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>In global cyber warfare, the wolf may come dressed as a lamb - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Discover the hidden reality of modern warfare and cyberattacks. Explore the impact of cybercriminals and the confusion they benefit from.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2022\/06\/08\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"In global cyber warfare, the wolf may come dressed as a lamb\" \/>\n<meta property=\"og:description\" content=\"Discover the hidden reality of modern warfare and cyberattacks. Explore the impact of cybercriminals and the confusion they benefit from.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2022\/06\/08\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-08T09:34:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-24T17:32:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/03\/Guerra-Cyber.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"290\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/08\\\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/08\\\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"In global cyber warfare, the wolf may come dressed as a lamb\",\"datePublished\":\"2022-06-08T09:34:20+00:00\",\"dateModified\":\"2024-03-24T17:32:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/08\\\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\\\/\"},\"wordCount\":1021,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/08\\\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Guerra-Cyber.jpg\",\"keywords\":[\"Cyber Awareness\",\"Cyber Security\",\"Cyber Security Awareness\",\"cybersecurity trends\",\"hackers\"],\"articleSection\":[\"Security Awareness\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/08\\\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/08\\\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\\\/\",\"name\":\"In global cyber warfare, the wolf may come dressed as a lamb - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/08\\\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/08\\\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Guerra-Cyber.jpg\",\"datePublished\":\"2022-06-08T09:34:20+00:00\",\"dateModified\":\"2024-03-24T17:32:17+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Discover the hidden reality of modern warfare and cyberattacks. Explore the impact of cybercriminals and the confusion they benefit from.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/08\\\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/08\\\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/08\\\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Guerra-Cyber.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Guerra-Cyber.jpg\",\"width\":500,\"height\":290,\"caption\":\"cyber warfare\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/08\\\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"In global cyber warfare, the wolf may come dressed as a lamb\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"In global cyber warfare, the wolf may come dressed as a lamb - Cyber Guru","description":"Discover the hidden reality of modern warfare and cyberattacks. Explore the impact of cybercriminals and the confusion they benefit from.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2022\/06\/08\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\/","og_locale":"en_US","og_type":"article","og_title":"In global cyber warfare, the wolf may come dressed as a lamb","og_description":"Discover the hidden reality of modern warfare and cyberattacks. Explore the impact of cybercriminals and the confusion they benefit from.","og_url":"https:\/\/www.cyberguru.it\/en\/2022\/06\/08\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2022-06-08T09:34:20+00:00","article_modified_time":"2024-03-24T17:32:17+00:00","og_image":[{"width":500,"height":290,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/03\/Guerra-Cyber.jpg","type":"image\/jpeg"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"Written by":"m.baciucco","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/08\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/08\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"In global cyber warfare, the wolf may come dressed as a lamb","datePublished":"2022-06-08T09:34:20+00:00","dateModified":"2024-03-24T17:32:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/08\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\/"},"wordCount":1021,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/08\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/03\/Guerra-Cyber.jpg","keywords":["Cyber Awareness","Cyber Security","Cyber Security Awareness","cybersecurity trends","hackers"],"articleSection":["Security Awareness"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/08\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\/","url":"https:\/\/www.cyberguru.it\/en\/2022\/06\/08\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\/","name":"In global cyber warfare, the wolf may come dressed as a lamb - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/08\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/08\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/03\/Guerra-Cyber.jpg","datePublished":"2022-06-08T09:34:20+00:00","dateModified":"2024-03-24T17:32:17+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Discover the hidden reality of modern warfare and cyberattacks. Explore the impact of cybercriminals and the confusion they benefit from.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/08\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2022\/06\/08\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/08\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/03\/Guerra-Cyber.jpg","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/03\/Guerra-Cyber.jpg","width":500,"height":290,"caption":"cyber warfare"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/08\/in-global-cyber-warfare-the-wolf-may-come-dressed-as-a-lamb\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"In global cyber warfare, the wolf may come dressed as a lamb"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/en\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/13676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=13676"}],"version-history":[{"count":7,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/13676\/revisions"}],"predecessor-version":[{"id":36667,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/13676\/revisions\/36667"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/11482"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=13676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=13676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=13676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}