{"id":927,"date":"2022-12-01T09:08:59","date_gmt":"2022-12-01T09:08:59","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=927"},"modified":"2022-12-01T10:35:48","modified_gmt":"2022-12-01T10:35:48","slug":"whats-next-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/","title":{"rendered":"What\u2019s next in cybersecurity"},"content":{"rendered":"<div>\n<div class=\"gutenbergContent__content--1FgGp html_0\">\n<p>In the world of cybersecurity, there is always one certainty: more hacks. That is the unavoidable constant in an industry that will spend\u00a0<a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2021-05-17-gartner-forecasts-worldwide-security-and-risk-managem\">an estimated $150 billion worldwide this year<\/a> without being able, yet again, to actually stop hackers. This past year has seen Russian government hacks aimed at Ukraine; more ransomware against hospitals <a href=\"https:\/\/www.vice.com\/en\/article\/88qvmx\/how-ransomware-is-causing-chaos-in-american-schools\">and schools<\/a>\u2014and against whole governments too; a seemingly endless series of costly crypto hacks; and high-profile hacks of companies like\u00a0<a href=\"https:\/\/techcrunch.com\/2022\/03\/23\/microsoft-lapsus-hack-source-code\/?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAAHgH1l9xI-d0i1f4raFoSmXimVndbDDmUdVBrx1e4_ff0pGumNZFLBumn76iiHvmCQayfllc2DICBW-WXGHm0fZg5UZuDfJ9tY1vg8wVMAoVdLTTE722Nk1_oaz55B83Mk8UjcfBF6Be9uJ1ubQA1RNphxj3RdUrxRFg3DrVjk3I\">Microsoft<\/a>, Nvidia, and Grand Theft Auto maker\u00a0<a href=\"https:\/\/www.vice.com\/en\/article\/n7zd4m\/rockstar-confirms-gta6-hack-was-real\">Rockstar Games, the last hack allegedly carried out by<\/a>\u00a0<a href=\"https:\/\/fortune.com\/2022\/03\/24\/mastermind-lapsus-microsoft-nvidia-okta-hack-16-year-old-living-mom\/\">teenagers<\/a>. All these types of hacks will continue next year and in the near future, according to cybersecurity experts who spoke to MIT Tech Review. Here\u2019s what we expect to see more of in the coming year:<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<div>\n<div class=\"gutenbergContent__content--1FgGp html_2\">\n<h3><strong>Russia continues its online operations against Ukraine<\/strong><\/h3>\n<p>Ukraine was the big story of the year in cybersecurity as in other news. The industry turned its attention to the embattled country, which suffered several attacks by Russian government groups. One of the first ones hit\u00a0<a href=\"https:\/\/www.wired.com\/story\/viasat-internet-hack-ukraine-russia\/\">Viasat<\/a>, a US satellite communications company that was being used by civilians and troops in Ukraine. The hack caused \u201ca really huge loss in communications in the very beginning of war,\u201d\u00a0<a href=\"https:\/\/www.wired.co.uk\/article\/viasat-internet-hack-ukraine-russia\">according to Victor Zhora<\/a>, the head of Ukraine\u2019s defensive cybersecurity agency.<\/p>\n<p>There have also been as many as\u00a0<a href=\"https:\/\/twitter.com\/juanandres_gs\/status\/1509552409781186571\">six attacks<\/a>\u00a0against Ukrainian targets involving wiper malware, malicious computer code designed to destroy data.<\/p>\n<p>These were all in support of military operations, not acts of war per se, which could still mean that \u201ccyberwarfare is a very misleading term and the cyberwar, as such, will not really happen,\u201d says Stefano Zanero, an associate professor at the computer engineering department of Politecnico di Milano.<\/p>\n<p><a href=\"https:\/\/www.technologyreview.com\/2022\/11\/28\/1063703\/whats-next-in-cybersecurity\/\">Read the Full Story Here<\/a><\/p>\n<p>Source: Technology Review<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In the world of cybersecurity, there is always one certainty: more hacks. That is the unavoidable constant in an industry that will spend\u00a0an estimated $150 billion worldwide this year without being able, yet again, to actually stop hackers. This past year has seen Russian government hacks aimed at Ukraine; more ransomware against hospitals and schools\u2014and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":868,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-927","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What\u2019s next in cybersecurity - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What\u2019s next in cybersecurity - Community\" \/>\n<meta property=\"og:description\" content=\"In the world of cybersecurity, there is always one certainty: more hacks. That is the unavoidable constant in an industry that will spend\u00a0an estimated $150 billion worldwide this year without being able, yet again, to actually stop hackers. This past year has seen Russian government hacks aimed at Ukraine; more ransomware against hospitals and schools\u2014and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-01T09:08:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-01T10:35:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2022\/06\/pexels-marek-levak-2265488.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/\",\"name\":\"What\u2019s next in cybersecurity - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2022\/06\/pexels-marek-levak-2265488.jpg\",\"datePublished\":\"2022-12-01T09:08:59+00:00\",\"dateModified\":\"2022-12-01T10:35:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2022\/06\/pexels-marek-levak-2265488.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2022\/06\/pexels-marek-levak-2265488.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What\u2019s next in cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What\u2019s next in cybersecurity - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"What\u2019s next in cybersecurity - Community","og_description":"In the world of cybersecurity, there is always one certainty: more hacks. That is the unavoidable constant in an industry that will spend\u00a0an estimated $150 billion worldwide this year without being able, yet again, to actually stop hackers. This past year has seen Russian government hacks aimed at Ukraine; more ransomware against hospitals and schools\u2014and [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2022-12-01T09:08:59+00:00","article_modified_time":"2022-12-01T10:35:48+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2022\/06\/pexels-marek-levak-2265488.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/","name":"What\u2019s next in cybersecurity - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2022\/06\/pexels-marek-levak-2265488.jpg","datePublished":"2022-12-01T09:08:59+00:00","dateModified":"2022-12-01T10:35:48+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2022\/06\/pexels-marek-levak-2265488.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2022\/06\/pexels-marek-levak-2265488.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/whats-next-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"What\u2019s next in cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=927"}],"version-history":[{"count":5,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/927\/revisions"}],"predecessor-version":[{"id":932,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/927\/revisions\/932"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/868"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=927"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=927"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}