Cyberattacks Are Rising: Key Insights from ENISA on Russian Hackers

Tuesday, 17 September 2024, 04:53

Cyberattacks are surging, with the European Union Agency for Cybersecurity (ENISA) highlighting threats from Russian hackers. The UK telecom company BT Group reveals alarming statistics, detecting around 2,000 potential cyberattacks every second. This significant rise in cyber threats indicates a need for enhanced cybersecurity measures across various industries.
Firstpost
Cyberattacks Are Rising: Key Insights from ENISA on Russian Hackers

The Rise of Cyberattacks

Cyberattacks are posing increasing threats to businesses and essential services. The UK's largest telecommunications provider, BT Group, has disclosed that its platforms detect approximately 2,000 potential cyberattacks every second. Each day, devices connected to the internet are scanned around 1,000 times by malicious entities, revealing an alarming trend – cyber threats surface roughly every 90 seconds.

Analyzing the Threat Landscape

  • 75% of scans are harmful: BT's report underscores that many scans represent hackers probing for vulnerabilities.
  • Industries at risk include IT, defence, and financial services, but sectors like hospitality and retail are increasingly vulnerable.
  • One-time-use bots are a growing tool for hackers, obscuring the source of cyberattacks.

Implications for Cybersecurity

The report signifies a sophisticated effort to breach systems across a wide range of industries, with a staggering 1,234% rise in new IP addresses involved in scanning attempts over the past year. As businesses in the UK prepare to boost their technology investments by 31% in 2024, there remains a concerning gap in adequate cybersecurity strategies.

A Call to Action for Businesses

As Russian-based hackers intensify their cyber warfare, the urgency for businesses to invest in comprehensive cybersecurity measures escalates. The ongoing war in Ukraine serves as a backdrop to this digital aggression, emphasizing that organizations across all sectors need to stay proactive in defending their systems from persistent threats.


This article was prepared using information from open sources in accordance with the principles of Ethical Policy. The editorial team is not responsible for absolute accuracy, as it relies on data from the sources referenced.


Related posts


Newsletter

Subscribe to our newsletter for the most reliable and up-to-date tech news. Stay informed and elevate your tech expertise effortlessly.

Subscribe