Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 4 July, 2022
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Cyber attack attempts on Ukraine surge tenfold

Vulnerability exploit attempts against Ukrainian websites have increased significantly since Russia invaded

by Josh Breaker-rolfe
March 3, 2022
in Cyber Bites
man with wordpress t shirt on laptop
Share on FacebookShare on Twitter

A threat actor in support of Russia has compromised at least 30 Ukrainian universities as vulnerability exploit attempts have surged, according to Wordfence.

The security firm has generated useful intelligence on the the attacks campaign as it protects over 8300 Ukrainian WordPress sites, including those of private businesses, government, military and police.

The attack campaign spiked on February 25th as the invasion began.

According to Mark Maunder., CEO of Wordfence parent company Defiant, total attempts to exploit WordPress vulnerabilities in Ukraine reached 144,000 on the day of the invasion, around three times that of daily attacks from earlier in the month.

This surged even further over a longer period.

“We compiled a list of websites that had received at least double the number of attacks from the day before the invasion started, until Monday February 28, which is a window of about 5.5 days, compared to the entire 27 days before the attack started. That’s about a 10 times increase in the average daily number of attacks,” Maunder explained.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Medical infusion pumps vulnerable to attack

Next Post

Blackouts hit Ukraine

Recent News

TikTok Assures U.S. Lawmakers That They Are Working to Further Safeguard User Data From Chinese Staff

TikTok Assures U.S. Lawmakers That They Are Working to Further Safeguard User Data From Chinese Staff

July 4, 2022
UK Government Acquires Its First Quantum Computer

Threat Actor Group Claims Responsibility for High Profile University Hacks

July 4, 2022
Microsoft Office Building

Microsoft Issue Updated Warning Against Known Cloud Threat Actor Group

July 4, 2022
A Vulnerability Management Program is Nothing Without Identity Risk Protection

A Vulnerability Management Program is Nothing Without Identity Risk Protection

July 1, 2022

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information