Europe's critical information infrastructure (CII) are those interconnected information and communication infrastructures essential for the maintenance of vital societal functions (health, safety, security, economic or social well-being of people). Any disruption or destruction would have serious consequences. In today's digital era, the increased usage of information technology in modern CIIs makes them vulnerable to cyber-related crime. The EU-funded CyberSANE project will enhance their security and resilience by providing a dynamic collaborative warning and response system. This will support and guide security officers to recognise, identify, dynamically analyse, forecast, treat and respond to advanced persistent threats and handle their daily cyber incidents utilising and combining both structured data and unstructured data coming from social networks and the dark web.
In the digital era, Critical Infrastructures (CIs) are operating under the premise of robust and reliable ICT components, complex ICT infrastructures and emerging technologies and are transforming into Critical Information Infrastructures (CIIs) that can offer a high degree of flexibility, scalability, and efficiency in the communication and coordination of advanced services and processes. The increased usage of information technology in modern CIIs means that they are becoming more vulnerable to the activities of hackers and other perpetrators of cyber-related crime (cyber criminals). Several recent studies have shown that the landscape of cyber threats is changing continuously and the nature of attacks of this sort are evolving, involving a great degree of persistence and (technical) sophistication.
In addition to this, barriers to entry for would-be cyber criminals are falling rapidly, and nowadays, the attackers have a range of (technical) capabilities and substantial resources at their disposal, since malware and malware-as-a service become more easily and cheaply available through various means and sources (such as Dark Web, Deep Web). Thus, a variety of advanced techniques and tools (e.g. social engineering techniques and zero-day exploits programs) are available and can be used by the cyber criminals to initiate advanced targeted attacks. These threats employ multiple technologies and malware, deployed in multiple stages, to bypass traditional security mechanisms in order to penetrate an organization’s defenses. The attack vectors vary significantly including Application-Layer, Social Engineering Unauthorized Access, Malicious Code, and Reconnaissance and Networking-based service attacks that target applications, host and client operating systems, and even networking equipment. In this vein, the attackers use these techniques to get valuable data assets, such as financial transaction information, user credentials, insider information etc.
Startup OLÉ 2023 will take place from the 4th – 7th of September, and has gather along its history +40.000 attendees from +120 countries; +1.500 startups, scaleups and spin offs; +1.200 speakers; +300 corporates and investors with investment portfolio of over €100kM. Our goal is to present the pr
Terrorist Content Online (TCO): how to prevent it?
How terrorist organisations spread TCO and what can be done to stop it
Terrorists and violent extremists are increasingly trying to find new ways to exploit the internet. The growth of terrorist propaganda to recruit and inspire attacks is a risk to us all.
The digital landscape is evolving, and so are the threats that dwell within it. In the realm of cybersecurity, where knowledge is armor and collaboration is key, HSbooster.eu is organising a webinar that gathers experts of the digital frontier and key actors leading the European standardisation efforts in cybersecurity.