{"id":43386,"date":"2022-01-19T10:27:14","date_gmt":"2022-01-19T15:27:14","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=43386"},"modified":"2022-07-27T07:17:08","modified_gmt":"2022-07-27T11:17:08","slug":"9-advanced-cybersecurity-threats-gr","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/9-advanced-cybersecurity-threats-gr\/43386\/","title":{"rendered":"\u0393\u03b9\u03b1\u03c4\u03af \u03b1\u03c5\u03c4\u03ad\u03c2 \u03bf\u03b9 9 \u03c0\u03c1\u03bf\u03b7\u03b3\u03bc\u03ad\u03bd\u03b5\u03c2 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b1\u03c0\u03b5\u03b9\u03bb\u03ad\u03c2 \u03b1\u03c0\u03b1\u03b9\u03c4\u03bf\u03cd\u03bd \u03bd\u03b1 \u03bb\u03ac\u03b2\u03b5\u03c4\u03b5 \u03b4\u03c1\u03ac\u03c3\u03b7"},"content":{"rendered":"<p>\u039f\u03b9 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 \u03b1\u03c0\u03bf\u03c4\u03b5\u03bb\u03bf\u03cd\u03bd \u03c4\u03b7 \u03bc\u03b5\u03b3\u03b1\u03bb\u03cd\u03c4\u03b5\u03c1\u03b7 \u03b1\u03c0\u03b5\u03b9\u03bb\u03ae \u03b3\u03b9\u03b1 \u03c4\u03b9\u03c2 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2 \u03c3\u03ae\u03bc\u03b5\u03c1\u03b1. \u03a0\u03c1\u03bf\u03b2\u03bb\u03ad\u03c0\u03c9 \u03ac\u03c1\u03b1 \u03c0\u03c1\u03bf\u03b5\u03c4\u03bf\u03b9\u03bc\u03ac\u03b6\u03bf\u03bc\u03b1\u03b9, \u03b5\u03c0\u03bf\u03bc\u03ad\u03bd\u03c9\u03c2 \u03b5\u03b4\u03ce \u03b5\u03af\u03bd\u03b1\u03b9 \u03bc\u03af\u03b1 \u03bc\u03b9\u03ba\u03c1\u03ae \u03bb\u03af\u03c3\u03c4\u03b1 \u03bc\u03b5 \u03c4\u03b9\u03c2 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 \u03c0\u03bf\u03c5 \u03c0\u03c1\u03ad\u03c0\u03b5\u03b9 \u03bd\u03b1 \u03b3\u03bd\u03c9\u03c1\u03af\u03b6\u03b5\u03c4\u03b5.<\/p>\n<p>\u0397 \u03c4\u03b5\u03c7\u03bd\u03bf\u03bb\u03bf\u03b3\u03af\u03b1 \u03b5\u03af\u03bd\u03b1\u03b9 \u03c0\u03bb\u03ad\u03bf\u03bd \u03b7 \u03b5\u03c0\u03b9\u03c7\u03b5\u03af\u03c1\u03b7\u03c3\u03ae \u03c3\u03b1\u03c2 \u2013 \u03cc\u03c0\u03bf\u03b9\u03b1 \u03ba\u03b9 \u03b1\u03bd \u03b5\u03af\u03bd\u03b1\u03b9 \u03b7 \u03b5\u03c0\u03b9\u03c7\u03b5\u03af\u03c1\u03b7\u03c3\u03ae \u03c3\u03b1\u03c2. \u03a4\u03b1 \u03b1\u03bd\u03ce\u03c4\u03b5\u03c1\u03b1 \u03c3\u03c4\u03b5\u03bb\u03ad\u03c7\u03b7 \u03c0\u03c1\u03ad\u03c0\u03b5\u03b9 \u03bd\u03b1 \u03c3\u03ba\u03ad\u03c6\u03c4\u03bf\u03bd\u03c4\u03b1\u03b9 \u03c4\u03b7\u03bd \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c3\u03c4\u03bf\u03bd \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf \u03c9\u03c2 \u03b5\u03c0\u03b5\u03af\u03b3\u03bf\u03bd \u03c3\u03c4\u03c1\u03b1\u03c4\u03b7\u03b3\u03b9\u03ba\u03cc \u03b6\u03ae\u03c4\u03b7\u03bc\u03b1. \u0391\u03bb\u03bb\u03ac \u03c4\u03bf \u03c4\u03bf\u03c0\u03af\u03bf \u03b5\u03af\u03bd\u03b1\u03b9 \u03b3\u03b5\u03bc\u03ac\u03c4\u03bf \u03bf\u03c1\u03bf\u03bb\u03bf\u03b3\u03af\u03b1 \u03ba\u03b1\u03b9 \u03c3\u03c5\u03bd\u03b5\u03c7\u03ce\u03c2 \u03b5\u03be\u03b5\u03bb\u03af\u03c3\u03c3\u03b5\u03c4\u03b1\u03b9. \u0395\u03be\u03b7\u03b3\u03bf\u03cd\u03bc\u03b5 \u03c3\u03b5 \u03ba\u03b1\u03b8\u03b7\u03bc\u03b5\u03c1\u03b9\u03bd\u03ae \u03b3\u03bb\u03ce\u03c3\u03c3\u03b1 \u03b5\u03bd\u03bd\u03ad\u03b1 \u03b1\u03c0\u03cc \u03c4\u03b9\u03c2 \u03bc\u03b5\u03b3\u03b1\u03bb\u03cd\u03c4\u03b5\u03c1\u03b5\u03c2 \u03b1\u03c0\u03b5\u03b9\u03bb\u03ad\u03c2 \u03c4\u03bf\u03c5 \u03c3\u03ae\u03bc\u03b5\u03c1\u03b1 \u03b3\u03b9\u03b1 \u03c4\u03b9\u03c2 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2, \u03ce\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b5\u03af\u03c3\u03c4\u03b5 \u03b1\u03c4\u03c1\u03cc\u03bc\u03b7\u03c4\u03bf\u03b9 \u03ba\u03b1\u03b9 \u03bd\u03b1 \u03b5\u03c3\u03c4\u03b9\u03ac\u03c3\u03b5\u03c4\u03b5 \u03c3\u03c4\u03bf \u03bc\u03ad\u03bb\u03bb\u03bf\u03bd.<\/p>\n<h2>1. \u0395\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 \u03c3\u03b5 \u03c0\u03c1\u03bf\u03c3\u03b9\u03c4\u03ac clouds<\/h2>\n<p>\u039a\u03b1\u03b8\u03ce\u03c2 \u03bf\u03b9 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2 \u03c7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03bf\u03cd\u03bd \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b5\u03c2 \u03b5\u03c6\u03b1\u03c1\u03bc\u03bf\u03b3\u03ad\u03c2 \u03ba\u03b1\u03b9 \u03b1\u03c0\u03bf\u03b8\u03ae\u03ba\u03b5\u03c5\u03c3\u03b7 \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd \u03c0\u03bf\u03c5 \u03b2\u03b1\u03c3\u03af\u03b6\u03bf\u03bd\u03c4\u03b1\u03b9 \u03c3\u03c4\u03bf cloud, \u03bc\u03b7 \u03b2\u03b1\u03c3\u03af\u03b6\u03b5\u03c3\u03c4\u03b5 \u03c3\u03c4\u03bf\u03bd \u03c0\u03ac\u03c1\u03bf\u03c7\u03bf cloud \u03b3\u03b9\u03b1 \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1. \u03a7\u03c1\u03b5\u03b9\u03ac\u03b6\u03b5\u03c3\u03c4\u03b5 \u03c4\u03b7 \u03b4\u03b9\u03ba\u03ae \u03c3\u03b1\u03c2 \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c3\u03c4\u03bf\u03bd \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf.<\/p>\n<p>\u0397 \u03ad\u03c1\u03b5\u03c5\u03bd\u03b1 \u03c4\u03b7\u03c2 Kaspersky \u03b4\u03b9\u03b1\u03c0\u03af\u03c3\u03c4\u03c9\u03c3\u03b5 \u03cc\u03c4\u03b9 \u03bc\u03cc\u03bd\u03bf \u03c4\u03bf <a href=\"https:\/\/www.kaspersky.com\/blog\/understanding-security-of-the-cloud\/\" target=\"_blank\" rel=\"noopener nofollow\">47 \u03c4\u03bf\u03b9\u03c2 \u03b5\u03ba\u03b1\u03c4\u03cc \u03c4\u03c9\u03bd \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03c9\u03bd \u03c0\u03bf\u03c5 \u03c7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03bf\u03cd\u03bd \u03b4\u03b7\u03bc\u03cc\u03c3\u03b9\u03bf cloud \u03ad\u03c7\u03bf\u03c5\u03bd \u03c0\u03c1\u03bf\u03c3\u03b1\u03c1\u03bc\u03bf\u03c3\u03bc\u03ad\u03bd\u03b7 \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1<\/a>. \u03a7\u03c9\u03c1\u03af\u03c2 \u03b1\u03c5\u03c4\u03ae, \u03c4\u03b1 clouds \u03c4\u03bf\u03c5\u03c2 \u03b5\u03af\u03bd\u03b1\u03b9 \u03b5\u03c5\u03ac\u03bb\u03c9\u03c4\u03b1 \u03c3\u03b5 \u03b4\u03b1\u03c0\u03b1\u03bd\u03b7\u03c1\u03ad\u03c2 \u03c0\u03b1\u03c1\u03b1\u03b2\u03b9\u03ac\u03c3\u03b5\u03b9\u03c2 \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd \u03bc\u03ad\u03c3\u03c9 \u03c0\u03c1\u03bf\u03c3\u03b9\u03c4\u03ce\u03bd \u03c3\u03b7\u03bc\u03b5\u03af\u03c9\u03bd \u03b5\u03b9\u03c3\u03cc\u03b4\u03bf\u03c5, \u03cc\u03c0\u03c9\u03c2 \u03b1\u03b4\u03cd\u03bd\u03b1\u03bc\u03bf\u03b9 \u03ba\u03c9\u03b4\u03b9\u03ba\u03bf\u03af \u03c0\u03c1\u03cc\u03c3\u03b2\u03b1\u03c3\u03b7\u03c2.<\/p>\n<p><strong>\u03a4\u03b9 \u03bd\u03b1 \u03ba\u03ac\u03bd\u03b5\u03c4\u03b5:<\/strong> \u0395\u03ac\u03bd \u03b7 \u03b5\u03c0\u03b9\u03c7\u03b5\u03af\u03c1\u03b7\u03c3\u03ae \u03c3\u03b1\u03c2 \u03b2\u03b1\u03c3\u03af\u03b6\u03b5\u03c4\u03b1\u03b9 \u03c3\u03c4\u03bf cloud, \u03b7 \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c3\u03c4\u03bf cloud \u03c0\u03c1\u03ad\u03c0\u03b5\u03b9 \u03bd\u03b1 \u03b1\u03c0\u03bf\u03c4\u03b5\u03bb\u03b5\u03af \u03c0\u03c1\u03bf\u03c4\u03b5\u03c1\u03b1\u03b9\u03cc\u03c4\u03b7\u03c4\u03b1 \u03c3\u03b5 \u03b5\u03c0\u03af\u03c0\u03b5\u03b4\u03bf \u03b9\u03b5\u03c1\u03b1\u03c1\u03c7\u03af\u03b1\u03c2. \u0398\u03b1 \u03c0\u03c1\u03ad\u03c0\u03b5\u03b9 \u03b5\u03c0\u03af\u03c3\u03b7\u03c2 \u03bd\u03b1 \u03ad\u03c7\u03b5\u03c4\u03b5 \u03b5\u03ba\u03c0\u03b1\u03af\u03b4\u03b5\u03c5\u03c3\u03b7 \u03b3\u03b9\u03b1 \u03c4\u03b7\u03bd <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/switching_cybersecurity_questions\/35743\/\" target=\"_blank\" rel=\"noopener nofollow\">\u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c4\u03b5\u03c1\u03bc\u03b1\u03c4\u03b9\u03ba\u03bf\u03cd \u03c3\u03b7\u03bc\u03b5\u03af\u03bf\u03c5<\/a> \u03ba\u03b1\u03b9 \u03c4\u03b7\u03bd \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c3\u03c4\u03bf\u03bd \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf \u03c9\u03c2 \u03b2\u03b1\u03c3\u03b9\u03ba\u03ad\u03c2 \u03b3\u03c1\u03b1\u03bc\u03bc\u03ad\u03c2 \u03c4\u03bf\u03c5 \u03c0\u03c1\u03bf\u03cb\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03bf\u03cd. \u039a\u03b1\u03b9 \u03bd\u03b1 \u03b8\u03c5\u03bc\u03ac\u03c3\u03c4\u03b5, \u03b8\u03b1 \u03c7\u03c1\u03b5\u03b9\u03b1\u03c3\u03c4\u03b5\u03af\u03c4\u03b5 <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/demystify-cloud-computing\" target=\"_blank\" rel=\"noopener nofollow\">Security-as-a-Service (SAAS) \u03ba\u03b1\u03c4\u03ac \u03c4\u03b7 \u03bc\u03b5\u03c4\u03b5\u03b3\u03ba\u03b1\u03c4\u03ac\u03c3\u03c4\u03b1\u03c3\u03b7 \u03c3\u03c4\u03bf cloud<\/a>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-43388\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/01\/17061418\/9-cyberthreats-1-1-1.gif\" alt=\"\" width=\"358\" height=\"358\"><\/p>\n<h2>2. \u039a\u03bb\u03b5\u03af\u03b4\u03c9\u03bc\u03b1 \u03c4\u03c9\u03bd \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd \u03c3\u03b1\u03c2 \u03b3\u03b9\u03b1 \u03bb\u03cd\u03c4\u03c1\u03b1<\/h2>\n<p>\u039a\u03ac\u03b8\u03b5 \u03bc\u03ad\u03c1\u03b1 \u03c3\u03c4\u03b9\u03c2 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2 \u03c3\u03b5 \u03cc\u03bb\u03bf\u03bd \u03c4\u03bf\u03bd \u03ba\u03cc\u03c3\u03bc\u03bf, \u03bf\u03b9 \u03b5\u03c1\u03b3\u03b1\u03b6\u03cc\u03bc\u03b5\u03bd\u03bf\u03b9 \u03b4\u03b9\u03b1\u03c0\u03b9\u03c3\u03c4\u03ce\u03bd\u03bf\u03c5\u03bd, \u03cc\u03c4\u03b1\u03bd \u03c0\u03c1\u03bf\u03c3\u03c0\u03b1\u03b8\u03bf\u03cd\u03bd \u03bd\u03b1 \u03c7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03ae\u03c3\u03bf\u03c5\u03bd \u03c0\u03cc\u03c1\u03bf\u03c5\u03c2 \u03b5\u03c1\u03b3\u03b1\u03c3\u03af\u03b1\u03c2, \u03cc\u03c4\u03b9 \u03ad\u03bd\u03b1\u03c2 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b5\u03b3\u03ba\u03bb\u03b7\u03bc\u03b1\u03c4\u03af\u03b1\u03c2 \u03ad\u03c7\u03b5\u03b9 \u03ba\u03bb\u03b5\u03b9\u03b4\u03ce\u03c3\u03b5\u03b9 \u03cc\u03bb\u03b1 \u03cc\u03c3\u03b1 \u03c7\u03c1\u03b5\u03b9\u03ac\u03b6\u03bf\u03bd\u03c4\u03b1\u03b9 \u03ba\u03b1\u03b9 \u03b1\u03c0\u03b1\u03b9\u03c4\u03b5\u03af \u03c0\u03bb\u03b7\u03c1\u03c9\u03bc\u03ae \u03b3\u03b9\u03b1 \u03bd\u03b1 \u03c4\u03bf\u03c5\u03c2 \u03b5\u03c0\u03b9\u03c4\u03c1\u03b1\u03c0\u03b5\u03af \u03b7 \u03c0\u03c1\u03cc\u03c3\u03b2\u03b1\u03c3\u03b7.<\/p>\n<p>\u039f\u03bd\u03bf\u03bc\u03ac\u03b6\u03b5\u03c4\u03b1\u03b9 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 ransomware \u03ba\u03b1\u03b9 \u03b5\u03af\u03bd\u03b1\u03b9 \u03c0\u03bf\u03bb\u03cd \u03c3\u03c5\u03bd\u03b7\u03b8\u03b9\u03c3\u03bc\u03ad\u03bd\u03b7. \u0388\u03c1\u03b5\u03c5\u03bd\u03b1 \u03c4\u03b7\u03c2 International Data Corporation (IDC) \u03ad\u03b4\u03b5\u03b9\u03be\u03b5 \u03cc\u03c4\u03b9\u00a0<a href=\"https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS48159121\" target=\"_blank\" rel=\"noopener nofollow\">\u03bc\u03af\u03b1 \u03c3\u03c4\u03b9\u03c2 \u03c4\u03c1\u03b5\u03b9\u03c2 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2 \u03b5\u03af\u03c7\u03b5 \u03b4\u03b5\u03c7\u03c4\u03b5\u03af \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 \u03bc\u03b5 ransomware \u03c4\u03bf\u03c5\u03c2 \u03c4\u03b5\u03bb\u03b5\u03c5\u03c4\u03b1\u03af\u03bf\u03c5\u03c2 12 \u03bc\u03ae\u03bd\u03b5\u03c2<\/a>\u00a0\u03bc\u03b5 \u03bc\u03ad\u03c3\u03b7 \u03c0\u03bb\u03b7\u03c1\u03c9\u03bc\u03ae \u03bb\u03cd\u03c4\u03c1\u03c9\u03bd 250.000 \u03b4\u03bf\u03bb\u03b1\u03c1\u03af\u03c9\u03bd \u0397\u03a0\u0391.<\/p>\n<p><strong>\u03a4\u03b9 \u03bd\u03b1 \u03ba\u03ac\u03bd\u03b5\u03c4\u03b5:<\/strong> \u0394\u03ce\u03c3\u03c4\u03b5 \u03c0\u03c1\u03bf\u03c3\u03bf\u03c7\u03ae \u03c3\u03b5 \u03b1\u03c5\u03c4\u03cc \u03c4\u03bf \u03b5\u03af\u03b4\u03bf\u03c2 \u03b5\u03b3\u03ba\u03bb\u03ae\u03bc\u03b1\u03c4\u03bf\u03c2 \u03c3\u03c4\u03bf\u03bd \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf \u03c0\u03c1\u03b9\u03bd \u03c3\u03c5\u03bc\u03b2\u03b5\u03af. <a href=\"https:\/\/www.kaspersky.com\/blog\/structured-approach-ransomware\/37716\/\" target=\"_blank\" rel=\"noopener nofollow\">\u03a3\u03c7\u03b5\u03b4\u03b9\u03ac\u03c3\u03c4\u03b5 \u03c4\u03b7\u03bd \u03b1\u03c0\u03cc\u03ba\u03c1\u03b9\u03c3\u03b7 ransomware \u03c4\u03bf\u03c5 \u03bf\u03c1\u03b3\u03b1\u03bd\u03b9\u03c3\u03bc\u03bf\u03cd \u03c3\u03b1\u03c2<\/a> \u03ba\u03b1\u03b9 \u03b1\u03c0\u03bf\u03ba\u03c4\u03ae\u03c3\u03c4\u03b5 \u03b4\u03c9\u03c1\u03b5\u03ac\u03bd \u03b5\u03c1\u03b3\u03b1\u03bb\u03b5\u03af\u03b1 \u03ba\u03b1\u03c4\u03ac \u03c4\u03bf\u03c5 ransomware \u03b1\u03c0\u03cc \u03c4\u03bf <a href=\"https:\/\/www.nomoreransom.org\/\" target=\"_blank\" rel=\"noopener nofollow\">No More Ransom<\/a>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-43390\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/01\/17061728\/9-cyberthreats-2-1.gif\" alt=\"\" width=\"358\" height=\"358\"><\/p>\n<h2>3. \u03a7\u03b5\u03b9\u03c1\u03b1\u03b3\u03ce\u03b3\u03b7\u03c3\u03b7 \u03c4\u03c9\u03bd \u03b1\u03bd\u03b8\u03c1\u03ce\u03c0\u03c9\u03bd \u03c3\u03b1\u03c2<\/h2>\n<p><a href=\"https:\/\/www.kaspersky.co.uk\/resource-center\/definitions\/what-is-social-engineering\" target=\"_blank\" rel=\"noopener\">\u0397 \u03ba\u03bf\u03b9\u03bd\u03c9\u03bd\u03b9\u03ba\u03ae \u03bc\u03b7\u03c7\u03b1\u03bd\u03b9\u03ba\u03ae<\/a> \u03b5\u03af\u03bd\u03b1\u03b9 \u03bc\u03b9\u03b1 \u03bc\u03bf\u03c1\u03c6\u03ae \u03b5\u03b3\u03ba\u03bb\u03ae\u03bc\u03b1\u03c4\u03bf\u03c2 \u03c3\u03c4\u03bf\u03bd \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf \u03c0\u03bf\u03c5 \u03c7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03b5\u03af \u03c4\u03b5\u03c7\u03bd\u03b9\u03ba\u03ad\u03c2 \u03b3\u03b9\u03b1 \u03bd\u03b1 \u03b5\u03be\u03b1\u03c0\u03b1\u03c4\u03ae\u03c3\u03b5\u03b9 \u03c4\u03bf\u03c5\u03c2 \u03b5\u03c1\u03b3\u03b1\u03b6\u03cc\u03bc\u03b5\u03bd\u03bf\u03c5\u03c2 \u03bd\u03b1 \u03c0\u03b1\u03c1\u03b1\u03b4\u03ce\u03c3\u03bf\u03c5\u03bd \u03b5\u03c5\u03b1\u03af\u03c3\u03b8\u03b7\u03c4\u03b5\u03c2 \u03c0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03af\u03b5\u03c2, \u03bd\u03b1 \u03bc\u03b5\u03c4\u03b1\u03b4\u03ce\u03c3\u03bf\u03c5\u03bd \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03ae \u03bd\u03b1 \u03b4\u03ce\u03c3\u03bf\u03c5\u03bd \u03c0\u03c1\u03cc\u03c3\u03b2\u03b1\u03c3\u03b7 \u03c3\u03b5 \u03b9\u03b4\u03b9\u03c9\u03c4\u03b9\u03ba\u03ac \u03c3\u03c5\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1.<\/p>\n<p>\u039c\u03c0\u03bf\u03c1\u03b5\u03af \u03bd\u03b1 \u03b1\u03ba\u03bf\u03cd\u03b3\u03b5\u03c4\u03b1\u03b9 \u03c3\u03b1\u03bd \u03ba\u03ac\u03c4\u03b9 \u03c3\u03c4\u03bf \u03bf\u03c0\u03bf\u03af\u03bf \u03b4\u03b5\u03bd \u03b8\u03b1 \u03b5\u03bd\u03ad\u03b4\u03b9\u03b4\u03b5 \u03ba\u03b1\u03bd\u03ad\u03bd\u03b1\u03c2 \u03ad\u03be\u03c5\u03c0\u03bd\u03bf\u03c2 \u03b5\u03c1\u03b3\u03b1\u03b6\u03cc\u03bc\u03b5\u03bd\u03bf\u03c2, \u03b1\u03bb\u03bb\u03ac \u03c3\u03c5\u03bc\u03b2\u03b1\u03af\u03bd\u03b5\u03b9 \u03c3\u03c5\u03bd\u03ad\u03c7\u03b5\u03b9\u03b1. <a href=\"https:\/\/usa.kaspersky.com\/about\/press-releases\/2019_nine-in-ten-data-breaches-in-the-cloud-caused-by-social-engineering-finds-kaspersky-lab\" target=\"_blank\" rel=\"noopener\">\u0395\u03bd\u03bd\u03ad\u03b1 \u03c3\u03c4\u03b9\u03c2 10 \u03c0\u03b1\u03c1\u03b1\u03b2\u03b9\u03ac\u03c3\u03b5\u03b9\u03c2 \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd cloud \u03c7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03bf\u03cd\u03bd \u03ba\u03bf\u03b9\u03bd\u03c9\u03bd\u03b9\u03ba\u03ae \u03bc\u03b7\u03c7\u03b1\u03bd\u03b9\u03ba\u03ae<\/a>. \u0391\u03c5\u03c4\u03bf\u03cd \u03c4\u03bf\u03c5 \u03b5\u03af\u03b4\u03bf\u03c5\u03c2 \u03bf\u03b9 <a href=\"https:\/\/usa.kaspersky.com\/about\/press-releases\/2019_nine-in-ten-data-breaches-in-the-cloud-caused-by-social-engineering-finds-kaspersky-lab\" target=\"_blank\" rel=\"noopener\">\u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 \u03bc\u03c0\u03bf\u03c1\u03b5\u03af \u03bd\u03b1 \u03ba\u03bf\u03c3\u03c4\u03af\u03c3\u03bf\u03c5\u03bd \u03c3\u03b5 \u03bc\u03b9\u03b1 \u03b5\u03c0\u03b9\u03c7\u03b5\u03af\u03c1\u03b7\u03c3\u03b7 \u03c0\u03ac\u03bd\u03c9 \u03b1\u03c0\u03cc 2 \u03b5\u03ba\u03b1\u03c4\u03bf\u03bc\u03bc\u03cd\u03c1\u03b9\u03b1 \u03b4\u03bf\u03bb\u03ac\u03c1\u03b9\u03b1 \u0397\u03a0\u0391<\/a>.<\/p>\n<p>\u039a\u03b1\u03b8\u03ce\u03c2 \u03b7 \u03c4\u03b5\u03c7\u03bd\u03bf\u03bb\u03bf\u03b3\u03af\u03b1 \u03b3\u03af\u03bd\u03b5\u03c4\u03b1\u03b9 \u03c0\u03b9\u03bf \u03b5\u03be\u03b5\u03bb\u03b9\u03b3\u03bc\u03ad\u03bd\u03b7, \u03c4\u03bf \u03af\u03b4\u03b9\u03bf \u03b5\u03be\u03b5\u03bb\u03af\u03c3\u03c3\u03bf\u03bd\u03c4\u03b1\u03b9 \u03ba\u03b1\u03b9 \u03bf\u03b9 \u03b5\u03b3\u03ba\u03bb\u03b7\u03bc\u03b1\u03c4\u03af\u03b5\u03c2 \u03c3\u03c4\u03bf\u03bd \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf. \u039f\u03b9 \u03b5\u03c0\u03b9\u03c4\u03b9\u03b8\u03ad\u03bc\u03b5\u03bd\u03bf\u03b9 \u03c7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03bf\u03cd\u03bd \u03c0\u03bb\u03ad\u03bf\u03bd \u03c4\u03b7\u03bd \u03c4\u03b5\u03c7\u03bd\u03b7\u03c4\u03ae \u03bd\u03bf\u03b7\u03bc\u03bf\u03c3\u03cd\u03bd\u03b7 (AI) \u03b3\u03b9\u03b1 \u03bd\u03b1 \u03c7\u03b5\u03b9\u03c1\u03b1\u03b3\u03c9\u03b3\u03ae\u03c3\u03bf\u03c5\u03bd \u03ac\u03c4\u03bf\u03bc\u03b1 \u03bc\u03b5 \u03c0\u03b5\u03c1\u03af\u03c0\u03bb\u03bf\u03ba\u03b5\u03c2 \u03b1\u03bd\u03c4\u03b9\u03c0\u03bf\u03b9\u03ae\u03c3\u03b5\u03b9\u03c2 \u03c4\u03b1\u03c5\u03c4\u03cc\u03c4\u03b7\u03c4\u03b1\u03c2. \u039c\u03b5 \u03bc\u03b9\u03b1 \u201c<a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/deepfakes-2019\/28954\/\" target=\"_blank\" rel=\"noopener nofollow\">deepfake<\/a>\u201d \u03c0\u03b1\u03c1\u03bf\u03c5\u03c3\u03af\u03b1\u03c3\u03b7 \u03ba\u03ac\u03c0\u03bf\u03b9\u03bf\u03c5 \u03c3\u03b7\u03bc\u03b1\u03bd\u03c4\u03b9\u03ba\u03bf\u03cd \u03c3\u03c4\u03b5\u03bb\u03ad\u03c7\u03bf\u03c5\u03c2, \u03cc\u03c0\u03c9\u03c2 \u03bf \u0394\u03b9\u03b5\u03c5\u03b8\u03cd\u03bd\u03c9\u03bd \u03a3\u03cd\u03bc\u03b2\u03bf\u03c5\u03bb\u03bf\u03c2, \u03bf\u03b9 \u03b5\u03b3\u03ba\u03bb\u03b7\u03bc\u03b1\u03c4\u03af\u03b5\u03c2 \u03c4\u03bf\u03c5 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf\u03c5 \u03bc\u03c0\u03bf\u03c1\u03bf\u03cd\u03bd \u03bd\u03b1 \u03c7\u03b5\u03b9\u03c1\u03b1\u03b3\u03c9\u03b3\u03ae\u03c3\u03bf\u03c5\u03bd \u03c4\u03bf\u03c5\u03c2 \u03b5\u03c1\u03b3\u03b1\u03b6\u03cc\u03bc\u03b5\u03bd\u03bf\u03c5\u03c2 \u03bd\u03b1 \u03ba\u03ac\u03bd\u03bf\u03c5\u03bd \u03c3\u03c7\u03b5\u03b4\u03cc\u03bd \u03c4\u03b1 \u03c0\u03ac\u03bd\u03c4\u03b1.<\/p>\n<p><strong>\u03a4\u03b9 \u03bd\u03b1 \u03ba\u03ac\u03bd\u03b5\u03c4\u03b5:<\/strong> \u039f\u03b9 \u03ac\u03bd\u03b8\u03c1\u03c9\u03c0\u03bf\u03b9 \u03b5\u03af\u03bd\u03b1\u03b9 \u03bf \u03bc\u03b5\u03b3\u03b1\u03bb\u03cd\u03c4\u03b5\u03c1\u03bf\u03c2 \u03ba\u03af\u03bd\u03b4\u03c5\u03bd\u03bf\u03c2 \u03ba\u03b1\u03b9 \u03b7 \u03ba\u03b1\u03bb\u03cd\u03c4\u03b5\u03c1\u03b7 \u03ac\u03bc\u03c5\u03bd\u03ac \u03c3\u03b1\u03c2. \u0397 \u03bf\u03b9\u03ba\u03bf\u03b4\u03cc\u03bc\u03b7\u03c3\u03b7 \u03bc\u03b9\u03b1\u03c2 <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/security-awareness-business-2019\/29183\" target=\"_blank\" rel=\"noopener nofollow\">\u03ba\u03bf\u03c5\u03bb\u03c4\u03bf\u03cd\u03c1\u03b1\u03c2 \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03bf\u03cd \u03c0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ba\u03ae\u03c2<\/a> \u03c3\u03c4\u03bf\u03bd \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf \u03c3\u03b5 \u03bf\u03bb\u03cc\u03ba\u03bb\u03b7\u03c1\u03bf \u03c4\u03bf\u03bd \u03bf\u03c1\u03b3\u03b1\u03bd\u03b9\u03c3\u03bc\u03cc \u03c3\u03b1\u03c2 \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c4\u03b5\u03cd\u03b5\u03b9 \u03b1\u03c0\u03cc \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 \u03ba\u03bf\u03b9\u03bd\u03c9\u03bd\u03b9\u03ba\u03ae\u03c2 \u03bc\u03b7\u03c7\u03b1\u03bd\u03b9\u03ba\u03ae\u03c2. \u0395\u03ba\u03c0\u03b1\u03b9\u03b4\u03b5\u03cd\u03bf\u03bd\u03c4\u03b1\u03c2 <a href=\"https:\/\/media.kaspersky.com\/en\/business-security\/enterprise\/cyber-security-awareness-training-whitepaper.pdf\" target=\"_blank\" rel=\"noopener nofollow\">\u03c4\u03bf\u03c5\u03c2 \u03b5\u03c1\u03b3\u03b1\u03b6\u03cc\u03bc\u03b5\u03bd\u03bf\u03c5\u03c2 \u03bd\u03b1 \u03b3\u03bd\u03c9\u03c1\u03af\u03b6\u03bf\u03c5\u03bd \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b1 \u03b3\u03b9\u03b1 \u03c4\u03b9\u03c2 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b1\u03c0\u03b5\u03b9\u03bb\u03ad\u03c2<\/a>, \u03b8\u03b1 \u03b4\u03b7\u03bc\u03b9\u03bf\u03c5\u03c1\u03b3\u03ae\u03c3\u03b5\u03c4\u03b5 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03c2 \u03c3\u03c5\u03bd\u03ae\u03b8\u03b5\u03b9\u03b5\u03c2 \u03ba\u03b1\u03b9 \u03b8\u03b1 \u03bc\u03b5\u03b9\u03ce\u03c3\u03b5\u03c4\u03b5 \u03c4\u03bf\u03bd \u03ba\u03af\u03bd\u03b4\u03c5\u03bd\u03bf \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7\u03c2.<\/p>\n<h2>4. \u0395\u03af\u03c3\u03bf\u03b4\u03bf\u03c2 \u03bc\u03ad\u03c3\u03c9 \u03b1\u03be\u03b9\u03cc\u03c0\u03b9\u03c3\u03c4\u03c9\u03bd \u03c0\u03b7\u03b3\u03ce\u03bd<\/h2>\n<p>\u03a3\u03c4\u03b9\u03c2 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 \u03c4\u03b7\u03c2 \u03b1\u03bb\u03c5\u03c3\u03af\u03b4\u03b1\u03c2 \u03b5\u03c6\u03bf\u03b4\u03b9\u03b1\u03c3\u03bc\u03bf\u03cd, \u03bf\u03b9 \u03b5\u03b3\u03ba\u03bb\u03b7\u03bc\u03b1\u03c4\u03af\u03b5\u03c2 \u03c4\u03bf\u03c5 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf\u03c5 \u03b5\u03b9\u03c3\u03ac\u03b3\u03bf\u03c5\u03bd \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03ba\u03ce\u03b4\u03b9\u03ba\u03b1 \u03c3\u03b5 \u03b1\u03be\u03b9\u03cc\u03c0\u03b9\u03c3\u03c4\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03ae \u03c5\u03bb\u03b9\u03ba\u03cc. \u039c\u03ad\u03c3\u03c9 \u03b1\u03c5\u03c4\u03bf\u03cd \u03c4\u03bf\u03c5 \u03c4\u03cd\u03c0\u03bf\u03c5 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7\u03c2, \u03bc\u03c0\u03bf\u03c1\u03bf\u03cd\u03bd \u03bd\u03b1 \u03c7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03ae\u03c3\u03bf\u03c5\u03bd \u03bf\u03c0\u03bf\u03b9\u03b1\u03b4\u03ae\u03c0\u03bf\u03c4\u03b5 \u03b5\u03c6\u03b1\u03c1\u03bc\u03bf\u03b3\u03ae, \u03b5\u03bd\u03b7\u03bc\u03ad\u03c1\u03c9\u03c3\u03b7 \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03bf\u03cd \u03ae \u03b5\u03be\u03bf\u03c0\u03bb\u03b9\u03c3\u03bc\u03cc \u03c9\u03c2 \u201c\u03b4\u03bf\u03cd\u03c1\u03b5\u03b9\u03bf \u03af\u03c0\u03c0\u03bf\u201d (Trojan horse) \u03b3\u03b9\u03b1 \u03bd\u03b1 \u03b5\u03be\u03b1\u03c0\u03bf\u03bb\u03cd\u03c3\u03bf\u03c5\u03bd \u03bc\u03b9\u03b1 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7. \u0397 \u03b1\u03c0\u03b5\u03b9\u03bb\u03ae \u03bc\u03c0\u03bf\u03c1\u03b5\u03af \u03c3\u03c4\u03b7 \u03c3\u03c5\u03bd\u03ad\u03c7\u03b5\u03b9\u03b1 \u03bd\u03b1 \u03b5\u03be\u03b1\u03c0\u03bb\u03c9\u03b8\u03b5\u03af \u03b1\u03c0\u03cc \u03c4\u03bf \u03c3\u03cd\u03c3\u03c4\u03b7\u03bc\u03ac \u03c3\u03b1\u03c2 \u03c3\u03b5 \u03ac\u03bb\u03bb\u03b5\u03c2 \u03b5\u03c4\u03b1\u03b9\u03c1\u03b5\u03af\u03b5\u03c2 \u03bc\u03b5 \u03c4\u03b9\u03c2 \u03bf\u03c0\u03bf\u03af\u03b5\u03c2 \u03c3\u03c5\u03bd\u03b5\u03c1\u03b3\u03ac\u03b6\u03b5\u03c3\u03c4\u03b5.<\/p>\n<p><strong>\u03a4\u03b9 \u03bd\u03b1 \u03ba\u03ac\u03bd\u03b5\u03c4\u03b5:<\/strong> \u0395\u03bd\u03b9\u03c3\u03c7\u03cd\u03c3\u03c4\u03b5 \u03c4\u03b7\u03bd \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03b5\u03ba \u03c4\u03c9\u03bd \u03ad\u03c3\u03c9. \u0397 \u03b3\u03b5\u03bd\u03b9\u03ba\u03ae \u03b2\u03b5\u03bb\u03c4\u03af\u03c9\u03c3\u03b7 \u03c4\u03b7\u03c2 <a href=\"https:\/\/eugene.kaspersky.com\/2020\/07\/01\/cyber-hygiene-essential-for-fighting-supply-chain-attacks\" target=\"_blank\" rel=\"noopener\">\u03c5\u03b3\u03b5\u03af\u03b1\u03c2 \u03c3\u03c4\u03bf\u03bd \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf<\/a> \u03b2\u03bf\u03b7\u03b8\u03ac \u03bd\u03b1 \u03ba\u03bb\u03b5\u03af\u03c3\u03bf\u03c5\u03bd \u03ba\u03b5\u03bd\u03ac \u03cc\u03c0\u03c9\u03c2 \u03b1\u03b4\u03cd\u03bd\u03b1\u03bc\u03bf\u03b9 \u03ba\u03c9\u03b4\u03b9\u03ba\u03bf\u03af \u03c0\u03c1\u03cc\u03c3\u03b2\u03b1\u03c3\u03b7\u03c2, \u03ad\u03bb\u03bb\u03b5\u03b9\u03c8\u03b7 \u03c0\u03c1\u03c9\u03c4\u03bf\u03ba\u03cc\u03bb\u03bb\u03c9\u03bd \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2 \u03ba\u03b1\u03b9 \u03b5\u03c0\u03b9\u03c3\u03c6\u03b1\u03bb\u03ad\u03c2 \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc. \u0394\u03b9\u03b1\u03b2\u03ac\u03c3\u03c4\u03b5 \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b1 \u03c3\u03c7\u03b5\u03c4\u03b9\u03ba\u03ac \u03bc\u03b5 \u03c4\u03bf\u03bd <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/supply-chain-attack-evolution\/3216\" target=\"_blank\" rel=\"noopener nofollow\">\u03c4\u03c1\u03cc\u03c0\u03bf \u03b1\u03bd\u03af\u03c7\u03bd\u03b5\u03c5\u03c3\u03b7\u03c2 \u03ba\u03b1\u03b9 \u03c0\u03c1\u03cc\u03bb\u03b7\u03c8\u03b7\u03c2 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03c9\u03bd \u03c3\u03c4\u03b7\u03bd \u03b1\u03bb\u03c5\u03c3\u03af\u03b4\u03b1 \u03b5\u03c6\u03bf\u03b4\u03b9\u03b1\u03c3\u03bc\u03bf\u03cd<\/a>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-43384\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/01\/17060041\/9-cyberthreats-3.gif\" alt=\"\" width=\"358\" height=\"358\"><\/p>\n<h2>5. \u03a0\u03b5\u03c1\u03b9\u03bc\u03ad\u03bd\u03bf\u03bd\u03c4\u03b1\u03c2 \u03c4\u03b7\u03bd \u03ba\u03b1\u03c4\u03ac\u03bb\u03bb\u03b7\u03bb\u03b7 \u03c3\u03c4\u03b9\u03b3\u03bc\u03ae \u03b3\u03b9\u03b1 \u03bd\u03b1 \u03c7\u03c4\u03c5\u03c0\u03ae\u03c3\u03b5\u03b9<\/h2>\n<p>\u039c\u03b9\u03b1 <a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/advanced-persistent-threats\" target=\"_blank\" rel=\"noopener nofollow\">\u03c0\u03c1\u03bf\u03b7\u03b3\u03bc\u03ad\u03bd\u03b7 \u03b5\u03c0\u03af\u03bc\u03bf\u03bd\u03b7 \u03b1\u03c0\u03b5\u03b9\u03bb\u03ae (APT)<\/a> \u03c0\u03b5\u03c1\u03b9\u03bb\u03b1\u03bc\u03b2\u03ac\u03bd\u03b5\u03b9 \u03cd\u03c0\u03bf\u03c5\u03bb\u03b5\u03c2, \u03b5\u03be\u03b5\u03bb\u03b9\u03b3\u03bc\u03ad\u03bd\u03b5\u03c2 \u03c4\u03b5\u03c7\u03bd\u03b9\u03ba\u03ad\u03c2 hacking.<\/p>\n<p>\u03a3\u03c5\u03c7\u03bd\u03ac \u03ba\u03c1\u03cd\u03b2\u03bf\u03c5\u03bd \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03c3\u03c4\u03bf \u03c3\u03cd\u03c3\u03c4\u03b7\u03bc\u03ac \u03c3\u03b1\u03c2 \u03b3\u03b9\u03b1 \u03bc\u03b5\u03b3\u03ac\u03bb\u03b1 \u03c7\u03c1\u03bf\u03bd\u03b9\u03ba\u03ac \u03b4\u03b9\u03b1\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1, \u03ba\u03bb\u03ad\u03b2\u03bf\u03bd\u03c4\u03b1\u03c2 \u03c0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03af\u03b5\u03c2 \u03ae \u03c0\u03b5\u03c1\u03b9\u03bc\u03ad\u03bd\u03bf\u03bd\u03c4\u03b1\u03c2 \u03c4\u03b7 \u03c3\u03c4\u03b9\u03b3\u03bc\u03ae \u03c0\u03bf\u03c5 \u03b8\u03b1 \u03c0\u03c1\u03bf\u03ba\u03b1\u03bb\u03ad\u03c3\u03bf\u03c5\u03bd \u03c4\u03b7 \u03bc\u03ad\u03b3\u03b9\u03c3\u03c4\u03b7 \u03b6\u03b7\u03bc\u03b9\u03ac.<\/p>\n<p>\u039f\u03b9 APTs \u03c3\u03c4\u03bf\u03c7\u03b5\u03cd\u03bf\u03c5\u03bd \u03c3\u03c5\u03bd\u03ae\u03b8\u03c9\u03c2 \u03bc\u03b5\u03b3\u03ac\u03bb\u03b5\u03c2 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2 \u03ae \u03ad\u03b8\u03bd\u03b7-\u03ba\u03c1\u03ac\u03c4\u03b7, \u03b1\u03bb\u03bb\u03ac \u03bc\u03c0\u03bf\u03c1\u03bf\u03cd\u03bd \u03b5\u03c0\u03af\u03c3\u03b7\u03c2 \u03bd\u03b1 \u03b5\u03c0\u03b7\u03c1\u03b5\u03ac\u03c3\u03bf\u03c5\u03bd \u03bc\u03b9\u03ba\u03c1\u03cc\u03c4\u03b5\u03c1\u03b5\u03c2 \u03b5\u03c4\u03b1\u03b9\u03c1\u03b5\u03af\u03b5\u03c2 \u03c3\u03c4\u03b7\u03bd \u03b1\u03bb\u03c5\u03c3\u03af\u03b4\u03b1 \u03b5\u03c6\u03bf\u03b4\u03b9\u03b1\u03c3\u03bc\u03bf\u03cd. \u03a4\u03bf \u03c3\u03c5\u03bd\u03b5\u03c4\u03b1\u03b9\u03c1\u03b9\u03c3\u03c4\u03b9\u03ba\u03cc \u0399\u03bd\u03c3\u03c4\u03b9\u03c4\u03bf\u03cd\u03c4\u03bf SANS \u03b3\u03b9\u03b1 \u03c4\u03b9\u03c2 \u03b4\u03b5\u03be\u03b9\u03cc\u03c4\u03b7\u03c4\u03b5\u03c2 \u03c3\u03c4\u03b7\u03bd \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c3\u03c4\u03bf\u03bd \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf \u03b4\u03b9\u03b1\u03c0\u03af\u03c3\u03c4\u03c9\u03c3\u03b5 \u03cc\u03c4\u03b9 \u03c4\u03bf <a href=\"https:\/\/www.sans.org\/white-papers\/39105\/\" target=\"_blank\" rel=\"noopener nofollow\">48 \u03c4\u03bf\u03b9\u03c2 \u03b5\u03ba\u03b1\u03c4\u03cc \u03c4\u03c9\u03bd \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03c9\u03bd \u03bb\u03ad\u03bd\u03b5 \u03cc\u03c4\u03b9 \u03ad\u03c7\u03bf\u03c5\u03bd \u03ad\u03bd\u03b1 \u03ba\u03b5\u03bd\u03cc \u03c3\u03c4\u03bf\u03bd \u03b5\u03bd\u03c4\u03bf\u03c0\u03b9\u03c3\u03bc\u03cc \u03c0\u03c1\u03bf\u03b7\u03b3\u03bc\u03ad\u03bd\u03c9\u03bd \u03b1\u03c0\u03b5\u03b9\u03bb\u03ce\u03bd<\/a>.<\/p>\n<p><strong>\u03a4\u03b9 \u03bd\u03b1 \u03ba\u03ac\u03bd\u03b5\u03c4\u03b5:<\/strong> \u039f\u03b9 APTs \u03b1\u03c0\u03bf\u03ba\u03c4\u03bf\u03cd\u03bd \u03c0\u03c1\u03cc\u03c3\u03b2\u03b1\u03c3\u03b7 \u03bc\u03ad\u03c3\u03c9 \u03b1\u03bd\u03b8\u03c1\u03ce\u03c0\u03b9\u03bd\u03bf\u03c5 \u03bb\u03ac\u03b8\u03bf\u03c5\u03c2, \u03b5\u03c0\u03bf\u03bc\u03ad\u03bd\u03c9\u03c2 \u03b5\u03c6\u03bf\u03b4\u03b9\u03ac\u03c3\u03c4\u03b5 \u03c4\u03bf\u03c5\u03c2 \u03b5\u03c1\u03b3\u03b1\u03b6\u03cc\u03bc\u03b5\u03bd\u03bf\u03c5\u03c2 \u03bc\u03b5 \u03c4\u03b9\u03c2 \u03b3\u03bd\u03ce\u03c3\u03b5\u03b9\u03c2 \u03c0\u03bf\u03c5 \u03c7\u03c1\u03b5\u03b9\u03ac\u03b6\u03bf\u03bd\u03c4\u03b1\u03b9 \u03b3\u03b9\u03b1 \u03c4\u03b7\u03bd \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1 \u03c4\u03bf\u03c5 \u03bf\u03c1\u03b3\u03b1\u03bd\u03b9\u03c3\u03bc\u03bf\u03cd \u03c3\u03b1\u03c2. <a href=\"https:\/\/securelist.com\/tag\/apt\" target=\"_blank\" rel=\"noopener\">\u039b\u03ac\u03b2\u03b5\u03c4\u03b5 \u03b1\u03bd\u03b1\u03c6\u03bf\u03c1\u03ad\u03c2 \u03b1\u03c0\u03b5\u03b9\u03bb\u03ce\u03bd APT \u03c3\u03c4\u03bf SecureList<\/a>.<\/p>\n<h2>6. \u0394\u03b9\u03b1\u03ba\u03bf\u03c0\u03ae \u03c4\u03b7\u03c2 \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03af\u03b1\u03c2 \u03c4\u03b7\u03c2 \u03b5\u03c0\u03b9\u03c7\u03b5\u03af\u03c1\u03b7\u03c3\u03ae\u03c2 \u03c3\u03b1\u03c2<\/h2>\n<p><a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/ddos-attacks\" target=\"_blank\" rel=\"noopener nofollow\">\u039f\u03b9 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 Distributed Denial of Service (DDoS)<\/a>\u00a0\u03b5\u03af\u03bd\u03b1\u03b9 \u03bf\u03b9 \u03c3\u03c4\u03bf\u03c7\u03b5\u03c5\u03bc\u03ad\u03bd\u03b5\u03c2 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 \u03c4\u03bf\u03c5 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b5\u03b3\u03ba\u03bb\u03b7\u03bc\u03b1\u03c4\u03af\u03b1. \u00a0\u039a\u03b1\u03c4\u03b1\u03ba\u03bb\u03cd\u03b6\u03bf\u03c5\u03bd \u03ad\u03bd\u03b1\u03bd \u03b4\u03b9\u03b1\u03ba\u03bf\u03bc\u03b9\u03c3\u03c4\u03ae, \u03bc\u03af\u03b1 \u03c5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b1 \u03ae \u03ad\u03bd\u03b1 \u03b4\u03af\u03ba\u03c4\u03c5\u03bf \u03bc\u03b5 \u03bc\u03b9\u03b1 \u03c0\u03bb\u03b7\u03bc\u03bc\u03cd\u03c1\u03b1 \u03b5\u03c0\u03b9\u03c3\u03ba\u03b5\u03c8\u03b9\u03bc\u03cc\u03c4\u03b7\u03c4\u03b1\u03c2, \u03b5\u03c0\u03bf\u03bc\u03ad\u03bd\u03c9\u03c2 \u03b4\u03b5\u03bd \u03bc\u03c0\u03bf\u03c1\u03b5\u03af\u03c4\u03b5 \u03bd\u03b1 \u03c0\u03b1\u03c1\u03ad\u03c7\u03b5\u03c4\u03b5 \u03c3\u03c4\u03bf\u03c5\u03c2 \u03c0\u03b5\u03bb\u03ac\u03c4\u03b5\u03c2 \u03c3\u03b1\u03c2 \u03b1\u03be\u03b9\u03cc\u03c0\u03b9\u03c3\u03c4\u03b7 \u03b4\u03b9\u03b1\u03b4\u03b9\u03ba\u03c4\u03c5\u03b1\u03ba\u03ae \u03c5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b1. \u039c\u03c0\u03bf\u03c1\u03b5\u03af \u03bd\u03b1 \u03ad\u03c7\u03bf\u03c5\u03bd \u03c9\u03c2 \u03c3\u03c4\u03cc\u03c7\u03bf \u03bd\u03b1 \u03b1\u03c0\u03bf\u03ba\u03bb\u03b5\u03af\u03c3\u03bf\u03c5\u03bd \u03bf\u03c5\u03c3\u03b9\u03b1\u03c3\u03c4\u03b9\u03ba\u03ac \u03c4\u03b7\u03bd \u03b5\u03c4\u03b1\u03b9\u03c1\u03b5\u03af\u03b1 \u03c3\u03b1\u03c2 \u03b1\u03c0\u03cc \u03c3\u03c5\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1 \u03b4\u03b9\u03ba\u03c4\u03cd\u03bf\u03c5 \u03cc\u03c0\u03c9\u03c2 \u03b4\u03b9\u03b1\u03ba\u03bf\u03bc\u03b9\u03c3\u03c4\u03ad\u03c2, \u03c5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b5\u03c2 cloud \u03ba\u03b1\u03b9 \u03b9\u03c3\u03c4\u03cc\u03c4\u03bf\u03c0\u03bf\u03c5\u03c2.<\/p>\n<p><a href=\"https:\/\/www.coxblue.com\/12-ddos-statistics-that-should-concern-business-leaders\/\" target=\"_blank\" rel=\"noopener nofollow\">\u039f\u03b9 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 DDoS \u03bc\u03c0\u03bf\u03c1\u03b5\u03af \u03bd\u03b1 \u03ba\u03bf\u03c3\u03c4\u03af\u03b6\u03bf\u03c5\u03bd \u03b1\u03c0\u03cc 20.000 \u03ad\u03c9\u03c2 40.000 \u03b4\u03bf\u03bb\u03ac\u03c1\u03b9\u03b1 \u0397\u03a0\u0391 \u03b1\u03bd\u03ac \u03ce\u03c1\u03b1<\/a>. \u03a5\u03c0\u03ac\u03c1\u03c7\u03b5\u03b9 \u03c0\u03bb\u03ae\u03b3\u03bc\u03b1 \u03c3\u03c4\u03b7 \u03c6\u03ae\u03bc\u03b7 \u03ba\u03b1\u03b9 \u03b6\u03b7\u03bc\u03b9\u03ac \u03c3\u03c4\u03b9\u03c2 \u03c3\u03c7\u03ad\u03c3\u03b5\u03b9\u03c2 \u03bc\u03b5 \u03c4\u03bf\u03c5\u03c2 \u03c0\u03b5\u03bb\u03ac\u03c4\u03b5\u03c2 \u03c0\u03ad\u03c1\u03b1 \u03b1\u03c0\u03cc \u03c4\u03bf \u03ac\u03bc\u03b5\u03c3\u03bf \u03ba\u03cc\u03c3\u03c4\u03bf\u03c2.<\/p>\n<p><strong>\u03a4\u03b9 \u03bd\u03b1 \u03ba\u03ac\u03bd\u03b5\u03c4\u03b5:<\/strong> \u0392\u03b5\u03b2\u03b1\u03b9\u03c9\u03b8\u03b5\u03af\u03c4\u03b5 \u03cc\u03c4\u03b9 \u03bf \u03bc\u03b5\u03c4\u03c1\u03b9\u03b1\u03c3\u03bc\u03cc\u03c2 \u03c4\u03c9\u03bd \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03c9\u03bd DDoS \u03b1\u03c0\u03bf\u03c4\u03b5\u03bb\u03b5\u03af \u03bc\u03ad\u03c1\u03bf\u03c2 \u03c4\u03b7\u03c2 \u03bb\u03cd\u03c3\u03b7\u03c2 \u03c3\u03b1\u03c2 \u03b3\u03b9\u03b1 \u03c4\u03b7\u03bd \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c3\u03c4\u03bf\u03bd \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf. \u0395\u03be\u03bf\u03c0\u03bb\u03af\u03c3\u03c4\u03b5 \u03c4\u03b9\u03c2 \u03bf\u03bc\u03ac\u03b4\u03b5\u03c2 \u03c0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ba\u03ae\u03c2 \u03c3\u03b1\u03c2 \u03bc\u03b5 <a href=\"https:\/\/securelist.com\/category\/ddos-reports\/\" target=\"_blank\" rel=\"noopener\">\u03b4\u03c9\u03c1\u03b5\u03ac\u03bd \u03b1\u03bd\u03b1\u03c6\u03bf\u03c1\u03ad\u03c2 DDoS \u03c3\u03c4\u03bf SecureList<\/a>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-43383\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/01\/17055910\/9-cyberthreats-4.gif\" alt=\"\" width=\"358\" height=\"358\"><\/p>\n<h2>7. \u0395\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 \u03c3\u03b5 \u03c3\u03c5\u03bd\u03b4\u03b5\u03b4\u03b5\u03bc\u03ad\u03bd\u03b1 \u201c\u03c0\u03c1\u03ac\u03b3\u03bc\u03b1\u03c4\u03b1\u201d<\/h2>\n<p>\u03a4\u03bf Internet of Things (IoT) \u03b5\u03af\u03bd\u03b1\u03b9 \u03ad\u03bd\u03b1 \u03c4\u03b1\u03c7\u03ad\u03c9\u03c2 \u03b1\u03bd\u03b1\u03c0\u03c4\u03c5\u03c3\u03c3\u03cc\u03bc\u03b5\u03bd\u03bf \u03bf\u03b9\u03ba\u03bf\u03c3\u03cd\u03c3\u03c4\u03b7\u03bc\u03b1 \u2013 \u03c3\u03cd\u03bc\u03c6\u03c9\u03bd\u03b1 \u03bc\u03b5 \u03c4\u03b9\u03c2 \u03c0\u03c1\u03bf\u03b2\u03bb\u03ad\u03c8\u03b5\u03b9\u03c2 <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/industrial-iot\/28210\/\" target=\"_blank\" rel=\"noopener nofollow\">\u03b8\u03b1 \u03c7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03ae\u03c3\u03bf\u03c5\u03bc\u03b5 \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b5\u03c2 \u03b1\u03c0\u03cc 75 \u03b4\u03b9\u03c3\u03b5\u03ba\u03b1\u03c4\u03bf\u03bc\u03bc\u03cd\u03c1\u03b9\u03b1 \u03c3\u03c5\u03c3\u03ba\u03b5\u03c5\u03ad\u03c2 IoT \u03bc\u03ad\u03c7\u03c1\u03b9 \u03c4\u03bf 2025<\/a>.<\/p>\n<p>\u039f\u03b9 \u03c3\u03c5\u03bd\u03b4\u03b5\u03b4\u03b5\u03bc\u03ad\u03bd\u03b5\u03c2 \u03c3\u03c5\u03c3\u03ba\u03b5\u03c5\u03ad\u03c2 \u03cc\u03c0\u03c9\u03c2 \u03bf\u03b9 \u03b1\u03bd\u03b5\u03bb\u03ba\u03c5\u03c3\u03c4\u03ae\u03c1\u03b5\u03c2, \u03bf\u03b9 \u03b1\u03b9\u03c3\u03b8\u03b7\u03c4\u03ae\u03c1\u03b5\u03c2 \u03ba\u03b1\u03b9 \u03bf\u03b9 \u03b5\u03ba\u03c4\u03c5\u03c0\u03c9\u03c4\u03ad\u03c2 \u03b5\u03af\u03bd\u03b1\u03b9 \u03c0\u03bb\u03ad\u03bf\u03bd \u03ba\u03bf\u03b9\u03bd\u03ad\u03c2 \u03c3\u03b5 \u03c3\u03c0\u03af\u03c4\u03b9\u03b1 \u03ba\u03b1\u03b9 \u03c7\u03ce\u03c1\u03bf\u03c5\u03c2 \u03b5\u03c1\u03b3\u03b1\u03c3\u03af\u03b1\u03c2 \u03ba\u03b1\u03b9 \u03b1\u03c0\u03bf\u03c4\u03b5\u03bb\u03bf\u03cd\u03bd \u03cc\u03bb\u03bf \u03ba\u03b1\u03b9 \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03bf \u03bc\u03ad\u03c1\u03bf\u03c2 \u03c4\u03c9\u03bd <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/industrial-iot\/28210\/\" target=\"_blank\" rel=\"noopener nofollow\">\u03b4\u03b9\u03b1\u03b4\u03b9\u03ba\u03b1\u03c3\u03b9\u03ce\u03bd \u03c0\u03b1\u03c1\u03b1\u03b3\u03c9\u03b3\u03ae\u03c2 \u03ba\u03b1\u03b9 \u03b2\u03b9\u03bf\u03bc\u03b7\u03c7\u03b1\u03bd\u03af\u03b1\u03c2<\/a>. \u03a0\u03bf\u03bb\u03bb\u03ad\u03c2 \u03b2\u03b9\u03bf\u03bc\u03b7\u03c7\u03b1\u03bd\u03b9\u03ba\u03ad\u03c2 \u03c3\u03c5\u03c3\u03ba\u03b5\u03c5\u03ad\u03c2 IoT \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03bf\u03cd\u03bd \u03c3\u03b5 \u03be\u03b5\u03c0\u03b5\u03c1\u03b1\u03c3\u03bc\u03ad\u03bd\u03b1, \u03b5\u03c5\u03ac\u03bb\u03c9\u03c4\u03b1 \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03b9\u03ba\u03ac \u03c3\u03c5\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1, \u03b1\u03c0\u03bf\u03c4\u03b5\u03bb\u03ce\u03bd\u03c4\u03b1\u03c2 \u03ad\u03bd\u03b1 \u03b5\u03cd\u03ba\u03bf\u03bb\u03bf \u03c3\u03b7\u03bc\u03b5\u03af\u03bf \u03b5\u03b9\u03c3\u03cc\u03b4\u03bf\u03c5 \u03b3\u03b9\u03b1 \u03c4\u03bf\u03c5\u03c2 \u03b5\u03b9\u03c3\u03b2\u03bf\u03bb\u03b5\u03af\u03c2, \u03b5\u03c0\u03b9\u03c4\u03c1\u03ad\u03c0\u03bf\u03bd\u03c4\u03ac\u03c2 \u03c4\u03bf\u03c5\u03c2 \u03bd\u03b1 \u03ba\u03b1\u03c4\u03b1\u03c3\u03c4\u03c1\u03ad\u03c8\u03bf\u03c5\u03bd \u03bc\u03b9\u03b1 \u03bf\u03bb\u03cc\u03ba\u03bb\u03b7\u03c1\u03b7 \u03b5\u03c0\u03b9\u03c7\u03b5\u03af\u03c1\u03b7\u03c3\u03b7.<\/p>\n<p>\u039c\u03cc\u03bb\u03b9\u03c2 \u03c4\u03bf\u00a0<a href=\"https:\/\/www.kaspersky.co.uk\/about\/press-releases\/2020_half-of-industrial-organizations-believe-iot-will-transform-ics-security\" target=\"_blank\" rel=\"noopener\">19 \u03c4\u03bf\u03b9\u03c2 \u03b5\u03ba\u03b1\u03c4\u03cc \u03c4\u03c9\u03bd \u03b5\u03c4\u03b1\u03b9\u03c1\u03b5\u03b9\u03ce\u03bd \u03ad\u03c7\u03b5\u03b9 \u03b5\u03bd\u03b5\u03c1\u03b3\u03ae \u03c0\u03b1\u03c1\u03b1\u03ba\u03bf\u03bb\u03bf\u03cd\u03b8\u03b7\u03c3\u03b7 \u03b4\u03b9\u03ba\u03c4\u03cd\u03bf\u03c5 \u03ba\u03b1\u03b9 \u03b5\u03c0\u03b9\u03c3\u03ba\u03b5\u03c8\u03b9\u03bc\u03cc\u03c4\u03b7\u03c4\u03b1\u03c2 \u03b3\u03b9\u03b1 \u03c3\u03c5\u03c3\u03ba\u03b5\u03c5\u03ad\u03c2 IoT<\/a>.<\/p>\n<p><strong>\u03a4\u03b9 \u03bd\u03b1 \u03ba\u03ac\u03bd\u03b5\u03c4\u03b5:<\/strong> \u0391\u03bd\u03b1\u03b6\u03b7\u03c4\u03ae\u03c3\u03c4\u03b5 \u03bb\u03cd\u03c3\u03b5\u03b9\u03c2 \u03c0\u03bf\u03c5 \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c4\u03b5\u03cd\u03bf\u03c5\u03bd \u03c4\u03bf IoT \u03bc\u03b5\u03c4\u03b1\u03c6\u03ad\u03c1\u03bf\u03bd\u03c4\u03b1\u03c2 \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03b1 \u03b1\u03c0\u03cc \u03b2\u03b9\u03bf\u03bc\u03b7\u03c7\u03b1\u03bd\u03b9\u03ba\u03cc \u03b5\u03be\u03bf\u03c0\u03bb\u03b9\u03c3\u03bc\u03cc \u03c3\u03b5 \u03c0\u03bb\u03b1\u03c4\u03c6\u03cc\u03c1\u03bc\u03b5\u03c2 cloud, \u03b4\u03b7\u03bc\u03b9\u03bf\u03c5\u03c1\u03b3\u03ce\u03bd\u03c4\u03b1\u03c2 \u03bc\u03b9\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03ae \u03c3\u03cd\u03bd\u03b4\u03b5\u03c3\u03b7 \u03bc\u03b5\u03c4\u03b1\u03be\u03cd \u03c4\u03bf\u03c5 IoT \u03ba\u03b1\u03b9 \u03c4\u03bf\u03c5 \u03b5\u03c4\u03b1\u03b9\u03c1\u03b9\u03ba\u03bf\u03cd \u03c3\u03b1\u03c2 \u03b4\u03b9\u03ba\u03c4\u03cd\u03bf\u03c5. \u0394\u03b9\u03b1\u03b2\u03ac\u03c3\u03c4\u03b5 \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b1 \u03c3\u03c7\u03b5\u03c4\u03b9\u03ba\u03ac \u03bc\u03b5 \u03c4\u03bf \u03c0\u03ce\u03c2 \u03bd\u03b1 \u03b5\u03bb\u03b1\u03c7\u03b9\u03c3\u03c4\u03bf\u03c0\u03bf\u03b9\u03ae\u03c3\u03b5\u03c4\u03b5 \u03c4\u03bf\u03bd <a href=\"https:\/\/www.kaspersky.com\/blog\/rsa2021-dangerous-iot\/40161\" target=\"_blank\" rel=\"noopener nofollow\">\u03ba\u03af\u03bd\u03b4\u03c5\u03bd\u03bf \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7\u03c2 \u03bc\u03ad\u03c3\u03c9 \u03c3\u03c5\u03c3\u03ba\u03b5\u03c5\u03ce\u03bd IoT.<\/a><\/p>\n<h2>8. \u0397 \u03c0\u03b9\u03bf \u03c3\u03c5\u03bd\u03b7\u03b8\u03b9\u03c3\u03bc\u03ad\u03bd\u03b7 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b1\u03c0\u03b5\u03b9\u03bb\u03ae<\/h2>\n<p><a href=\"https:\/\/www.comparitech.com\/antivirus\/malware-statistics-facts\/\" target=\"_blank\" rel=\"noopener nofollow\">\u03a4\u03bf \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03b5\u03af\u03bd\u03b1\u03b9 \u03c3\u03c5\u03bd\u03b7\u03b8\u03b9\u03c3\u03bc\u03ad\u03bd\u03bf<\/a>\u00a0\u03ba\u03b1\u03b9 \u03b3\u03af\u03bd\u03b5\u03c4\u03b1\u03b9 \u03b3\u03c1\u03ae\u03b3\u03bf\u03c1\u03b1 \u03bf \u03c0\u03b9\u03bf \u03b5\u03c0\u03b9\u03ba\u03af\u03bd\u03b4\u03c5\u03bd\u03bf\u03c2, \u03ba\u03bf\u03c3\u03c4\u03bf\u03b2\u03cc\u03c1\u03bf\u03c2 \u03c4\u03cd\u03c0\u03bf\u03c2 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7\u03c2 \u03b3\u03b9\u03b1 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2, \u03bf\u03b9 \u03bf\u03c0\u03bf\u03af\u03b5\u03c2 \u03ad\u03c7\u03bf\u03c5\u03bd \u03b2\u03b9\u03ce\u03c3\u03b5\u03b9 \u03c4\u03b1 \u03b1\u03c0\u03bf\u03c4\u03b5\u03bb\u03ad\u03c3\u03bc\u03b1\u03c4\u03b1 \u03c3\u03bf\u03b2\u03b1\u03c1\u03ce\u03bd \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03c9\u03bd \u03cc\u03c0\u03c9\u03c2 \u03c4\u03bf\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=s3o3qOipHhk\" target=\"_blank\" rel=\"noopener nofollow\">Emotet<\/a>\u00a0\u03ba\u03b1\u03b9 \u03c4\u03bf \u03c3\u03c7\u03b5\u03c4\u03b9\u03ba\u03cc ransomware. \u0392\u03bb\u03ac\u03c0\u03c4\u03b5\u03b9 \u03c4\u03b9\u03c2 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03b7\u03bc\u03b1\u03c4\u03b9\u03ba\u03ad\u03c2 \u03b4\u03c1\u03b1\u03c3\u03c4\u03b7\u03c1\u03b9\u03cc\u03c4\u03b7\u03c4\u03b5\u03c2 \u03ba\u03bb\u03ad\u03b2\u03bf\u03bd\u03c4\u03b1\u03c2, \u03b1\u03bb\u03bb\u03ac\u03b6\u03bf\u03bd\u03c4\u03b1\u03c2 \u03ba\u03b1\u03b9 \u03b4\u03b9\u03b1\u03b3\u03c1\u03ac\u03c6\u03bf\u03bd\u03c4\u03b1\u03c2 \u03b5\u03c5\u03b1\u03af\u03c3\u03b8\u03b7\u03c4\u03b5\u03c2 \u03c0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03af\u03b5\u03c2 \u03ae \u03b1\u03bd\u03b1\u03bb\u03b1\u03bc\u03b2\u03ac\u03bd\u03bf\u03bd\u03c4\u03b1\u03c2 \u03c4\u03bf\u03bd \u03ad\u03bb\u03b5\u03b3\u03c7\u03bf \u03c4\u03c9\u03bd \u03c3\u03c5\u03c3\u03c4\u03b7\u03bc\u03ac\u03c4\u03c9\u03bd. \u03a3\u03c4\u03b7\u03bd \u0395\u03c5\u03c1\u03c9\u03c0\u03b1\u03ca\u03ba\u03ae \u0388\u03bd\u03c9\u03c3\u03b7, \u03c4\u03bf\u00a0<a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-2020-2021-eu-statistics\/102335\/\" target=\"_blank\" rel=\"noopener\">70 \u03c4\u03bf\u03b9\u03c2 \u03b5\u03ba\u03b1\u03c4\u03cc \u03c4\u03c9\u03bd \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd \u03c4\u03c9\u03bd \u03c7\u03c1\u03b7\u03c3\u03c4\u03ce\u03bd \u03c4\u03bf\u03c5 \u0394\u03b9\u03b1\u03b4\u03b9\u03ba\u03c4\u03cd\u03bf\u03c5 \u03ad\u03c7\u03b5\u03b9 \u03c5\u03c0\u03bf\u03c3\u03c4\u03b5\u03af \u03c4\u03bf\u03c5\u03bb\u03ac\u03c7\u03b9\u03c3\u03c4\u03bf\u03bd \u03bc\u03af\u03b1 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf\u03c5 \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03bf\u03cd<\/a>.<\/p>\n<p><strong>\u03a4\u03b9 \u03bd\u03b1 \u03ba\u03ac\u03bd\u03b5\u03c4\u03b5:<\/strong> \u039f \u03b1\u03c0\u03bf\u03ba\u03bb\u03b5\u03b9\u03c3\u03bc\u03cc\u03c2 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03c9\u03bd \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf\u03c5 \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03bf\u03cd \u03b1\u03c1\u03c7\u03af\u03b6\u03b5\u03b9 \u03bd\u03b1 \u03b1\u03c0\u03b1\u03b9\u03c4\u03b5\u03af \u03c0\u03b9\u03bf \u03c0\u03c1\u03bf\u03b7\u03b3\u03bc\u03ad\u03bd\u03b7 \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1 \u03b1\u03c0\u03cc \u03b1\u03c0\u03b5\u03b9\u03bb\u03ad\u03c2. \u03a0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c4\u03ad\u03c8\u03c4\u03b5 \u03c4\u03b7\u03bd \u03b5\u03c4\u03b1\u03b9\u03c1\u03b5\u03af\u03b1 \u03c3\u03b1\u03c2 \u03bc\u03b5 <a href=\"https:\/\/securelist.com\/category\/malware-reports\" target=\"_blank\" rel=\"noopener\">\u03b4\u03c9\u03c1\u03b5\u03ac\u03bd \u03b1\u03bd\u03b1\u03c6\u03bf\u03c1\u03ad\u03c2 \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf\u03c5 \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03bf\u03cd<\/a>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-43389\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/01\/17061639\/9-cyberthreats-5-1.gif\" alt=\"\" width=\"358\" height=\"358\"><\/p>\n<h2>9. \u03a0\u03c1\u03cc\u03b2\u03bb\u03b7\u03bc\u03b1 \u03bc\u03ad\u03c3\u03c9 \u201c\u03b8\u03c5\u03c1\u03ce\u03bd\u201d<\/h2>\n<p>\u03a4\u03b1 \u03c4\u03b5\u03c1\u03bc\u03b1\u03c4\u03b9\u03ba\u03ac \u03c3\u03b7\u03bc\u03b5\u03af\u03b1 \u03b5\u03af\u03bd\u03b1\u03b9 \u03bf\u03b9 \u201c\u03c0\u03cc\u03c1\u03c4\u03b5\u03c2\u201d \u03c0\u03bf\u03c5 \u03c7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03bf\u03cd\u03bd \u03bf\u03b9 \u03b5\u03c1\u03b3\u03b1\u03b6\u03cc\u03bc\u03b5\u03bd\u03bf\u03af \u03c3\u03b1\u03c2 \u03b3\u03b9\u03b1 \u03c0\u03c1\u03cc\u03c3\u03b2\u03b1\u03c3\u03b7 \u03c3\u03b5 \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03b1 \u03ba\u03b1\u03b9 \u03c3\u03c5\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03c9\u03bd, \u03cc\u03c0\u03c9\u03c2 \u03c6\u03bf\u03c1\u03b7\u03c4\u03bf\u03af \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2, \u03ba\u03b9\u03bd\u03b7\u03c4\u03ac \u03c4\u03b7\u03bb\u03ad\u03c6\u03c9\u03bd\u03b1 \u03ba\u03b1\u03b9 \u03b4\u03b9\u03b1\u03ba\u03bf\u03bc\u03b9\u03c3\u03c4\u03ad\u03c2. \u039f\u03b9 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b5\u03b3\u03ba\u03bb\u03b7\u03bc\u03b1\u03c4\u03af\u03b5\u03c2 \u03bb\u03b1\u03c4\u03c1\u03b5\u03cd\u03bf\u03c5\u03bd \u03bd\u03b1 \u03c4\u03bf\u03c5\u03c2 \u03b5\u03c0\u03b9\u03c4\u03af\u03b8\u03b5\u03bd\u03c4\u03b1\u03b9.<\/p>\n<p>\u03a4\u03bf 2019, \u03c4\u03bf <a href=\"https:\/\/www.securityinfowatch.com\/cybersecurity\/press-release\/21123576\/ponemon-institute-ponemon-institute-reveals-68-of-organizations-were-victims-of-successful-endpoint-attacks-in-2019\" target=\"_blank\" rel=\"noopener nofollow\">68 \u03c4\u03bf\u03b9\u03c2 \u03b5\u03ba\u03b1\u03c4\u03cc \u03c4\u03c9\u03bd \u03bf\u03c1\u03b3\u03b1\u03bd\u03b9\u03c3\u03bc\u03ce\u03bd \u03b5\u03af\u03c7\u03b5 \u03b4\u03b5\u03c7\u03c4\u03b5\u03af \u03bc\u03af\u03b1 \u03ae \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b5\u03c2 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 \u03c4\u03b5\u03c1\u03bc\u03b1\u03c4\u03b9\u03ba\u03bf\u03cd \u03c3\u03b7\u03bc\u03b5\u03af\u03bf\u03c5<\/a> \u03c0\u03bf\u03c5 \u03ad\u03b8\u03b5\u03c4\u03b1\u03bd \u03c3\u03b5 \u03ba\u03af\u03bd\u03b4\u03c5\u03bd\u03bf \u03c4\u03b1 \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03b1. \u039a\u03b1\u03b9 \u03bc\u03b5 \u03c4\u03b7 \u03bd\u03ad\u03b1 \u03c0\u03c1\u03b1\u03b3\u03bc\u03b1\u03c4\u03b9\u03ba\u03cc\u03c4\u03b7\u03c4\u03b1 \u03c4\u03c9\u03bd \u03b5\u03c1\u03b3\u03b1\u03b6\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd \u03c0\u03bf\u03c5 \u03b5\u03c1\u03b3\u03ac\u03b6\u03bf\u03bd\u03c4\u03b1\u03b9 \u03b1\u03c0\u03cc \u03c4\u03bf \u03c3\u03c0\u03af\u03c4\u03b9, \u03bf\u03b9 \u03bf\u03c1\u03b3\u03b1\u03bd\u03b9\u03c3\u03bc\u03bf\u03af \u03c0\u03c1\u03ad\u03c0\u03b5\u03b9 \u03bd\u03b1 \u03b5\u03bd\u03b9\u03c3\u03c7\u03cd\u03c3\u03bf\u03c5\u03bd \u03c0\u03b5\u03c1\u03b1\u03b9\u03c4\u03ad\u03c1\u03c9 \u03c4\u03b7\u03bd \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03ac \u03c4\u03bf\u03c5\u03c2 \u03c3\u03c4\u03bf \u03c4\u03b5\u03c1\u03bc\u03b1\u03c4\u03b9\u03ba\u03cc \u03c3\u03b7\u03bc\u03b5\u03af\u03bf.<\/p>\n<p><strong>\u03a4\u03b9 \u03c0\u03c1\u03ad\u03c0\u03b5\u03b9 \u03bd\u03b1 \u03ba\u03ac\u03bd\u03b5\u03c4\u03b5:<\/strong> \u0393\u03b9\u03b1 \u03bd\u03b1 \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c4\u03ad\u03c8\u03b5\u03c4\u03b5 \u03c4\u03bf\u03c5\u03c2 \u03b5\u03c1\u03b3\u03b1\u03b6\u03cc\u03bc\u03b5\u03bd\u03bf\u03c5\u03c2 \u03c3\u03c4\u03b1 \u03b3\u03c1\u03b1\u03c6\u03b5\u03af\u03b1, \u03c4\u03bf\u03c5\u03c2 \u03b1\u03c0\u03bf\u03bc\u03b1\u03ba\u03c1\u03c5\u03c3\u03bc\u03ad\u03bd\u03bf\u03c5\u03c2 \u03b1\u03bb\u03bb\u03ac \u03ba\u03b1\u03b9 \u03c4\u03bf\u03c5\u03c2 \u03c5\u03b2\u03c1\u03b9\u03b4\u03b9\u03ba\u03bf\u03cd\u03c2 \u03b5\u03c1\u03b3\u03b1\u03b6\u03cc\u03bc\u03b5\u03bd\u03bf\u03c5\u03c2, \u03c7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03ae\u03c3\u03c4\u03b5 \u03c4\u03bf <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/managed-endpoint-detection-response\/36539\/\" target=\"_blank\" rel=\"noopener nofollow\">Endpoint Detection and Response (EDR)<\/a> \u03b3\u03b9\u03b1 \u03bd\u03b1 \u03c0\u03b1\u03c1\u03b1\u03ba\u03bf\u03bb\u03bf\u03c5\u03b8\u03b5\u03af\u03c4\u03b5 \u03c3\u03c5\u03bd\u03b5\u03c7\u03ce\u03c2 \u03c4\u03b1 \u03c4\u03b5\u03c1\u03bc\u03b1\u03c4\u03b9\u03ba\u03ac \u03c3\u03b7\u03bc\u03b5\u03af\u03b1. \u0394\u03b9\u03b1\u03b2\u03ac\u03c3\u03c4\u03b5 \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b1 \u03c3\u03c7\u03b5\u03c4\u03b9\u03ba\u03ac \u03bc\u03b5 \u03c4\u03bf \u03c0\u03ce\u03c2 \u03b7 <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/system-hardening-reduce-cyberattacks\/35812\" target=\"_blank\" rel=\"noopener nofollow\">\u03b5\u03bd\u03af\u03c3\u03c7\u03c5\u03c3\u03b7 \u03c4\u03b7\u03c2 \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1\u03c2 \u03c3\u03c4\u03bf\u03bd \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf \u03b3\u03b9\u03b1 \u03b1\u03c0\u03bf\u03bc\u03b1\u03ba\u03c1\u03c5\u03c3\u03bc\u03ad\u03bd\u03b7 \u03b5\u03c1\u03b3\u03b1\u03c3\u03af\u03b1 \u03bc\u03c0\u03bf\u03c1\u03b5\u03af \u03bd\u03b1 \u03bc\u03b5\u03b9\u03ce\u03c3\u03b5\u03b9 \u03c4\u03b9\u03c2 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 \u03c3\u03c4\u03bf\u03bd \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf<\/a>.<\/p>\n<p>\u039f\u03b9 \u03c0\u03c1\u03bf\u03b7\u03b3\u03bc\u03ad\u03bd\u03b5\u03c2 \u03b1\u03c0\u03b5\u03b9\u03bb\u03ad\u03c2 \u03c3\u03c4\u03bf\u03bd \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf \u03b5\u03af\u03bd\u03b1\u03b9 \u03ba\u03bf\u03b9\u03bd\u03ad\u03c2 \u03ba\u03b1\u03b9 \u03ad\u03c7\u03bf\u03c5\u03bd \u03bc\u03b5\u03b3\u03ac\u03bb\u03bf \u03b1\u03bd\u03c4\u03af\u03ba\u03c4\u03c5\u03c0\u03bf \u03c3\u03c4\u03b7 \u03c6\u03ae\u03bc\u03b7 \u03c4\u03b7\u03c2 \u03b5\u03c0\u03b9\u03c7\u03b5\u03af\u03c1\u03b7\u03c3\u03b7\u03c2 \u03ba\u03b1\u03b9 \u03c3\u03c4\u03bf \u03c4\u03b5\u03bb\u03b9\u03ba\u03cc \u03b1\u03c0\u03bf\u03c4\u03ad\u03bb\u03b5\u03c3\u03bc\u03b1. \u038c\u03c4\u03b1\u03bd \u03bf\u03b9 \u03b7\u03b3\u03ad\u03c4\u03b5\u03c2 \u03c4\u03c9\u03bd \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03c9\u03bd \u03b1\u03bd\u03b1\u03bb\u03b1\u03bc\u03b2\u03ac\u03bd\u03bf\u03c5\u03bd \u03b4\u03c1\u03ac\u03c3\u03b7 \u03b3\u03b9\u03b1 \u03c4\u03b7\u03bd \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c3\u03c4\u03bf\u03bd \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf, \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c4\u03b5\u03cd\u03bf\u03c5\u03bd \u03c4\u03b7\u03bd \u03b5\u03c0\u03b9\u03c7\u03b5\u03af\u03c1\u03b7\u03c3\u03ae \u03c4\u03bf\u03c5\u03c2 \u03ba\u03b1\u03b9 \u03b1\u03c0\u03bf\u03c6\u03b5\u03cd\u03b3\u03bf\u03c5\u03bd \u03bd\u03b1 \u03be\u03bf\u03b4\u03b5\u03cd\u03bf\u03c5\u03bd \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b1 \u03b1\u03c1\u03b3\u03cc\u03c4\u03b5\u03c1\u03b1 \u03b3\u03b9\u03b1 \u03bd\u03b1 \u03ba\u03b1\u03b8\u03b1\u03c1\u03af\u03c3\u03bf\u03c5\u03bd \u03c4\u03b7 \u03b6\u03b7\u03bc\u03b9\u03ac \u03b1\u03c0\u03cc \u03bc\u03b9\u03b1 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7. \u03a4\u03bf \u03c0\u03bb\u03ae\u03c1\u03b5\u03c2 \u03c0\u03bb\u03b1\u03af\u03c3\u03b9\u03bf \u03bb\u03cd\u03c3\u03b5\u03c9\u03bd \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2 \u03c4\u03b7\u03c2 Kaspersky \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c4\u03b5\u03cd\u03b5\u03b9 \u03c4\u03b7\u03bd \u03b5\u03c0\u03b9\u03c7\u03b5\u03af\u03c1\u03b7\u03c3\u03ae \u03c3\u03b1\u03c2 \u03b1\u03c0\u03cc \u03cc\u03bb\u03b5\u03c2 \u03c4\u03b9\u03c2 \u03ba\u03bf\u03b9\u03bd\u03ad\u03c2, \u03b4\u03b9\u03b5\u03b9\u03c3\u03b4\u03c5\u03c4\u03b9\u03ba\u03ad\u03c2 \u03ba\u03b1\u03b9 \u03bf\u03b9\u03ba\u03bf\u03bd\u03bf\u03bc\u03b9\u03ba\u03ac \u03b5\u03c0\u03b9\u03b6\u03ae\u03bc\u03b9\u03b5\u03c2 \u03b1\u03c0\u03b5\u03b9\u03bb\u03ad\u03c2.<\/p>\n<div class=\"interactive\"><form id=\"mktoForm_25742\"><\/form><script>MktoForms2.loadForm(\"\/\/app-sj06.marketo.com\", \"802-IJN-240\", 25742, function(form) {\n                form.onSuccess(function(values, tyURL){\n                    \/\/Take the lead to a different page on successful submit, ignoring the forms configured tyURL.\n                    location.href = \"https:\/\/go.kaspersky.com\/el_onepartner_typ.html\";\n                    dataLayer.push({\n                        'event': 'addEvents_makeConversions',\n                        'event_id': 'd-n01-e11',\n                        'conversion_name': 'Marketo Form',\n                        'conversion_step': 'Form Fill Out',\n                        'conversion_param': jQuery(location).attr(\"href\"),\n                        'eventCallback' : function() {\n                            jQuery(location).attr('href',\"https:\/\/go.kaspersky.com\/el_onepartner_typ.html\");\n                        }\n                    });\n                    \/\/return false to prevent the submission handler continuing with its own processing\n                    return false;\n                  });\n            });<\/script><\/div><!-- RECAPTCHA -->\n        <style>.googleRecaptcha { padding: 20px !important; }<\/style>\n        <script>\n            var GOOGLE_RECAPTCHA_SITE_KEY = '6Lf2eUQUAAAAAC-GQSZ6R2pjePmmD6oA6F_3AV7j';\n\n            var insertGoogleRecaptcha = function (form) {\n            var formElem = form.getFormElem().get(0);\n\n            if (formElem && window.grecaptcha) {\n                var div = window.document.createElement('div');\n                var divId = 'g-recaptcha-' + form.getId();\n                var buttonRow = formElem.querySelector('.mktoButtonRow');\n                var button = buttonRow ? buttonRow.querySelector('.mktoButton[type=\"submit\"]') : null;\n\n                var submitHandler = function (e) {\n                var recaptchaResponse = window.grecaptcha && window.grecaptcha.getResponse(widgetId);\n                e.preventDefault();\n\n                if (form.validate()) {\n                    if (!recaptchaResponse) {\n                    div.setAttribute('data-error', 'true');\n                    } else {\n                    div.setAttribute('data-error', 'false');\n\n                    form.addHiddenFields({\n                        reCAPTCHAFormResponse: recaptchaResponse,\n                    });\n\n                    form.submit();\n                    }\n                }\n                };\n\n                div.id = divId;\n                div.classList.add('googleRecaptcha');\n\n                if (button) {\n                button.addEventListener('click', submitHandler);\n                }\n\n                if (buttonRow) {\n                formElem.insertBefore(div, buttonRow);\n                }\n\n                if (window.grecaptcha.render) {\n                    var widgetId = window.grecaptcha.render(divId, {\n                    sitekey: GOOGLE_RECAPTCHA_SITE_KEY,\n                });\n                formElem.style.display = '';\n                }\n            }\n            };\n\n            function onloadApiCallback() {\n            var forms = MktoForms2.allForms();\n            for (var i = 0; i < forms.length; i++) {\n                insertGoogleRecaptcha(forms[i]);\n            }\n            }\n\n            (function () {\n            MktoForms2.whenReady(function (form) {\n                form.getFormElem().get(0).style.display = 'none';\n                jQuery.getScript('\/\/www.google.com\/recaptcha\/api.js?onload=onloadApiCallback');\n            });\n            })();\n        <\/script>\n        <!-- END RECAPTCHA -->\n","protected":false},"excerpt":{"rendered":"<p>\u039f\u03b9 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 \u03b1\u03c0\u03bf\u03c4\u03b5\u03bb\u03bf\u03cd\u03bd \u03c4\u03b7 \u03bc\u03b5\u03b3\u03b1\u03bb\u03cd\u03c4\u03b5\u03c1\u03b7 \u03b1\u03c0\u03b5\u03b9\u03bb\u03ae \u03b3\u03b9\u03b1 \u03c4\u03b9\u03c2 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2 \u03c3\u03ae\u03bc\u03b5\u03c1\u03b1. \u03a0\u03c1\u03bf\u03b2\u03bb\u03ad\u03c0\u03c9 \u03ac\u03c1\u03b1 \u03c0\u03c1\u03bf\u03b5\u03c4\u03bf\u03b9\u03bc\u03ac\u03b6\u03bf\u03bc\u03b1\u03b9 , \u03b5\u03c0\u03bf\u03bc\u03ad\u03bd\u03c9\u03c2 \u03b5\u03b4\u03ce \u03b5\u03af\u03bd\u03b1\u03b9 \u03bc\u03b9\u03b1 \u03bc\u03b9\u03ba\u03c1\u03ae \u03bb\u03af\u03c3\u03c4\u03b1 \u03bc\u03b5 \u03c4\u03b9\u03c2 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 \u03c0\u03bf\u03c5 \u03c0\u03c1\u03ad\u03c0\u03b5\u03b9 \u03bd\u03b1 \u03b3\u03bd\u03c9\u03c1\u03af\u03b6\u03b5\u03c4\u03b5.<\/p>\n","protected":false},"author":2633,"featured_media":43387,"template":"","coauthors":[4046],"class_list":{"0":"post-43386","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-enterprise-cybersecurity","7":"emagazine-tag-advanced-threats","8":"emagazine-tag-malware","9":"emagazine-tag-ransomware"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/9-advanced-cybersecurity-threats-gr\/43386\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/43386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2633"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/43387"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=43386"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=43386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}