{"id":1348,"date":"2023-02-04T16:15:36","date_gmt":"2023-02-04T16:15:36","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1348"},"modified":"2023-02-04T16:15:36","modified_gmt":"2023-02-04T16:15:36","slug":"%d8%a3%d8%ad%d8%b5%d9%86%d8%a9-%d8%b7%d8%b1%d9%88%d8%a7%d8%af%d8%a9-%d8%a7%d9%84%d9%85%d8%b5%d8%b1%d9%81%d9%8a%d8%a9-%d9%88%d8%a7%d9%84%d8%aa%d8%b5%d9%8a%d8%af-%d9%88%d8%a7%d9%84%d8%a8%d8%b1%d9%85","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ar\/%d8%a7%d9%84%d8%a3%d8%ae%d8%a8%d8%a7%d8%b1\/%d8%a3%d8%ad%d8%b5%d9%86%d8%a9-%d8%b7%d8%b1%d9%88%d8%a7%d8%af%d8%a9-%d8%a7%d9%84%d9%85%d8%b5%d8%b1%d9%81%d9%8a%d8%a9-%d9%88%d8%a7%d9%84%d8%aa%d8%b5%d9%8a%d8%af-%d9%88%d8%a7%d9%84%d8%a8%d8%b1%d9%85\/","title":{"rendered":"\u062a\u0633\u062a\u0645\u0631 \u0623\u062d\u0635\u0646\u0629 \u0637\u0631\u0648\u0627\u062f\u0629 \u0627\u0644\u0645\u0635\u0631\u0641\u064a\u0629 \u0648\u0627\u0644\u062a\u0635\u064a\u062f \u0627\u0644\u0627\u062d\u062a\u064a\u0627\u0644\u064a \u0648\u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0641\u062f\u064a\u0629 \u0641\u064a \u0627\u0644\u0647\u064a\u0645\u0646\u0629 \u0641\u064a \u0639\u0627\u0645 2023"},"content":{"rendered":"<p>The Covid-19 situation has accelerated digital transformation processes and formalized teleworking, resulting in an increase in cyberthreats to levels never seen before and never predicted. Let\u2019s remember that Malware is a combination of two words \u2013 \u201cmalicious\u201d and \u201csoftware\u201d. This term refers to any type of malicious code, regardless of how it affects victims, behaves, or causes damage. Malware encompasses all forms of malicious software, including Trojan Horses, Ransomware, Viruses, Worms, and Banking Malware. It is difficult for a normal user to tell which files are malware and which are not. That is why security solutions exist, such as vast databases of previously seen malicious samples and the use of multiple protection technologies to detect the most recent ones.<\/p>\n\n\n\n<p>Malware authors today are extremely inventive. To avoid detection, their \u201ccreations\u201d spread through vulnerabilities in unpatched systems, bypass security measures, hide in memory, or mimic legitimate applications. Even today, however, one of the most potent vectors of infection is the weakest link in the chain: humans. Emails with malicious attachments have proven to be an effective and low-cost way to compromise a system. And it only takes one click to do so.<\/p>\n\n\n\n<p>\u0627\u0644\u062e\u0637\u0648\u0629 \u0627\u0644\u0623\u0648\u0644\u0649 \u0647\u064a \u0627\u0644\u062d\u0641\u0627\u0638 \u0639\u0644\u0649 \u062a\u062d\u062f\u064a\u062b \u062c\u0645\u064a\u0639 \u0627\u0644\u0628\u0631\u0627\u0645\u062c\u060c \u0628\u0645\u0627 \u0641\u064a \u0630\u0644\u0643 \u0646\u0638\u0627\u0645 \u0627\u0644\u062a\u0634\u063a\u064a\u0644 \u0648\u062c\u0645\u064a\u0639 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a. \u0644\u064a\u0633 \u0641\u0642\u0637 \u0644\u0625\u0636\u0627\u0641\u0629 \u0645\u064a\u0632\u0627\u062a \u0648\u062a\u062d\u0633\u064a\u0646\u0627\u062a\u060c \u0648\u0644\u0643\u0646 \u0623\u064a\u0636\u064b\u0627 \u0644\u0625\u0635\u0644\u0627\u062d \u0627\u0644\u0623\u062e\u0637\u0627\u0621 \u0648\u0645\u0639\u0627\u0644\u062c\u0629 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u062a\u064a \u064a\u0645\u0643\u0646 \u0623\u0646 \u064a\u0633\u062a\u063a\u0644\u0647\u0627 \u0645\u062c\u0631\u0645\u0648 \u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a \u0648\u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0636\u0627\u0631\u0629. \u0648\u0645\u0639 \u0630\u0644\u0643\u060c \u0644\u0627 \u064a\u063a\u0637\u064a \u0647\u0630\u0627 \u062c\u0645\u064a\u0639 \u0627\u0644\u062a\u0647\u062f\u064a\u062f\u0627\u062a \u0627\u0644\u062d\u0627\u0644\u064a\u0629. \u0639\u0644\u0627\u0648\u0629 \u0639\u0644\u0649 \u0630\u0644\u0643\u060c \u064a\u062a\u0637\u0644\u0628 \u0627\u0644\u0623\u0645\u0631 \u062d\u0644\u0627\u064b \u0623\u0645\u0646\u064a\u064b\u0627 \u0645\u0648\u062b\u0648\u0642\u064b\u0627 \u0648\u0645\u062d\u062f\u062b\u064b\u0627 \u0644\u0625\u062d\u0628\u0627\u0637 \u0645\u062d\u0627\u0648\u0644\u0627\u062a \u0627\u0644\u0647\u062c\u0648\u0645 \u0627\u0644\u0645\u062d\u062a\u0645\u0644\u0629. \u0627\u0644\u0646\u0633\u062e \u0627\u0644\u0627\u062d\u062a\u064a\u0627\u0637\u064a\u0629 \u0627\u0644\u062a\u064a \u062a\u064f\u062c\u0631\u0649 \u0628\u0627\u0646\u062a\u0638\u0627\u0645 \u0648\u062a\u064f\u062e\u0632\u0646 \u0639\u0644\u0649 \u0642\u0631\u0635 \u0635\u0644\u0628 \u063a\u064a\u0631 \u0645\u062a\u0635\u0644 \u0628\u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a \u0647\u064a \u0637\u0631\u064a\u0642\u0629 \u0623\u062e\u0631\u0649 \u0644\u0645\u0643\u0627\u0641\u062d\u0629 \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a \u0627\u0644\u062e\u0628\u064a\u062b\u0629\u060c \u0645\u0645\u0627 \u064a\u0633\u0645\u062d \u0644\u0644\u0645\u0633\u062a\u062e\u062f\u0645 \u0628\u0627\u0633\u062a\u0628\u062f\u0627\u0644 \u0623\u064a \u0628\u064a\u0627\u0646\u0627\u062a \u062a\u0645 \u0625\u062a\u0644\u0627\u0641\u0647\u0627 \u0623\u0648 \u062a\u0634\u0641\u064a\u0631\u0647\u0627 \u0628\u0633\u0647\u0648\u0644\u0629 \u0645\u0646 \u0642\u0628\u0644 \u0645\u0647\u0627\u062c\u0645\u064a \u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a.<\/p>\n\n\n\n<p>\u062f\u0639\u0648\u0646\u0627 \u0646\u0633\u062a\u0630\u0643\u0631 \u0648\u0646\u062a\u0630\u0643\u0631 \u0642\u0644\u064a\u0644\u0627\u064b \u0645\u0646 \u0627\u0644\u062a\u0627\u0631\u064a\u062e. <a href=\"https:\/\/www.trtworld.com\/magazine\/the-making-of-the-first-computer-virus-the-pakistani-brain-32296\" target=\"_blank\" rel=\"noreferrer noopener\">\u0627\u0644\u062f\u0645\u0627\u063a \u0627\u0644\u0628\u0627\u0643\u0633\u062a\u0627\u0646\u064a<\/a> was the first virus to be identified in early 1986. Its goal was to be as inconspicuous as possible. It infected the boot system of 5.25\u2033 floppy disks and spread globally in a matter of weeks, which is remarkable given that it was only distributed via 5.25\u2033 floppy disks. Since then, malware has evolved in a variety of ways, and its creators are constantly coming up with new ways to infect victims. They have a powerful distribution network with the Internet, which allows them to affect potential victims much more easily. This will always be the fundamental logic of a hacker, and it is up to us to practice intelligence and counterintelligence to counteract them. Some malware families, such as WannaCryptor, spread indiscriminately by encrypting files and causing global damage. Others affect smaller groups of victims, such as companies from a specific country in the case of Diskcoder. Petya aka C. Industroyer was a recent example of targeted malware. This malware, discovered by ESET, attacks industrial control systems used in the power grid and has caused blackouts in Ukraine by abusing legitimate but unsecured protocols. It is one of the few malware families that can be compared to Stuxnet, the first cyber weapon ever used.<\/p>\n\n\n\n<p>Since the pandemic was declared, cyberattacks have increased, such as those against the Remote Desktop Protocol (RDP) and Ransomware. The world will have one billion malicious codes by 2022. However, cyberthreats have not only increased in number, but they have also become more sophisticated. For example, today we discuss \u201cFileless Malware,\u201d which does not require the user to enter any files into the system in order to run the Malware: it can be stored in the system\u2019s volatile memory. That is why monitoring and prevention technologies are critical.<\/p>\n\n\n\n<p><br><strong>\u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 \u0628\u0631\u0645\u062c\u064a\u0627\u062a \u062e\u0628\u064a\u062b\u0629 \u0645\u0646 \u0627\u0644\u0623\u0646\u0648\u0627\u0639 \u0627\u0644\u062a\u0627\u0644\u064a\u0629 \u0641\u064a \u0639\u0627\u0645\u064a 2021 \u06482022:<\/strong><\/p>\n\n\n\n<p>1) <strong>\u0627\u0644\u062a\u0648\u0631\u0646\u062a \u0627\u0644\u062e\u0628\u064a\u062b<\/strong>: \u0645\u0646 \u0639\u0627\u0626\u0644\u0629 \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a \u0627\u0644\u062e\u0628\u064a\u062b\u0629 Kryptocibule \u063a\u064a\u0631 \u0627\u0644\u0645\u0639\u0631\u0648\u0641\u0629 \u0633\u0627\u0628\u0642\u064b\u0627. \u062a\u0633\u0631\u0642 \u0627\u0644\u0639\u0645\u0644\u0627\u062a \u0627\u0644\u0645\u0634\u0641\u0631\u0629 \u0648\u062a\u0633\u062a\u062e\u0631\u062c \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0627\u0644\u0645\u062a\u0639\u0644\u0642\u0629 \u0628\u0627\u0644\u0639\u0645\u0644\u0627\u062a \u0627\u0644\u0645\u0634\u0641\u0631\u0629 \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0623\u062f\u0648\u0627\u062a \u0627\u0644\u062a\u0639\u062f\u064a\u0646 \u0648\u0627\u062e\u062a\u0637\u0627\u0641 \u0627\u0644\u062d\u0627\u0641\u0638\u0629.<\/p>\n\n\n\n<p>2) <strong>\u062a\u0647\u062f\u064a\u062f\u0627\u062a \u0623\u0646\u062f\u0631\u0648\u064a\u062f<\/strong>: Malware in the \u2018Hidden Apps\u2019 category has dominated for three consecutive quarters in 2022. This cyberthreat consists of deceptive apps that masquerade as games or utility apps, but after installation, they hide their icons and display full-screen ads.<\/p>\n\n\n\n<p>3)<strong> \u062a\u0647\u062f\u064a\u062f\u0627\u062a \u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a \u0644\u0644\u0623\u0634\u064a\u0627\u0621<\/strong>: \u0646\u0638\u0631\u064b\u0627 \u0644\u0623\u0646 \u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a \u0644\u0644\u0623\u0634\u064a\u0627\u0621 \u0645\u0635\u0645\u0645\u0629 \u0628\u0642\u0644\u064a\u0644 \u0645\u0646 \u0627\u0644\u0623\u0645\u0627\u0646 \u0623\u0648 \u0628\u062f\u0648\u0646\u0647\u060c \u0641\u0647\u064a \u0623\u0647\u062f\u0627\u0641 \u0633\u0647\u0644\u0629 \u0644\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u064a\u0646. \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u0625\u0635\u0627\u0628\u0629 \u0647\u0630\u0647 \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0628\u0627\u0644\u0631\u0648\u0628\u0648\u062a\u0627\u062a \u0627\u0644\u062e\u0628\u064a\u062b\u0629 \u0648\u0627\u0633\u062a\u062e\u062f\u0627\u0645\u0647\u0627 \u0641\u064a \u0634\u0628\u0643\u0627\u062a \u0627\u0644\u0631\u0648\u0628\u0648\u062a\u0627\u062a \u0644\u0644\u0647\u062c\u0645\u0627\u062a \u0648\u0627\u0633\u0639\u0629 \u0627\u0644\u0646\u0637\u0627\u0642.<\/p>\n\n\n\n<p>4) <strong>\u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a \u0627\u0644\u062e\u0628\u064a\u062b\u0629 \u0644\u0623\u062c\u0647\u0632\u0629 \u0645\u0627\u0643<\/strong>: \u0641\u064a \u0639\u0627\u0645 2021\u060c \u062a\u0645 \u0646\u0633\u062e \u0648\u062a\u0631\u0648\u064a\u062c \u062a\u0637\u0628\u064a\u0642 \u0627\u0644\u062a\u062f\u0627\u0648\u0644 Kattana \u0644\u0623\u062c\u0647\u0632\u0629 \u0645\u0627\u0643. \u0627\u0633\u062a\u062e\u062f\u0645 \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u0648\u0646 \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a \u0627\u0644\u062e\u0628\u064a\u062b\u0629 \u0644\u0633\u0631\u0642\u0629 \u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0645\u062b\u0644 \u0645\u0644\u0641\u0627\u062a \u062a\u0639\u0631\u064a\u0641 \u0627\u0644\u0627\u0631\u062a\u0628\u0627\u0637 \u0644\u0644\u0645\u062a\u0635\u0641\u062d\u060c \u0648\u0645\u062d\u0627\u0641\u0638 \u0627\u0644\u0639\u0645\u0644\u0627\u062a \u0627\u0644\u0645\u0634\u0641\u0631\u0629\u060c \u0648\u0644\u0642\u0637\u0627\u062a \u0627\u0644\u0634\u0627\u0634\u0629\u061b \u0628\u062d\u0644\u0648\u0644 \u0639\u0627\u0645 2022\u060c \u062a\u0645 \u0627\u0644\u0642\u0636\u0627\u0621 \u062a\u0645\u0627\u0645\u064b\u0627 \u0639\u0644\u0649 \u0647\u0630\u0627 \u0627\u0644\u0646\u0648\u0639 \u0645\u0646 \u0627\u0644\u062a\u0647\u062f\u064a\u062f\u0627\u062a \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629.<\/p>\n\n\n\n<p>5) <strong>\u0631\u0633\u0627\u0626\u0644 \u0627\u0644\u0628\u0631\u064a\u062f \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a \u0627\u0644\u062e\u0628\u064a\u062b\u0629<\/strong>: \u0633\u062a\u0632\u062f\u0627\u062f \u062a\u0648\u0632\u064a\u0639 \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a \u0627\u0644\u062e\u0628\u064a\u062b\u0629 \u0639\u0628\u0631 \u0627\u0644\u0628\u0631\u064a\u062f \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a \u0641\u064a \u0639\u0627\u0645 2022. \u0627\u0633\u062a\u063a\u0644\u0627\u0644 Microsoft Office \u0647\u0648 \u0627\u0644\u0623\u0643\u062b\u0631 \u0634\u064a\u0648\u0639\u064b\u0627 \u0641\u064a \u0639\u0627\u0645 2022.<\/p>\n\n\n\n<p>\u0627\u0644\u0641\u062f\u064a\u0629 \u0647\u064a \u062a\u0647\u062f\u064a\u062f \u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a \u0645\u0633\u062a\u0645\u0631 \u064a\u0647\u0627\u062c\u0645 \u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0628\u0627\u0633\u062a\u0645\u0631\u0627\u0631\u060c \u0648\u064a\u062e\u062a\u0631\u0642 \u0627\u0644\u0628\u0646\u0649 \u0627\u0644\u062a\u062d\u062a\u064a\u0629 \u0627\u0644\u062d\u064a\u0648\u064a\u0629 \u0645\u062b\u0644 \u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u062d\u0643\u0648\u0645\u064a\u0629 \u0648\u0627\u0644\u0635\u062d\u064a\u0629 \u0648\u0627\u0644\u0637\u0627\u0642\u0629\u060c \u0648\u064a\u0632\u062f\u0627\u062f \u062a\u0639\u0642\u064a\u062f\u064b\u0627. \u0627\u0643\u062a\u0634\u0627\u0641\u0647 \u0648\u0627\u0644\u0642\u0636\u0627\u0621 \u0639\u0644\u064a\u0647. \u0641\u064a \u0639\u0627\u0645 2020\u060c \u062a\u0645 \u062f\u0645\u062c \u0627\u0644\u0641\u062f\u064a\u0629 \u0648\u062a\u0633\u0631\u064a\u0628\u0627\u062a \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a. \u0641\u064a <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">\u0647\u0630\u0647 \u0627\u0644\u0645\u0642\u0627\u0644\u0629<\/a>, \u060c \u064a\u0634\u064a\u0631 \u0625\u0644\u0649 \u0623\u0646 \u0645\u0634\u063a\u0644\u064a \u0639\u0627\u0626\u0644\u0627\u062a \u0627\u0644\u0641\u062f\u064a\u0629 \u0627\u0644\u0645\u062e\u062a\u0644\u0641\u0629 \u0642\u062f \u0623\u0636\u0627\u0641\u0648\u0627 \u062e\u0637\u0631\u064b\u0627 \u0622\u062e\u0631 \u0644\u0647\u0630\u0627 \u0627\u0644\u0646\u0648\u0639 \u0645\u0646 \u0627\u0644\u0647\u062c\u0645\u0627\u062a\u060c \u0644\u0623\u0646\u0647 \u0628\u0627\u0644\u0625\u0636\u0627\u0641\u0629 \u0625\u0644\u0649 \u0627\u062e\u062a\u0637\u0627\u0641 \u0627\u0644\u0645\u0644\u0641\u0627\u062a\u060c \u064a\u0645\u0627\u0631\u0633\u0648\u0646 \u0627\u0644\u0622\u0646 \u0627\u0644\u0627\u0628\u062a\u0632\u0627\u0632\u060c \u0645\u0639 \u0627\u0644\u062a\u0647\u062f\u064a\u062f \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a \u0628\u062a\u0633\u0631\u064a\u0628 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u0645\u062e\u062a\u0631\u0642\u0629. \u062a\u0633\u062a\u062e\u062f\u0645 \u0647\u0630\u0647 \u0627\u0644\u0637\u0631\u064a\u0642\u0629 \u062a\u0642\u0646\u064a\u0629 Doxing\u060c \u0627\u0644\u062a\u064a \u062a\u062a\u0636\u0645\u0646 \u0627\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u0628\u064a\u0627\u0646\u0627\u062a \u0633\u0631\u064a\u0629 \u0645\u0646 \u0627\u0644\u0636\u062d\u0627\u064a\u0627 \u0648\u062a\u0647\u062f\u064a\u062f \u0628\u0646\u0634\u0631\u0647\u0627 \u0639\u0644\u0646\u064b\u0627 \u0645\u0627 \u0644\u0645 \u064a\u062a\u0645 \u062f\u0641\u0639 \u0627\u0644\u0627\u0628\u062a\u0632\u0627\u0632. \u0628\u0644\u0627 \u0634\u0643\u060c \u064a\u0632\u064a\u062f \u0647\u0630\u0627 \u0645\u0646 \u0627\u0644\u0636\u063a\u0637 \u0639\u0644\u0649 \u0627\u0644\u0645\u062a\u0636\u0631\u0631\u064a\u0646\u060c \u0644\u0623\u0646\u0647 \u0644\u0627 \u064a\u062a\u0639\u0644\u0642 \u0641\u0642\u0637 \u0628\u0627\u0633\u062a\u0639\u0627\u062f\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u0645\u0634\u0641\u0631\u0629\u060c \u0628\u0644 \u0623\u064a\u0636\u064b\u0627 \u0628\u0645\u0646\u0639 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u0645\u0633\u0631\u0648\u0642\u0629 \u0645\u0646 \u0623\u0646 \u062a\u0635\u0628\u062d \u0639\u0644\u0646\u064a\u0629.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.geeksforgeeks.org\/what-are-banking-trojans\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u0623\u062d\u0635\u0646\u0629 \u0637\u0631\u0648\u0627\u062f\u0629 \u0627\u0644\u0645\u0635\u0631\u0641\u064a\u0629<\/a>, also known as \u201cBankers,\u201d are malicious code that is widely used in the field of cybercrime. Their function is to steal banking information from users of this type of service. These details are available on the black market. Some people acquire them in order to engage in criminal activities such as extortion and fraud. Around the world, eleven banking Trojan families have been identified.<\/p>\n\n\n\n<p>\u062a\u0633\u062a\u062e\u062f\u0645 \u0647\u0630\u0647 \u0627\u0644\u0639\u0627\u0626\u0644\u0627\u062a \u0623\u062f\u0648\u0627\u062a \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0648\u0627\u0644\u0625\u062e\u0641\u0627\u0621 \u0644\u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0634\u0641\u0631\u0629 \u0645\u0646 \u0627\u0644\u062a\u062d\u0644\u064a\u0644 \u0648\u0628\u0627\u0644\u062a\u0627\u0644\u064a \u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0646\u0634\u0627\u0637 \u0627\u0644\u062e\u0628\u064a\u062b \u0627\u0644\u0630\u064a \u062a\u0642\u0648\u0645 \u0628\u0647 \u0641\u064a \u0627\u0644\u0623\u0646\u0638\u0645\u0629. \u0644\u062a\u062c\u0646\u0628 \u0627\u0644\u0627\u0643\u062a\u0634\u0627\u0641\u0627\u062a\u060c \u062a\u062a\u0636\u0645\u0646 \u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0641\u064a \u0628\u0631\u0645\u062c\u062a\u0647\u0627 \u0644\u0627 \u062a\u062d\u062a\u0648\u064a \u0639\u0644\u0649 \u0625\u062c\u0631\u0627\u0621 \u0645\u062d\u062f\u062f\u061b \u064a\u062a\u0645 \u0645\u0644\u0624\u0647\u0627\u060c \u0647\u064a \u0634\u0641\u0631\u0627\u062a \u063a\u064a\u0631 \u0645\u0641\u064a\u062f\u0629. \u062d\u062a\u0649 \u0627\u0644\u0622\u0646\u060c \u062a\u0645 \u062a\u062d\u062f\u064a\u062f \u0623\u0643\u062b\u0631 \u0645\u0646 50 \u0645\u0624\u0633\u0633\u0629 \u0645\u0627\u0644\u064a\u0629 \u0643\u0636\u062d\u0627\u064a\u0627 \u0644\u0633\u0631\u0642\u0629 \u0627\u0644\u0647\u0648\u064a\u0629 \u0644\u062e\u062f\u0627\u0639 \u0639\u0645\u0644\u0627\u0626\u0647\u0627.<\/p>\n\n\n\n<p><strong>\u0641\u064a \u0627\u0644\u0633\u0646\u0648\u0627\u062a \u0627\u0644\u062b\u0644\u0627\u062b \u0627\u0644\u0645\u0627\u0636\u064a\u0629\u060c \u0643\u0627\u0646\u062a \u0627\u0644\u062a\u0647\u062f\u064a\u062f\u0627\u062a \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629 \u0627\u0644\u0623\u0643\u062b\u0631 \u0634\u064a\u0648\u0639\u064b\u0627 \u0647\u064a:<\/strong><\/p>\n\n\n\n<p>1) <strong>\u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0641\u062f\u064a\u0629<\/strong>: \u064a\u0634\u0643\u0644 \u0645\u0637\u0648\u0631\u0648\u0647\u0627 \u0645\u062c\u0645\u0648\u0639\u0627\u062a \u0645\u0646\u0638\u0645\u0629 \u0648\u064a\u0628\u064a\u0639\u0648\u0646 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u0645\u0633\u0631\u0648\u0642\u0629 \u0645\u0646 \u0636\u062d\u0627\u064a\u0627\u0647\u0645 \u0641\u064a \u0627\u0644\u0634\u0628\u0643\u0629 \u0627\u0644\u0645\u0638\u0644\u0645\u0629. \u062a\u0645 \u062a\u062d\u062f\u064a\u062f 203 \u0646\u0648\u0639\u064b\u0627 \u0645\u062e\u062a\u0644\u0641\u064b\u0627 \u0645\u0646 \u0627\u0644\u0641\u062f\u064a\u0629.<\/p>\n\n\n\n<p>2) <strong>\u0627\u0644\u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0627\u062a<\/strong>: \u0634\u0641\u0631\u0629 \u062e\u0628\u064a\u062b\u0629 \u062a\u062d\u0627\u0648\u0644 \u0627\u0644\u0648\u0635\u0648\u0644 \u0625\u0644\u0649 \u0627\u0644\u0645\u0639\u062f\u0627\u062a \u0639\u0646 \u0637\u0631\u064a\u0642 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u062b\u063a\u0631\u0629 \u0641\u064a \u0627\u0644\u0623\u0646\u0638\u0645\u0629. <a href=\"https:\/\/research.checkpoint.com\/2017\/eternalblue-everything-know\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u0625\u062a\u0631\u0646\u0627\u0644\u0628\u0644\u0648<\/a> (\u0627\u0644\u062a\u064a \u064a\u0646\u062a\u0645\u064a \u0625\u0644\u064a\u0647\u0627 \u0641\u064a\u0631\u0648\u0633 WannaCry) \u0648BlueKeep \u0647\u0645\u0627 \u0639\u0627\u0626\u0644\u062a\u0627\u0646 \u0623\u0643\u062b\u0631 \u0627\u0646\u062a\u0634\u0627\u0631\u064b\u0627 (\u062b\u063a\u0631\u0629 \u0633\u0637\u062d \u0627\u0644\u0645\u0643\u062a\u0628 \u0627\u0644\u0628\u0639\u064a\u062f\u060c \u0648\u0647\u0648 \u0623\u0645\u0631 \u064a\u0635\u0628\u062d \u0630\u0627 \u0635\u0644\u0629 \u0641\u064a \u0639\u0627\u0645 2022 \u0628\u0633\u0628\u0628 \u0627\u062a\u062c\u0627\u0647 \u0627\u0644\u0639\u0645\u0644 \u0639\u0646 \u0628\u064f\u0639\u062f).<\/p>\n\n\n\n<p>3) <strong>\u0628\u0631\u0627\u0645\u062c \u0627\u0644\u062a\u062c\u0633\u0633<\/strong>: \u201cclassic tools\u201d of cybercriminals. It is still critical for them to have a broad reach in propagation. Since 2020, the HoudRat Trojan has been at the top of the list.<\/p>\n\n\n\n<p>4) <strong>\u0627\u0644\u062a\u0635\u064a\u062f \u0627\u0644\u0627\u062d\u062a\u064a\u0627\u0644\u064a<\/strong>: \u0641\u064a \u0639\u0627\u0645 2020\u060c \u0632\u0627\u062f \u0639\u062f\u062f \u0627\u0643\u062a\u0634\u0627\u0641\u0627\u062a \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0627\u0644\u0645\u0631\u062a\u0628\u0637\u0629 \u0628\u062d\u0645\u0644\u0627\u062a \u0627\u0644\u062a\u0635\u064a\u062f \u0627\u0644\u0627\u062d\u062a\u064a\u0627\u0644\u064a \u0628\u0646\u0633\u0628\u0629 27%\u060c \u0644\u064a\u0635\u0644 \u0625\u0644\u0649 53% \u0641\u064a \u0639\u0627\u0645 2022. \u064a\u0645\u062b\u0644 \u0630\u0644\u0643 \u0632\u064a\u0627\u062f\u0629 \u0643\u0628\u064a\u0631\u0629\u060c \u062d\u064a\u062b \u0643\u0627\u0646\u062a \u0647\u0630\u0647 \u0627\u0644\u0627\u0643\u062a\u0634\u0627\u0641\u0627\u062a 15% \u0641\u064a \u0639\u0627\u0645 2019.<\/p>\n\n\n\n<p>The cost of financial cybercrime has surpassed $600 billion. As if that weren\u2019t enough, there is a shortage of specialists due to changes in the cyberthreat landscape and the variety of new Malware developments, which have highlighted the shortage of professionals in the field of cybersecurity. According to various studies published at the end of 2019, 4.07 million Cybersecurity professionals were required.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u0644\u0642\u062f \u0633\u0631\u0651\u0639\u062a \u062c\u0627\u0626\u062d\u0629 \u0643\u0648\u0641\u064a\u062f-19 \u0639\u0645\u0644\u064a\u0627\u062a \u0627\u0644\u062a\u062d\u0648\u0644 \u0627\u0644\u0631\u0642\u0645\u064a \u0648\u0623\u0631\u0633\u062a \u0646\u0638\u0627\u0645 \u0627\u0644\u0639\u0645\u0644 \u0639\u0646 \u0628\u064f\u0639\u062f \u0631\u0633\u0645\u064a\u064b\u0627\u060c \u0645\u0645\u0627 \u0623\u062f\u0649 \u0625\u0644\u0649 \u0632\u064a\u0627\u062f\u0629 \u0627\u0644\u062a\u0647\u062f\u064a\u062f\u0627\u062a \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629 \u0625\u0644\u0649 \u0645\u0633\u062a\u0648\u064a\u0627\u062a \u063a\u064a\u0631 \u0645\u0633\u0628\u0648\u0642\u0629 \u0648\u0644\u0645 \u062a\u0643\u0646 \u0645\u062a\u0648\u0642\u0639\u0629. \u0644\u0646\u062a\u0630\u0643\u0631 \u0623\u0646 \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a \u0627\u0644\u062e\u0628\u064a\u062b\u0629... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ar\/%d8%a7%d9%84%d8%a3%d8%ae%d8%a8%d8%a7%d8%b1\/%d8%a3%d8%ad%d8%b5%d9%86%d8%a9-%d8%b7%d8%b1%d9%88%d8%a7%d8%af%d8%a9-%d8%a7%d9%84%d9%85%d8%b5%d8%b1%d9%81%d9%8a%d8%a9-%d9%88%d8%a7%d9%84%d8%aa%d8%b5%d9%8a%d8%af-%d9%88%d8%a7%d9%84%d8%a8%d8%b1%d9%85\/\">\u0645\u062a\u0627\u0628\u0639\u0629 \u0627\u0644\u0642\u0631\u0627\u0621\u0629 <span class=\"screen-reader-text\">\u062a\u0633\u062a\u0645\u0631 \u0623\u062d\u0635\u0646\u0629 \u0637\u0631\u0648\u0627\u062f\u0629 \u0627\u0644\u0645\u0635\u0631\u0641\u064a\u0629 \u0648\u0627\u0644\u062a\u0635\u064a\u062f \u0627\u0644\u0627\u062d\u062a\u064a\u0627\u0644\u064a \u0648\u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0641\u062f\u064a\u0629 \u0641\u064a \u0627\u0644\u0647\u064a\u0645\u0646\u0629 \u0641\u064a \u0639\u0627\u0645 2023<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1351,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-1348","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital Threats in 2023 - Securitybriefing.net<\/title>\n<meta name=\"description\" content=\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ar\/\u0627\u0644\u0623\u062e\u0628\u0627\u0631\/\u0623\u062d\u0635\u0646\u0629-\u0637\u0631\u0648\u0627\u062f\u0629-\u0627\u0644\u0645\u0635\u0631\u0641\u064a\u0629-\u0648\u0627\u0644\u062a\u0635\u064a\u062f-\u0648\u0627\u0644\u0628\u0631\u0645\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Threats in 2023 - Securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ar\/\u0627\u0644\u0623\u062e\u0628\u0627\u0631\/\u0623\u062d\u0635\u0646\u0629-\u0637\u0631\u0648\u0627\u062f\u0629-\u0627\u0644\u0645\u0635\u0631\u0641\u064a\u0629-\u0648\u0627\u0644\u062a\u0635\u064a\u062f-\u0648\u0627\u0644\u0628\u0631\u0645\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-04T16:15:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 \u062f\u0642\u0627\u0626\u0642\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\",\"datePublished\":\"2023-02-04T16:15:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"},\"wordCount\":1223,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"ar\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\",\"name\":\"Digital Threats in 2023 - Securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"datePublished\":\"2023-02-04T16:15:36+00:00\",\"description\":\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ar\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u0627\u0644\u062a\u0647\u062f\u064a\u062f\u0627\u062a \u0627\u0644\u0631\u0642\u0645\u064a\u0629 \u0641\u064a \u0639\u0627\u0645 2023 - Securitybriefing.net","description":"\u062a\u0639\u0631\u0641 \u0639\u0644\u0649 \u0627\u0644\u0647\u064a\u0645\u0646\u0629 \u0627\u0644\u0645\u0633\u062a\u0645\u0631\u0629 \u0644\u0628\u0631\u0627\u0645\u062c \u0637\u0631\u0648\u0627\u062f\u0629 \u0627\u0644\u0645\u0635\u0631\u0641\u064a\u0629\u060c \u0648\u0627\u0644\u062a\u0635\u064a\u062f \u0627\u0644\u0627\u062d\u062a\u064a\u0627\u0644\u064a\u060c \u0648\u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0641\u062f\u064a\u0629 \u0641\u064a \u0639\u0627\u0645 2023. \u0627\u062d\u0635\u0644 \u0639\u0644\u0649 \u0646\u0635\u0627\u0626\u062d \u062d\u0648\u0644 \u0643\u064a\u0641\u064a\u0629 \u0627\u0644\u0628\u0642\u0627\u0621 \u0645\u062d\u0645\u064a\u064b\u0627.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ar\/\u0627\u0644\u0623\u062e\u0628\u0627\u0631\/\u0623\u062d\u0635\u0646\u0629-\u0637\u0631\u0648\u0627\u062f\u0629-\u0627\u0644\u0645\u0635\u0631\u0641\u064a\u0629-\u0648\u0627\u0644\u062a\u0635\u064a\u062f-\u0648\u0627\u0644\u0628\u0631\u0645\/","og_locale":"ar_AR","og_type":"article","og_title":"Digital Threats in 2023 - Securitybriefing.net","og_description":"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.","og_url":"https:\/\/securitybriefing.net\/ar\/\u0627\u0644\u0623\u062e\u0628\u0627\u0631\/\u0623\u062d\u0635\u0646\u0629-\u0637\u0631\u0648\u0627\u062f\u0629-\u0627\u0644\u0645\u0635\u0631\u0641\u064a\u0629-\u0648\u0627\u0644\u062a\u0635\u064a\u062f-\u0648\u0627\u0644\u0628\u0631\u0645\/","og_site_name":"Security Briefing","article_published_time":"2023-02-04T16:15:36+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"C\u00e9sar Daniel Barreto","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"6 \u062f\u0642\u0627\u0626\u0642"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023","datePublished":"2023-02-04T16:15:36+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"},"wordCount":1223,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","articleSection":["News"],"inLanguage":"ar"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/","url":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/","name":"\u0627\u0644\u062a\u0647\u062f\u064a\u062f\u0627\u062a \u0627\u0644\u0631\u0642\u0645\u064a\u0629 \u0641\u064a \u0639\u0627\u0645 2023 - Securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","datePublished":"2023-02-04T16:15:36+00:00","description":"\u062a\u0639\u0631\u0641 \u0639\u0644\u0649 \u0627\u0644\u0647\u064a\u0645\u0646\u0629 \u0627\u0644\u0645\u0633\u062a\u0645\u0631\u0629 \u0644\u0628\u0631\u0627\u0645\u062c \u0637\u0631\u0648\u0627\u062f\u0629 \u0627\u0644\u0645\u0635\u0631\u0641\u064a\u0629\u060c \u0648\u0627\u0644\u062a\u0635\u064a\u062f \u0627\u0644\u0627\u062d\u062a\u064a\u0627\u0644\u064a\u060c \u0648\u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0641\u062f\u064a\u0629 \u0641\u064a \u0639\u0627\u0645 2023. \u0627\u062d\u0635\u0644 \u0639\u0644\u0649 \u0646\u0635\u0627\u0626\u062d \u062d\u0648\u0644 \u0643\u064a\u0641\u064a\u0629 \u0627\u0644\u0628\u0642\u0627\u0621 \u0645\u062d\u0645\u064a\u064b\u0627.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","width":662,"height":327,"caption":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\u0627\u0644\u0625\u062d\u0627\u0637\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\u0627\u0644\u0625\u062d\u0627\u0637\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"\u0633\u064a\u0632\u0627\u0631 \u062f\u0627\u0646\u064a\u064a\u0644 \u0628\u0627\u0631\u064a\u062a\u0648","image":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"\u0633\u064a\u0632\u0627\u0631 \u062f\u0627\u0646\u064a\u064a\u0644 \u0628\u0627\u0631\u064a\u062a\u0648 \u0643\u0627\u062a\u0628 \u0648\u062e\u0628\u064a\u0631 \u0645\u0631\u0645\u0648\u0642 \u0641\u064a \u0645\u062c\u0627\u0644 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\u060c \u0645\u0639\u0631\u0648\u0641 \u0628\u0645\u0639\u0631\u0641\u062a\u0647 \u0627\u0644\u0639\u0645\u064a\u0642\u0629 \u0648\u0642\u062f\u0631\u062a\u0647 \u0639\u0644\u0649 \u062a\u0628\u0633\u064a\u0637 \u0645\u0648\u0627\u0636\u064a\u0639 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0627\u0644\u0645\u0639\u0642\u062f\u0629. \u0648\u0628\u0641\u0636\u0644 \u062e\u0628\u0631\u062a\u0647 \u0627\u0644\u0648\u0627\u0633\u0639\u0629 \u0641\u064a \u0645\u062c\u0627\u0644 \u0623\u0645\u0646 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0648\u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a\u060c \u064a\u0633\u0627\u0647\u0645 \u0628\u0627\u0646\u062a\u0638\u0627\u0645 \u0628\u0645\u0642\u0627\u0644\u0627\u062a \u0648\u062a\u062d\u0644\u064a\u0644\u0627\u062a \u062b\u0627\u0642\u0628\u0629 \u062d\u0648\u0644 \u0623\u062d\u062f\u062b \u0627\u062a\u062c\u0627\u0647\u0627\u062a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\u060c \u0645\u0645\u0627 \u064a\u062b\u0642\u0641 \u0627\u0644\u0645\u062d\u062a\u0631\u0641\u064a\u0646 \u0648\u0627\u0644\u062c\u0645\u0647\u0648\u0631.","url":"https:\/\/securitybriefing.net\/ar\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/posts\/1348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/comments?post=1348"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/posts\/1348\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/media\/1351"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/media?parent=1348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/categories?post=1348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/tags?post=1348"}],"curies":[{"name":"\u0648\u0648\u0631\u062f\u0628\u0631\u064a\u0633","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}