{"id":387,"date":"2022-07-13T22:03:39","date_gmt":"2022-07-13T22:03:39","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=387"},"modified":"2022-07-13T22:03:39","modified_gmt":"2022-07-13T22:03:39","slug":"%ec%9a%b0%ed%81%ac%eb%9d%bc%ec%9d%b4%eb%82%98-%ec%82%ac%ec%9d%b4%eb%b2%84-%ea%b8%b0%ea%b4%80-q2-%ec%82%ac%ec%9d%b4%eb%b2%84-%ea%b3%b5%ea%b2%a9-%ea%b8%89%ec%a6%9d-%eb%b3%b4%ea%b3%a0","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%eb%89%b4%ec%8a%a4\/%ec%9a%b0%ed%81%ac%eb%9d%bc%ec%9d%b4%eb%82%98-%ec%82%ac%ec%9d%b4%eb%b2%84-%ea%b8%b0%ea%b4%80-q2-%ec%82%ac%ec%9d%b4%eb%b2%84-%ea%b3%b5%ea%b2%a9-%ea%b8%89%ec%a6%9d-%eb%b3%b4%ea%b3%a0\/","title":{"rendered":"\uc6b0\ud06c\ub77c\uc774\ub098 \uc0ac\uc774\ubc84 \uae30\uad00, 2\ubd84\uae30 \uc0ac\uc774\ubc84 \uacf5\uaca9 \uae09\uc99d \ubcf4\uace0"},"content":{"rendered":"<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">Ukraine\u2019s State Service of Special Communications and Information Protection (SSSCIP) released a new report this week that revealed a surge in cyberattacks targeting the country over the second quarter of 2022.The report found that the frequency and volume of attacks had increased significantly, with hackers targeting a range of government agencies, businesses, and individuals.<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">\uc6b0\ud06c\ub77c\uc774\ub098\uac00 \uce68\uacf5\ub41c \uc774\ud6c4, <a href=\"https:\/\/cyberpeaceinstitute.org\/ukraine-timeline-of-cyberattacks\/\">\uc0ac\uc774\ubc84 \uacf5\uaca9\uc774 \ub354 \ub9ce\uc774 \ubc1c\uc0dd\ud558\uace0 \uc788\ub2e4<\/a>. However, in the second quarter of 2022, there was a spike in the number of cyberattacks. This is when Ukraine\u2019s national Vulnerability Detection and Cyber Incidents\/Cyberattacks System found 19 billion events. Out of these, 40 to 64 people were shown to have committed cyber incidents. In addition, the number of malicious hacker group activities increased by 38%.<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">\ub7ec\uc2dc\uc544 IP \uc8fc\uc18c\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc911\uc694\ud55c \uc0ac\uac74\uc758 \ubc1c\uc0dd\ub960\uc774 \uc774\uc804 \ubd84\uae30\ubcf4\ub2e4 8.5\ubc30 \uac10\uc18c\ud588\ub2e4\uace0 <a href=\"https:\/\/cip.gov.ua\/en\">SSSCIP<\/a>. \uc774 \uac10\uc18c\ub294 \ub7ec\uc2dc\uc544 \uc5f0\ubc29\uc5d0\uc11c \uc0ac\uc6a9\ub418\ub294 IP \uc8fc\uc18c\uc5d0 \ub300\ud55c \uc870\uce58\ub97c \uc2dc\ud589\ud55c \uc804\uc790 \ud1b5\uc2e0 \ub124\ud2b8\uc6cc\ud06c\uc640 \uc778\ud130\ub137 \uc811\uc18d \uc11c\ube44\uc2a4 \ub355\ubd84\uc774\ub2e4.<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">\ud604\uc7ac \ub300\ubd80\ubd84\uc758 \uc0ac\uac74\uc740 \ubbf8\uad6d\uc758 IP \uc8fc\uc18c\uc5d0\uc11c \ubc1c\uc0dd\ud558\uc9c0\ub9cc, \uc774\uac83\uc774 \ubaa8\ub450 \uadf8\uacf3\uc5d0\uc11c \uc628\ub2e4\ub294 \uac83\uc744 \uc758\ubbf8\ud558\uc9c0\ub294 \uc54a\ub294\ub2e4. IP \uc8fc\uc18c\ub294 \uc704\uc870\ub420 \uc218 \uc788\uc73c\ubbc0\ub85c, \ucd9c\ucc98\ub97c \ud655\uc778\ud558\ub294 \ub370 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \uc218\ub2e8\uc774 \uc544\ub2c8\ub2e4.<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">SSSCIP\ub294 \ub300\ubd80\ubd84\uc758 \ub4f1\ub85d\ub41c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc0ac\uac74\uc774 <a href=\"https:\/\/www.csis.org\/programs\/strategic-technologies-program\/significant-cyber-incidents\">\uc815\ubd80 \ud6c4\uc6d0\uc758 \ud574\ucee4 \uadf8\ub8f9\uacfc \uad00\ub828\uc774 \uc788\ub2e4\uace0 \ubcf4\uace0\ud55c\ub2e4<\/a> like Sandworm and Gamaredon. Ukraine\u2019s mass media and government were high-profile targets in the second quarter of 2022.<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">Cyjax\u2019s Ian Thornton-Trump says this study proves that \u201csecure architecture and best practices are at least as important, if not more so, than security technology\u201d. He also believes that this research has many valuable insights to be found for the \u201cblue team\u201d.<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">\uc190\ud2bc-\ud2b8\ub7fc\ud504\ub294 \uc804\uc7c1\uc774 \uacc4\uc18d\ub428\uc5d0 \ub530\ub77c \ub7ec\uc2dc\uc544\uac00 <a href=\"https:\/\/securitybriefing.net\/ko\/%eb%b3%b4%ec%95%88\/%eb%84%a4-%ea%b0%80%ec%a7%80-%ec%82%ac%ec%9d%b4%eb%b2%84-%eb%b3%b4%ed%98%b8-%ec%a1%b0%ea%b1%b4%ec%9d%b4-%eb%b3%b4%ed%98%b8-%ec%9a%b0%ec%84%a0%ec%88%9c%ec%9c%84%eb%a5%bc-%ec%84%a4%ec%a0%95\/\">\uc0ac\uc774\ubc84 \uacf5\uaca9\uc744 \uc99d\uac00\uc2dc\ud0ac \uac83\uc774\ub77c\uace0 \uc608\uce21\ud55c\ub2e4<\/a>: \u201cRussia will use any tool at their disposal to achieve victory, and cybersabotage is an important part of their political and military strategy.\u201d<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">The tides and ebbs of physical combat can trigger and even stop assaults. I\u2019m sure we\u2019ll see an increase in the use of bugs, particularly Android, Microsoft, and web browsers, to improve the effectiveness of assaults against Ukraine defenders. These will be used to gather intelligence and even disable systems.<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">We\u2019ve seen a <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/news\/252499613\/The-wide-web-of-nation-state-hackers-attacking-the-US\">\uc9c0\ub09c \uba87 \ub144\uac04 \ub9ce\uc740 \ud65c\ub3d9\uc774 \uc788\uc5c8\ub2e4<\/a> \uad6d\uac00 \ud6c4\uc6d0 \uadf8\ub8f9\uc73c\ub85c\ubd80\ud130, \uadf8\ub7ec\ub098 \ucd5c\uadfc\uc5d0\ub294 \ubc94\uc8c4 \uc870\uc9c1\uacfc \uc2ec\uc9c0\uc5b4 \ub2e8\ub3c5 \ud574\ucee4\ub4e4\ub85c\ubd80\ud130\uc758 \ud65c\ub3d9\uc774 \uae09\uc99d\ud558\uace0 \uc788\ub2e4. \uc774 \uadf8\ub8f9\ub4e4\uc740 \uc8fc\ub85c \uae08\uc804\uc801 \uc774\uc775\uc744 \ub178\ub9ac\uc9c0\ub9cc, \uc5ec\uc804\ud788 \ud070 \ud53c\ud574\ub97c \uc904 \uc218 \uc788\ub2e4.<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">It\u2019s important to remember that not all attacks are created equal. Some are more sophisticated than others, and some are more targeted. The best defense against any attack is a good offense. Stay vigilant, and keep your systems up-to-date.<\/p>","protected":false},"excerpt":{"rendered":"<p>\uc6b0\ud06c\ub77c\uc774\ub098\uc758 \ud2b9\uc218 \ud1b5\uc2e0 \ubc0f \uc815\ubcf4 \ubcf4\ud638\uad6d(SSSCIP)\uc740 \uc774\ubc88 \uc8fc\uc5d0 \uc0c8\ub85c\uc6b4 \ubcf4\uace0\uc11c\ub97c \ubc1c\ud45c\ud588\ub294\ub370, \uc774 \ubcf4\uace0\uc11c\uc5d0 \ub530\ub974\uba74 \uc6b0\ud06c\ub77c\uc774\ub098\ub97c \uaca8\ub0e5\ud55c \uc0ac\uc774\ubc84 \uacf5\uaca9\uc774 2\ubd84\uae30\uc5d0 \uae09\uc99d\ud588\ub2e4\uace0 \ud569\ub2c8\ub2e4.... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%eb%89%b4%ec%8a%a4\/%ec%9a%b0%ed%81%ac%eb%9d%bc%ec%9d%b4%eb%82%98-%ec%82%ac%ec%9d%b4%eb%b2%84-%ea%b8%b0%ea%b4%80-q2-%ec%82%ac%ec%9d%b4%eb%b2%84-%ea%b3%b5%ea%b2%a9-%ea%b8%89%ec%a6%9d-%eb%b3%b4%ea%b3%a0\/\"><span class=\"screen-reader-text\">\uc6b0\ud06c\ub77c\uc774\ub098 \uc0ac\uc774\ubc84 \uae30\uad00, 2\ubd84\uae30 \uc0ac\uc774\ubc84 \uacf5\uaca9 \uae09\uc99d \ubcf4\uace0<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":3,"featured_media":388,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-387","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ukraine&#039;s Cyber Agency Reports a Surge in Cyberattacks in Q2 | Security Briefing<\/title>\n<meta name=\"description\" content=\"The frequency and volume of cyberattacks have increased significantly, targeting a range of government agencies, businesses, and individuals.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\ub274\uc2a4\/\uc6b0\ud06c\ub77c\uc774\ub098-\uc0ac\uc774\ubc84-\uae30\uad00-q2-\uc0ac\uc774\ubc84-\uacf5\uaca9-\uae09\uc99d-\ubcf4\uace0\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ukraine&#039;s Cyber Agency Reports a Surge in Cyberattacks in Q2 | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The frequency and volume of cyberattacks have increased significantly, targeting a range of government agencies, businesses, and individuals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\ub274\uc2a4\/\uc6b0\ud06c\ub77c\uc774\ub098-\uc0ac\uc774\ubc84-\uae30\uad00-q2-\uc0ac\uc774\ubc84-\uacf5\uaca9-\uae09\uc99d-\ubcf4\uace0\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-13T22:03:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"452\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Ukraine&#8217;s Cyber Agency Reports a Surge in Cyberattacks in Q2\",\"datePublished\":\"2022-07-13T22:03:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/\"},\"wordCount\":467,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/\",\"name\":\"Ukraine's Cyber Agency Reports a Surge in Cyberattacks in Q2 | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg\",\"datePublished\":\"2022-07-13T22:03:39+00:00\",\"description\":\"The frequency and volume of cyberattacks have increased significantly, targeting a range of government agencies, businesses, and individuals.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg\",\"width\":640,\"height\":452,\"caption\":\"Ukraine's Cyber Agency Reports a Surge in Cyber-Attacks in Q2\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ukraine&#8217;s Cyber Agency Reports a Surge in Cyberattacks in Q2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\uc6b0\ud06c\ub77c\uc774\ub098 \uc0ac\uc774\ubc84 \uae30\uad00, 2\ubd84\uae30 \uc0ac\uc774\ubc84 \uacf5\uaca9 \uae09\uc99d \ubcf4\uace0 | \ubcf4\uc548 \ube0c\ub9ac\ud551","description":"\uc0ac\uc774\ubc84 \uacf5\uaca9\uc758 \ube48\ub3c4\uc640 \uaddc\ubaa8\uac00 \ud06c\uac8c \uc99d\uac00\ud558\uc5ec \ub2e4\uc591\ud55c \uc815\ubd80 \uae30\uad00, \uae30\uc5c5 \ubc0f \uac1c\uc778\uc744 \ub300\uc0c1\uc73c\ub85c \ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\ub274\uc2a4\/\uc6b0\ud06c\ub77c\uc774\ub098-\uc0ac\uc774\ubc84-\uae30\uad00-q2-\uc0ac\uc774\ubc84-\uacf5\uaca9-\uae09\uc99d-\ubcf4\uace0\/","og_locale":"ko_KR","og_type":"article","og_title":"Ukraine's Cyber Agency Reports a Surge in Cyberattacks in Q2 | Security Briefing","og_description":"The frequency and volume of cyberattacks have increased significantly, targeting a range of government agencies, businesses, and individuals.","og_url":"https:\/\/securitybriefing.net\/ko\/\ub274\uc2a4\/\uc6b0\ud06c\ub77c\uc774\ub098-\uc0ac\uc774\ubc84-\uae30\uad00-q2-\uc0ac\uc774\ubc84-\uacf5\uaca9-\uae09\uc99d-\ubcf4\uace0\/","og_site_name":"Security Briefing","article_published_time":"2022-07-13T22:03:39+00:00","og_image":[{"width":640,"height":452,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"C\u00e9sar Daniel Barreto","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"2\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Ukraine&#8217;s Cyber Agency Reports a Surge in Cyberattacks in Q2","datePublished":"2022-07-13T22:03:39+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/"},"wordCount":467,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg","articleSection":["News"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/","url":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/","name":"\uc6b0\ud06c\ub77c\uc774\ub098 \uc0ac\uc774\ubc84 \uae30\uad00, 2\ubd84\uae30 \uc0ac\uc774\ubc84 \uacf5\uaca9 \uae09\uc99d \ubcf4\uace0 | \ubcf4\uc548 \ube0c\ub9ac\ud551","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg","datePublished":"2022-07-13T22:03:39+00:00","description":"\uc0ac\uc774\ubc84 \uacf5\uaca9\uc758 \ube48\ub3c4\uc640 \uaddc\ubaa8\uac00 \ud06c\uac8c \uc99d\uac00\ud558\uc5ec \ub2e4\uc591\ud55c \uc815\ubd80 \uae30\uad00, \uae30\uc5c5 \ubc0f \uac1c\uc778\uc744 \ub300\uc0c1\uc73c\ub85c \ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg","width":640,"height":452,"caption":"Ukraine's Cyber Agency Reports a Surge in Cyber-Attacks in Q2"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Ukraine&#8217;s Cyber Agency Reports a Surge in Cyberattacks in Q2"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0\ub294 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \ub300\ud55c \uae4a\uc774 \uc788\ub294 \uc9c0\uc2dd\uacfc \ubcf5\uc7a1\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc8fc\uc81c\ub97c \ub2e8\uc21c\ud654\ud558\ub294 \ub2a5\ub825\uc73c\ub85c \uc720\uba85\ud55c \uc800\uba85\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc791\uac00\uc774\uc790 \uc804\ubb38\uac00\uc785\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \ubc0f \ub370\uc774\ud130 \ubcf4\ud638 \ubd84\uc57c\uc5d0\uc11c \ud3ed\ub113\uc740 \uacbd\ud5d8\uc744 \uc313\uc740 \uadf8\ub294 \uc815\uae30\uc801\uc73c\ub85c \ucd5c\uc2e0 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ud2b8\ub80c\ub4dc\uc5d0 \ub300\ud55c \ud1b5\ucc30\ub825 \uc788\ub294 \uae30\uace0\uc640 \ubd84\uc11d\uc744 \ud1b5\ud574 \uc804\ubb38\uac00\uc640 \uc77c\ubc18\uc778 \ubaa8\ub450\ub97c \uad50\uc721\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","url":"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=387"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/387\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/388"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=387"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}