{"id":387,"date":"2022-07-13T22:03:39","date_gmt":"2022-07-13T22:03:39","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=387"},"modified":"2022-07-13T22:03:39","modified_gmt":"2022-07-13T22:03:39","slug":"co-quan-an-ninh-mang-ukraine-bao-cao-su-gia-tang-cac-cuoc-tan-cong-mang-trong-quy-2","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/tin-tuc\/co-quan-an-ninh-mang-ukraine-bao-cao-su-gia-tang-cac-cuoc-tan-cong-mang-trong-quy-2\/","title":{"rendered":"C\u01a1 quan an ninh m\u1ea1ng Ukraine b\u00e1o c\u00e1o v\u1ec1 s\u1ef1 gia t\u0103ng c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng trong qu\u00fd 2"},"content":{"rendered":"<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">D\u1ecbch v\u1ee5 Truy\u1ec1n th\u00f4ng v\u00e0 B\u1ea3o v\u1ec7 Th\u00f4ng tin \u0110\u1eb7c bi\u1ec7t c\u1ee7a Ukraine (SSSCIP) \u0111\u00e3 ph\u00e1t h\u00e0nh m\u1ed9t b\u00e1o c\u00e1o m\u1edbi trong tu\u1ea7n n\u00e0y ti\u1ebft l\u1ed9 s\u1ef1 gia t\u0103ng c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng nh\u1eafm v\u00e0o qu\u1ed1c gia n\u00e0y trong qu\u00fd hai n\u0103m 2022. B\u00e1o c\u00e1o cho th\u1ea5y t\u1ea7n su\u1ea5t v\u00e0 kh\u1ed1i l\u01b0\u1ee3ng c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng \u0111\u00e3 t\u0103ng \u0111\u00e1ng k\u1ec3, v\u1edbi c\u00e1c tin t\u1eb7c nh\u1eafm v\u00e0o m\u1ed9t lo\u1ea1t c\u00e1c c\u01a1 quan ch\u00ednh ph\u1ee7, doanh nghi\u1ec7p v\u00e0 c\u00e1 nh\u00e2n.<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">K\u1ec3 t\u1eeb khi Ukraine b\u1ecb x\u00e2m l\u01b0\u1ee3c, <a href=\"https:\/\/cyberpeaceinstitute.org\/ukraine-timeline-of-cyberattacks\/\">c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng \u0111\u00e3 x\u1ea3y ra nhi\u1ec1u h\u01a1n<\/a>. Tuy nhi\u00ean, trong qu\u00fd hai n\u0103m 2022, \u0111\u00e3 c\u00f3 s\u1ef1 gia t\u0103ng \u0111\u1ed9t bi\u1ebfn v\u1ec1 s\u1ed1 l\u01b0\u1ee3ng c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng. \u0110\u00e2y l\u00e0 l\u00fac H\u1ec7 th\u1ed1ng Ph\u00e1t hi\u1ec7n L\u1ed7 h\u1ed5ng v\u00e0 S\u1ef1 c\u1ed1\/C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng qu\u1ed1c gia c\u1ee7a Ukraine ph\u00e1t hi\u1ec7n 19 t\u1ef7 s\u1ef1 ki\u1ec7n. Trong s\u1ed1 n\u00e0y, 40 \u0111\u1ebfn 64 ng\u01b0\u1eddi \u0111\u01b0\u1ee3c cho l\u00e0 \u0111\u00e3 th\u1ef1c hi\u1ec7n c\u00e1c s\u1ef1 c\u1ed1 m\u1ea1ng. Ngo\u00e0i ra, s\u1ed1 l\u01b0\u1ee3ng ho\u1ea1t \u0111\u1ed9ng c\u1ee7a c\u00e1c nh\u00f3m tin t\u1eb7c \u0111\u1ed9c h\u1ea1i \u0111\u00e3 t\u0103ng 38%.<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">T\u1ea7n su\u1ea5t c\u00e1c s\u1ef1 ki\u1ec7n quan tr\u1ecdng c\u00f3 ngu\u1ed3n g\u1ed1c t\u1eeb \u0111\u1ecba ch\u1ec9 IP c\u1ee7a Nga \u0111\u00e3 gi\u1ea3m t\u00e1m l\u1ea7n r\u01b0\u1ee1i trong qu\u00fd tr\u01b0\u1edbc, theo <a href=\"https:\/\/cip.gov.ua\/en\">SSSCIP<\/a>. S\u1ef1 gi\u1ea3m n\u00e0y l\u00e0 do c\u00e1c m\u1ea1ng l\u01b0\u1edbi truy\u1ec1n th\u00f4ng \u0111i\u1ec7n t\u1eed v\u00e0 d\u1ecbch v\u1ee5 truy c\u1eadp internet \u0111\u00e3 th\u1ef1c hi\u1ec7n c\u00e1c bi\u1ec7n ph\u00e1p ch\u1ed1ng l\u1ea1i c\u00e1c \u0111\u1ecba ch\u1ec9 IP \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng b\u1edfi Li\u00ean bang Nga.<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">Ph\u1ea7n l\u1edbn c\u00e1c s\u1ef1 ki\u1ec7n hi\u1ec7n nay \u0111\u1ebfn t\u1eeb c\u00e1c \u0111\u1ecba ch\u1ec9 IP \u1edf Hoa K\u1ef3, nh\u01b0ng \u0111i\u1ec1u n\u00e0y kh\u00f4ng c\u00f3 ngh\u0129a l\u00e0 t\u1ea5t c\u1ea3 \u0111\u1ec1u t\u1eeb \u0111\u00f3. \u0110\u1ecba ch\u1ec9 IP c\u00f3 th\u1ec3 b\u1ecb gi\u1ea3 m\u1ea1o, v\u00ec v\u1eady ch\u00fang kh\u00f4ng ph\u1ea3i l\u00e0 ngu\u1ed3n \u0111\u00e1ng tin c\u1eady \u0111\u1ec3 x\u00e1c \u0111\u1ecbnh ngu\u1ed3n g\u1ed1c.<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">SSSCIP b\u00e1o c\u00e1o r\u1eb1ng h\u1ea7u h\u1ebft c\u00e1c s\u1ef1 c\u1ed1 an ninh m\u1ea1ng \u0111\u00e3 \u0111\u0103ng k\u00fd \u0111\u1ec1u li\u00ean quan \u0111\u1ebfn <a href=\"https:\/\/www.csis.org\/programs\/strategic-technologies-program\/significant-cyber-incidents\">c\u00e1c nh\u00f3m tin t\u1eb7c \u0111\u01b0\u1ee3c ch\u00ednh ph\u1ee7 t\u00e0i tr\u1ee3<\/a> nh\u01b0 Sandworm v\u00e0 Gamaredon. Truy\u1ec1n th\u00f4ng \u0111\u1ea1i ch\u00fang v\u00e0 ch\u00ednh ph\u1ee7 c\u1ee7a Ukraine l\u00e0 nh\u1eefng m\u1ee5c ti\u00eau n\u1ed5i b\u1eadt trong qu\u00fd hai n\u0103m 2022.<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">Ian Thornton-Trump c\u1ee7a Cyjax cho bi\u1ebft nghi\u00ean c\u1ee9u n\u00e0y ch\u1ee9ng minh r\u1eb1ng \u201cki\u1ebfn tr\u00fac b\u1ea3o m\u1eadt v\u00e0 c\u00e1c th\u1ef1c h\u00e0nh t\u1ed1t nh\u1ea5t \u00edt nh\u1ea5t c\u0169ng quan tr\u1ecdng, n\u1ebfu kh\u00f4ng mu\u1ed1n n\u00f3i l\u00e0 quan tr\u1ecdng h\u01a1n, so v\u1edbi c\u00f4ng ngh\u1ec7 b\u1ea3o m\u1eadt\u201d. \u00d4ng c\u0169ng tin r\u1eb1ng nghi\u00ean c\u1ee9u n\u00e0y c\u00f3 nhi\u1ec1u th\u00f4ng tin qu\u00fd gi\u00e1 cho \u201c\u0111\u1ed9i xanh\u201d.<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">Thornton-Trump d\u1ef1 b\u00e1o r\u1eb1ng khi chi\u1ebfn tranh ti\u1ebfp di\u1ec5n, Nga s\u1ebd gia t\u0103ng <a href=\"https:\/\/securitybriefing.net\/vi\/bao-ve\/bon-dieu-kien-bao-ve-mang-thiet-lap-mot-uu-tien-bao-ve\/\">t\u1ea5n c\u00f4ng m\u1ea1ng<\/a>: \u201cNga s\u1ebd s\u1eed d\u1ee5ng b\u1ea5t k\u1ef3 c\u00f4ng c\u1ee5 n\u00e0o c\u00f3 s\u1eb5n \u0111\u1ec3 \u0111\u1ea1t \u0111\u01b0\u1ee3c chi\u1ebfn th\u1eafng, v\u00e0 ph\u00e1 ho\u1ea1i m\u1ea1ng l\u00e0 m\u1ed9t ph\u1ea7n quan tr\u1ecdng trong chi\u1ebfn l\u01b0\u1ee3c ch\u00ednh tr\u1ecb v\u00e0 qu\u00e2n s\u1ef1 c\u1ee7a h\u1ecd.\u201d<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">Nh\u1eefng \u0111\u1ee3t s\u00f3ng v\u00e0 d\u00f2ng ch\u1ea3y c\u1ee7a chi\u1ebfn \u0111\u1ea5u v\u1eadt l\u00fd c\u00f3 th\u1ec3 k\u00edch ho\u1ea1t v\u00e0 th\u1eadm ch\u00ed ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng. T\u00f4i ch\u1eafc ch\u1eafn r\u1eb1ng ch\u00fang ta s\u1ebd th\u1ea5y s\u1ef1 gia t\u0103ng trong vi\u1ec7c s\u1eed d\u1ee5ng c\u00e1c l\u1ed7 h\u1ed5ng, \u0111\u1eb7c bi\u1ec7t l\u00e0 Android, Microsoft v\u00e0 tr\u00ecnh duy\u1ec7t web, \u0111\u1ec3 c\u1ea3i thi\u1ec7n hi\u1ec7u qu\u1ea3 c\u1ee7a c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng ch\u1ed1ng l\u1ea1i nh\u1eefng ng\u01b0\u1eddi b\u1ea3o v\u1ec7 Ukraine. Nh\u1eefng \u0111i\u1ec1u n\u00e0y s\u1ebd \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 thu th\u1eadp th\u00f4ng tin t\u00ecnh b\u00e1o v\u00e0 th\u1eadm ch\u00ed v\u00f4 hi\u1ec7u h\u00f3a c\u00e1c h\u1ec7 th\u1ed1ng.<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">Ch\u00fang t\u00f4i \u0111\u00e3 th\u1ea5y <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/news\/252499613\/The-wide-web-of-nation-state-hackers-attacking-the-US\">nhi\u1ec1u ho\u1ea1t \u0111\u1ed9ng trong v\u00e0i n\u0103m qua<\/a> t\u1eeb c\u00e1c nh\u00f3m \u0111\u01b0\u1ee3c nh\u00e0 n\u01b0\u1edbc t\u00e0i tr\u1ee3, nh\u01b0ng g\u1ea7n \u0111\u00e2y \u0111\u00e3 c\u00f3 s\u1ef1 gia t\u0103ng ho\u1ea1t \u0111\u1ed9ng t\u1eeb c\u00e1c b\u0103ng nh\u00f3m t\u1ed9i ph\u1ea1m v\u00e0 th\u1eadm ch\u00ed c\u1ea3 c\u00e1c tin t\u1eb7c \u0111\u01a1n \u0111\u1ed9c. Nh\u1eefng nh\u00f3m n\u00e0y c\u00f3 nhi\u1ec1u kh\u1ea3 n\u0103ng nh\u1eafm \u0111\u1ebfn l\u1ee3i \u00edch t\u00e0i ch\u00ednh, nh\u01b0ng h\u1ecd v\u1eabn c\u00f3 th\u1ec3 g\u00e2y ra nhi\u1ec1u thi\u1ec7t h\u1ea1i.<\/p>\n\n\n\n<p id=\"ac8eb9ff-b601-48ca-b95b-0ccf3fc697ac\">\u0110i\u1ec1u quan tr\u1ecdng l\u00e0 nh\u1edb r\u1eb1ng kh\u00f4ng ph\u1ea3i t\u1ea5t c\u1ea3 c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng \u0111\u1ec1u gi\u1ed1ng nhau. M\u1ed9t s\u1ed1 ph\u1ee9c t\u1ea1p h\u01a1n nh\u1eefng c\u00e1i kh\u00e1c, v\u00e0 m\u1ed9t s\u1ed1 nh\u1eafm m\u1ee5c ti\u00eau h\u01a1n. Ph\u00f2ng th\u1ee7 t\u1ed1t nh\u1ea5t ch\u1ed1ng l\u1ea1i b\u1ea5t k\u1ef3 cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e0o l\u00e0 m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng t\u1ed1t. H\u00e3y c\u1ea3nh gi\u00e1c v\u00e0 gi\u1eef cho h\u1ec7 th\u1ed1ng c\u1ee7a b\u1ea1n \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt.<\/p>","protected":false},"excerpt":{"rendered":"<p>C\u01a1 quan B\u1ea3o v\u1ec7 Th\u00f4ng tin v\u00e0 Truy\u1ec1n th\u00f4ng \u0110\u1eb7c bi\u1ec7t c\u1ee7a Ukraine (SSSCIP) \u0111\u00e3 c\u00f4ng b\u1ed1 m\u1ed9t b\u00e1o c\u00e1o m\u1edbi trong tu\u1ea7n n\u00e0y, ti\u1ebft l\u1ed9 s\u1ef1 gia t\u0103ng c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng nh\u1eafm v\u00e0o n\u01b0\u1edbc n\u00e0y trong qu\u00fd 2 n\u0103m\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/tin-tuc\/co-quan-an-ninh-mang-ukraine-bao-cao-su-gia-tang-cac-cuoc-tan-cong-mang-trong-quy-2\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">C\u01a1 quan an ninh m\u1ea1ng Ukraine b\u00e1o c\u00e1o v\u1ec1 s\u1ef1 gia t\u0103ng c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng trong qu\u00fd 2<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":388,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-387","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ukraine&#039;s Cyber Agency Reports a Surge in Cyberattacks in Q2 | Security Briefing<\/title>\n<meta name=\"description\" content=\"The frequency and volume of cyberattacks have increased significantly, targeting a range of government agencies, businesses, and individuals.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/tin-tuc\/co-quan-an-ninh-mang-ukraine-bao-cao-su-gia-tang-cac-cuoc-tan-cong-mang-trong-quy-2\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ukraine&#039;s Cyber Agency Reports a Surge in Cyberattacks in Q2 | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The frequency and volume of cyberattacks have increased significantly, targeting a range of government agencies, businesses, and individuals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/tin-tuc\/co-quan-an-ninh-mang-ukraine-bao-cao-su-gia-tang-cac-cuoc-tan-cong-mang-trong-quy-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-13T22:03:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"452\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Ukraine&#8217;s Cyber Agency Reports a Surge in Cyberattacks in Q2\",\"datePublished\":\"2022-07-13T22:03:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/\"},\"wordCount\":467,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/\",\"name\":\"Ukraine's Cyber Agency Reports a Surge in Cyberattacks in Q2 | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg\",\"datePublished\":\"2022-07-13T22:03:39+00:00\",\"description\":\"The frequency and volume of cyberattacks have increased significantly, targeting a range of government agencies, businesses, and individuals.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg\",\"width\":640,\"height\":452,\"caption\":\"Ukraine's Cyber Agency Reports a Surge in Cyber-Attacks in Q2\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ukraine&#8217;s Cyber Agency Reports a Surge in Cyberattacks in Q2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Your Gateway to Cyber Safety\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C\u01a1 quan An ninh m\u1ea1ng Ukraine B\u00e1o c\u00e1o S\u1ef1 gia t\u0103ng C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng trong Q2 | T\u00f3m t\u1eaft An ninh","description":"T\u1ea7n su\u1ea5t v\u00e0 kh\u1ed1i l\u01b0\u1ee3ng c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng \u0111\u00e3 t\u0103ng \u0111\u00e1ng k\u1ec3, nh\u1eafm v\u00e0o m\u1ed9t lo\u1ea1t c\u00e1c c\u01a1 quan ch\u00ednh ph\u1ee7, doanh nghi\u1ec7p v\u00e0 c\u00e1 nh\u00e2n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/tin-tuc\/co-quan-an-ninh-mang-ukraine-bao-cao-su-gia-tang-cac-cuoc-tan-cong-mang-trong-quy-2\/","og_locale":"vi_VN","og_type":"article","og_title":"Ukraine's Cyber Agency Reports a Surge in Cyberattacks in Q2 | Security Briefing","og_description":"The frequency and volume of cyberattacks have increased significantly, targeting a range of government agencies, businesses, and individuals.","og_url":"https:\/\/securitybriefing.net\/vi\/tin-tuc\/co-quan-an-ninh-mang-ukraine-bao-cao-su-gia-tang-cac-cuoc-tan-cong-mang-trong-quy-2\/","og_site_name":"Security Briefing","article_published_time":"2022-07-13T22:03:39+00:00","og_image":[{"width":640,"height":452,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"2 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Ukraine&#8217;s Cyber Agency Reports a Surge in Cyberattacks in Q2","datePublished":"2022-07-13T22:03:39+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/"},"wordCount":467,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg","articleSection":["News"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/","url":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/","name":"C\u01a1 quan An ninh m\u1ea1ng Ukraine B\u00e1o c\u00e1o S\u1ef1 gia t\u0103ng C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng trong Q2 | T\u00f3m t\u1eaft An ninh","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg","datePublished":"2022-07-13T22:03:39+00:00","description":"T\u1ea7n su\u1ea5t v\u00e0 kh\u1ed1i l\u01b0\u1ee3ng c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng \u0111\u00e3 t\u0103ng \u0111\u00e1ng k\u1ec3, nh\u1eafm v\u00e0o m\u1ed9t lo\u1ea1t c\u00e1c c\u01a1 quan ch\u00ednh ph\u1ee7, doanh nghi\u1ec7p v\u00e0 c\u00e1 nh\u00e2n.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Ukraines-Cyber-Agency-Reports-a-Surge-in-Cyber-Attacks-in-Q2.jpg","width":640,"height":452,"caption":"Ukraine's Cyber Agency Reports a Surge in Cyber-Attacks in Q2"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/ukraines-cyber-agency-reports-a-surge-in-cyber-attacks-in-q2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Ukraine&#8217;s Cyber Agency Reports a Surge in Cyberattacks in Q2"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"C\u1ed5ng K\u1ebft N\u1ed1i C\u1ee7a B\u1ea1n \u0110\u1ebfn An To\u00e0n M\u1ea1ng","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=387"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/387\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/388"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}