{"id":34062,"date":"2020-03-27T12:41:37","date_gmt":"2020-03-27T12:41:37","guid":{"rendered":"http:\/\/20d535d3-81e6-4082-963d-d233c4806089"},"modified":"2020-03-27T12:41:37","modified_gmt":"2020-03-27T12:41:37","slug":"coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/","title":{"rendered":"Coronavirus and home working: Cyber criminals shift focus to target remote workers"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/r\/2019\/10\/30\/9142cd87-d418-431f-96d0-213eee8db2df\/thumbnail\/770x578\/67442e089b897c071b7dbebdf49ee401\/istock-1006095910.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Criminals are only just getting started when it comes to exploiting the global spread of coronavirus to profit from hacking and cybercrime, and the number of attacks is likely to rise, Europe&#8217;s law enforcement agency Europol has warned.<\/p>\n<p>The <a href=\"https:\/\/www.europol.europa.eu\/newsroom\/news\/how-criminals-profit-covid-19-pandemic\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">new report on how criminals profit from the COVID-19 pandemic<\/a> details the increase in <span class=\"link\"><a href=\"https:\/\/www.cbsnews.com\/live-updates\/coronavirus-news-latest-2020-03-26\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;link_anchor&quot;, &quot;pageType&quot;: &quot;article&quot;}\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">coronavirus<\/a><\/span>-themed attacks, including <a href=\"https:\/\/www.zdnet.com\/article\/nasty-phishing-scams-aim-to-exploit-coronovirus-fears\/\">phishing emails and spam campaigns<\/a> designed to trick people into giving up sensitive personal information or banking details \u2013 and warns that cyber criminals will only get busier.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More on privacy<\/span><\/h3>\n<\/div>\n<p>&#8220;The number of cyberattacks is significant and expected to increase further. Cyber criminals will continue to innovate in the deployment of various malware and <a href=\"https:\/\/www.zdnet.com\/video\/ransomware-how-hackers-are-evolving-attacks-and-how-to-protect-yourself\/\">ransomware packages<\/a> themed around the COVID-19 pandemic,&#8221; said the report.<\/p>\n<p>Europol&#8217;s paper also warns that cyber-criminal groups will step up attacks against critical health infrastructure as a means of attempting to generate profit from hospitals and medical research facilities at a time when they&#8217;re needed most.<\/p>\n<p><strong><strong>SEE:&nbsp;<\/strong><\/strong><a href=\"https:\/\/www.zdnet.com\/topic\/cybersecurity-lets-get-tactical\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong><strong>Cybersecurity: Let&#8217;s get tactical<\/strong><\/strong><\/a><strong><strong>&nbsp;(ZDNet\/TechRepublic special feature) |&nbsp;<\/strong><\/strong><a href=\"https:\/\/www.techrepublic.com\/resource-library\/whitepapers\/cybersecurity-let-s-get-tactical-free-pdf\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\"><strong><strong>Download the free PDF version<\/strong><\/strong><\/a><strong><strong>&nbsp;(TechRepublic)<\/strong><\/strong><\/p>\n<p>Earlier this month, <a href=\"https:\/\/www.zdnet.com\/article\/czech-hospital-hit-by-cyber-attack-while-in-the-midst-of-a-covid-19-outbreak\/\">a Czech hospital serving as a COVID-19 testing centre was hit with a cyberattack in in the midst of a coronavirus outbreak<\/a>, forcing some services to be temporarily shut down.<\/p>\n<p>&#8220;These types of attack during a public health crisis such as the COVID-19 pandemic are particularly threatening and carry very real risks to human lives,&#8221; said the Europol report.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>There&#8217;s also the prospect that cyber criminals will increasingly look to exploit social distancing and <a href=\"https:\/\/www.zdnet.com\/article\/vpn-use-surges-as-coronavirus-outbreak-prompts-huge-rise-in-remote-working\/\">the growth in remote working<\/a> for their own gain, taking advantage of <a href=\"https:\/\/www.zdnet.com\/article\/coronavirus-how-one-team-switched-4000-staff-to-remote-working-in-just-a-week\/\">how employees might not be used to working from home<\/a> to help conduct <a href=\"https:\/\/www.zdnet.com\/article\/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\/\">phishing and malware attacks<\/a> to help gain access to critical business information.<\/p>\n<p>&#8220;Cyber criminals are likely to seek to exploit an increasing number of attack vectors as a greater number of employers adopt telework and allow connections to their organisations&#8217; systems,&#8221; the report warned.<\/p>\n<p>&#8220;Criminals have quickly seized the opportunities to exploit the crisis by adapting their modes of operation or developing new criminal activities. Organised crime groups are notoriously flexible and adaptable, and their capacity to exploit this crisis means we need to be constantly vigilant and prepared,&#8221; said Catherine De Bolle, executive director of Europol.<\/p>\n<p><strong>SEE:<\/strong> <a href=\"https:\/\/www.zdnet.com\/article\/covid-19-with-everyone-working-from-home-vpn-security-has-now-become-paramount\/\"><strong>With everyone working from home, VPN security is now paramount<\/strong><\/a><\/p>\n<p>&#8220;Crime is a seriously disrupting factor and a diversion from national and EU efforts to ensure the health and safety of citizens. That is why it is relevant to reinforce the fight against crime,&#8221; she added.<\/p>\n<p>European Union cybersecurity agency ENISA <a href=\"https:\/\/www.zdnet.com\/article\/working-from-home-cybersecurity-tips-for-remote-workers\/\">has issued tips for remote workers on how to stay safe from cyberattacks and hacking<\/a> when working outside of the office environment during coronavirus-enforced social distancing and lockdown.<\/p>\n<h3><strong>MORE ON CYBERSECURITY<\/strong><\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers will look to exploit the increase in remote working &#8211; and healthcare facilities could be targeted with cyberattacks, warns police agency.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34063,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-34062","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Coronavirus and home working: Cyber criminals shift focus to target remote workers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Coronavirus and home working: Cyber criminals shift focus to target remote workers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-27T12:41:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Coronavirus and home working: Cyber criminals shift focus to target remote workers\",\"datePublished\":\"2020-03-27T12:41:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\\\/\"},\"wordCount\":478,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\\\/\",\"name\":\"Coronavirus and home working: Cyber criminals shift focus to target remote workers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers.jpg\",\"datePublished\":\"2020-03-27T12:41:37+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Coronavirus and home working: Cyber criminals shift focus to target remote workers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Coronavirus and home working: Cyber criminals shift focus to target remote workers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/","og_locale":"en_US","og_type":"article","og_title":"Coronavirus and home working: Cyber criminals shift focus to target remote workers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-03-27T12:41:37+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Coronavirus and home working: Cyber criminals shift focus to target remote workers","datePublished":"2020-03-27T12:41:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/"},"wordCount":478,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/","url":"https:\/\/www.threatshub.org\/blog\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/","name":"Coronavirus and home working: Cyber criminals shift focus to target remote workers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers.jpg","datePublished":"2020-03-27T12:41:37+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-and-home-working-cyber-criminals-shift-focus-to-target-remote-workers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Coronavirus and home working: Cyber criminals shift focus to target remote workers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34062","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34062"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34062\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34063"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34062"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34062"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}