{"id":36935,"date":"2020-09-02T17:36:58","date_gmt":"2020-09-02T17:36:58","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=544498"},"modified":"2020-09-02T17:36:58","modified_gmt":"2020-09-02T17:36:58","slug":"1h-2020-cyber-security-defined-by-covid-19-pandemic","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/","title":{"rendered":"1H 2020 Cyber Security Defined by Covid-19 Pandemic"},"content":{"rendered":"<p><img decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/09\/home-man-on-couch-laptop_GettyImages_532378101-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt loading=\"lazy\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/09\/home-man-on-couch-laptop_GettyImages_532378101-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/09\/home-man-on-couch-laptop_GettyImages_532378101-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/09\/home-man-on-couch-laptop_GettyImages_532378101-1024x683.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/09\/home-man-on-couch-laptop_GettyImages_532378101-640x427.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/09\/home-man-on-couch-laptop_GettyImages_532378101-900x600.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/09\/home-man-on-couch-laptop_GettyImages_532378101-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/09\/home-man-on-couch-laptop_GettyImages_532378101-380x253.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"> <\/p>\n<p>When we published our 2020 Predictions <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/predictions\/2020\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a> in December, we didn\u2019t realize there was a global pandemic brewing that would give cybercriminals an almost daily news cycle to take advantage of in their attacks against people and organizations around the world. Malicious actors have always taken advantage of big news to use as lures for socially engineered threats, but these events tend to be fairly short news cycles.<\/p>\n<p>When Covid-19 started making headlines in early 2020, we started seeing new threats using this in the attacks. As you see below, April was the peak month for email-based Covid-19 related threats.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-544499 size-large\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid19-email-1024x579.png\" alt width=\"1024\" height=\"579\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid19-email-1024x579.png 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid19-email-300x170.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid19-email-768x435.png 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid19-email-1536x869.png 1536w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid19-email-640x362.png 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid19-email-900x509.png 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid19-email-440x249.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid19-email-380x215.png 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid19-email.png 1960w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/p>\n<p>The same was true for phishing URLs related to Covid-19, but for files using Covid-19 in their naming convention, the peak month in the first half was June.<\/p>\n<p><strong>Impact on Cybercrime<\/strong><\/p>\n<p>The constant 24\u00d77 news around cases, cures and vaccines makes this pandemic unique for cybercriminals. Also, the shift to remote working and the challenges posed to supply chains all gave cybercriminals new content they could use as lures to entice victims into infecting themselves.<\/p>\n<p>As we\u2019ve seen for many years now, email-based threats were the most used threat vector by malicious actors, which makes sense as the number one infection vector to penetrate an organization\u2019s network is to use a socially engineered email against an employee.<\/p>\n<p>We even saw malicious mobile apps being developed using Covid-19 as a lure, as you see below.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-544500\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid-mobile-1024x696.png\" alt width=\"1024\" height=\"696\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid-mobile-1024x696.png 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid-mobile-300x204.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid-mobile-768x522.png 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid-mobile-1536x1044.png 1536w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid-mobile-125x85.png 125w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid-mobile-640x435.png 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid-mobile-900x612.png 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid-mobile-440x299.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid-mobile-380x258.png 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-covid-mobile.png 1604w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/p>\n<p>In this case it was supporting potential cures for the virus, which many people would have wanted.<\/p>\n<p><strong>Other Highlights in 1H 2020<\/strong><\/p>\n<p>While Covid-19 dominated the threat landscape in the 1H 2020, it wasn\u2019t the only thing that defined it. Ransomware actors continued their attacks against organizations, but as we\u2019ve been seeing over the past year, they\u2019ve become much more selective in their victims. The spray and pray model using spam has been shifted to a more targeted approach, similar to how nation-state actors and APT groups perform their attacks. Two things showcase this trend:<\/p>\n<table>\n<tbody readability=\"3.5\">\n<tr readability=\"7\">\n<td width=\"10px\"><\/td>\n<td>\n<ol>\n<li>The number of ransomware detections has dropped significantly from 1H 2019 to 1H 2020, showing that ransomware actors are not looking for broad infection numbers.<\/li>\n<li>The ransom amounts have increased significantly over the years, showing ransomware actors are selecting their victims around how much they feel they can extort them for and whether they are more likely to pay a ransom.<\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-544501\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-avg-ransom.png\" alt width=\"1018\" height=\"375\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-avg-ransom.png 1018w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-avg-ransom-300x111.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-avg-ransom-768x283.png 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-avg-ransom-640x236.png 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-avg-ransom-900x332.png 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-avg-ransom-440x162.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-avg-ransom-380x140.png 380w\" sizes=\"auto, (max-width: 1018px) 100vw, 1018px\"><\/p>\n<p>Home network attacks are another interesting aspect of the threat landscape in the first half of this year. We have millions of home routers around the world that give us threat data on events coming into and out of home networks.<\/p>\n<p>Threat actors are taking advantage of more remote workers by launching more attacks against these home networks. As you see below, the first half of 2020 saw a marked increase in attacks.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-544502\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-hns-1024x340.png\" alt width=\"1024\" height=\"340\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-hns-1024x340.png 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-hns-300x100.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-hns-768x255.png 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-hns-1536x510.png 1536w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-hns-2048x680.png 2048w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-hns-640x212.png 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-hns-900x299.png 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-hns-440x146.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/1h2020-hns-380x126.png 380w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/p>\n<p>Many of these attacks are brute force login attempts as actors try to obtain login credentials for routers and devices within the home network, which can allow them to do further damage.<\/p>\n<p>The above are only a small number of security events and trends we saw in just six months of 2020. Our full roundup of the security landscape so far this year is detailed out in our <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/securing-the-pandemic-disrupted-workplace-trend-micro-2020-midyear-cybersecurity-report\" target=\"_blank\" rel=\"noopener noreferrer\">security roundup report \u2013 Securing the Pandemic-Disrupted Workplace<\/a>. You can read about all we found to help prepare for many of the threats we will continue to see for the rest of the year.<!-- AddThis Advanced Settings above via filter on the_content --><!-- AddThis Advanced Settings below via filter on the_content --><!-- AddThis Button BEGIN --><\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When we published our 2020 Predictions report in December, we didn\u2019t realize there was a global pandemic brewing that would give cybercriminals an almost daily news cycle to take advantage of in their attacks against people and organizations around the world. Malicious actors have always taken advantage of big news to use as lures for&#8230;<br \/>\nThe post 1H 2020 Cyber Security Defined by Covid-19 Pandemic appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36936,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[8516,5831,91,5855,307],"class_list":["post-36935","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-covid-19-scams","tag-email-threats","tag-ransomware","tag-roundup","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>1H 2020 Cyber Security Defined by Covid-19 Pandemic 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"1H 2020 Cyber Security Defined by Covid-19 Pandemic 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-02T17:36:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/1h-2020-cyber-security-defined-by-covid-19-pandemic.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/1h-2020-cyber-security-defined-by-covid-19-pandemic\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/1h-2020-cyber-security-defined-by-covid-19-pandemic\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"1H 2020 Cyber Security Defined by Covid-19 Pandemic\",\"datePublished\":\"2020-09-02T17:36:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/1h-2020-cyber-security-defined-by-covid-19-pandemic\\\/\"},\"wordCount\":571,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/1h-2020-cyber-security-defined-by-covid-19-pandemic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/1h-2020-cyber-security-defined-by-covid-19-pandemic.jpg\",\"keywords\":[\"COVID-19 scams\",\"email threats\",\"ransomware\",\"roundup\",\"Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/1h-2020-cyber-security-defined-by-covid-19-pandemic\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/1h-2020-cyber-security-defined-by-covid-19-pandemic\\\/\",\"name\":\"1H 2020 Cyber Security Defined by Covid-19 Pandemic 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/1h-2020-cyber-security-defined-by-covid-19-pandemic\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/1h-2020-cyber-security-defined-by-covid-19-pandemic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/1h-2020-cyber-security-defined-by-covid-19-pandemic.jpg\",\"datePublished\":\"2020-09-02T17:36:58+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/1h-2020-cyber-security-defined-by-covid-19-pandemic\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/1h-2020-cyber-security-defined-by-covid-19-pandemic\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/1h-2020-cyber-security-defined-by-covid-19-pandemic\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/1h-2020-cyber-security-defined-by-covid-19-pandemic.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/1h-2020-cyber-security-defined-by-covid-19-pandemic.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/1h-2020-cyber-security-defined-by-covid-19-pandemic\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"COVID-19 scams\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/covid-19-scams\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"1H 2020 Cyber Security Defined by Covid-19 Pandemic\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"1H 2020 Cyber Security Defined by Covid-19 Pandemic 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/","og_locale":"en_US","og_type":"article","og_title":"1H 2020 Cyber Security Defined by Covid-19 Pandemic 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-09-02T17:36:58+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/1h-2020-cyber-security-defined-by-covid-19-pandemic.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"1H 2020 Cyber Security Defined by Covid-19 Pandemic","datePublished":"2020-09-02T17:36:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/"},"wordCount":571,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/1h-2020-cyber-security-defined-by-covid-19-pandemic.jpg","keywords":["COVID-19 scams","email threats","ransomware","roundup","Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/","url":"https:\/\/www.threatshub.org\/blog\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/","name":"1H 2020 Cyber Security Defined by Covid-19 Pandemic 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/1h-2020-cyber-security-defined-by-covid-19-pandemic.jpg","datePublished":"2020-09-02T17:36:58+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/1h-2020-cyber-security-defined-by-covid-19-pandemic.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/1h-2020-cyber-security-defined-by-covid-19-pandemic.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/1h-2020-cyber-security-defined-by-covid-19-pandemic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"COVID-19 scams","item":"https:\/\/www.threatshub.org\/blog\/tag\/covid-19-scams\/"},{"@type":"ListItem","position":3,"name":"1H 2020 Cyber Security Defined by Covid-19 Pandemic"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36935"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36935\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36936"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}