{"id":45556,"date":"2022-02-24T00:00:00","date_gmt":"2022-02-24T00:00:00","guid":{"rendered":"urn:uuid:1dd57aa5-5661-431f-988c-02e752644144"},"modified":"2022-02-24T00:00:00","modified_gmt":"2022-02-24T00:00:00","slug":"global-cyberattacks-tied-to-the-russian-invasion-of-ukraine","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/","title":{"rendered":"Global Cyberattacks Tied to the Russian Invasion of Ukraine"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/b\/managing-cyber-risk-in-a-time-of-uncertainty\/managing-cyber-risk-in-time-of-uncertainty.png\"><!-- OneTrust Cookies Consent Notice start for trendmicro.com --><!-- OneTrust Cookies Consent Notice end for trendmicro.com --> <!-- Begin mPulse library --> <!-- END mPulse library --> <head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width\"> <meta name=\"description\" content=\"This post refers to recent targeted cyberattacks on Ukraine .gov sites as an example of how cyber-risk and security fundamentals are keys to cyber-resilience.\"> <meta name=\"robots\" content=\"noindex,nofollow\"> <meta name=\"keywords\" content=\"article,expert perspective,risk management\"> <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge,chrome=1\"> <meta name=\"template\" content=\"articleWithReference\"> <meta property=\"article:published_time\" content=\"2022-02-24\"> <meta property=\"article:tag\" content=\"risk management\"> <meta property=\"article:section\" content=\"article\"> <link rel=\"icon\" type=\"image\/ico\" href=\"\/content\/dam\/trendmicro\/favicon.ico\"> <link rel=\"canonical\" href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/b\/global-cyberattacks-cyber-risk.html\"> <title>Global Cyberattacks: Managing Risk in Chaotic Times<\/title> <link href=\"https:\/\/fonts.googleapis.com\/css?family=Open+Sans:300,300i,400,400i,600\" rel=\"stylesheet\">\n<link href=\"\/\/customer.cludo.com\/css\/296\/1798\/cludo-search.min.css\" type=\"text\/css\" rel=\"stylesheet\"> <link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch.min.css\" type=\"text\/css\"> <meta property=\"og:url\" content=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/b\/global-cyberattacks-cyber-risk.html\"><br \/>\n<meta property=\"og:title\" content=\"Global Cyberattacks: Managing Risk in Chaotic Times\"><br \/>\n<meta property=\"og:description\" content=\"This post refers to recent targeted cyberattacks on Ukraine .gov sites as an example of how cyber-risk and security fundamentals are keys to cyber-resilience.\"><br \/>\n<meta property=\"og:site_name\" content=\"Trend Micro\"><br \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/b\/managing-cyber-risk-in-a-time-of-uncertainty\/managing-cyber-risk-in-time-of-uncertainty.png\"><br \/>\n<meta property=\"og:locale\" content=\"en_US\"> <meta name=\"twitter:card\" content=\"summary_large_image\"><br \/>\n<meta name=\"twitter:site\" content=\"@TrendMicro\"><br \/>\n<meta name=\"twitter:title\" content=\"Global Cyberattacks: Managing Risk in Chaotic Times\"><br \/>\n<meta name=\"twitter:description\" content=\"This post refers to recent targeted cyberattacks on Ukraine .gov sites as an example of how cyber-risk and security fundamentals are keys to cyber-resilience.\"><br \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/b\/managing-cyber-risk-in-a-time-of-uncertainty\/managing-cyber-risk-in-time-of-uncertainty.png\"> <\/head> <body class=\"articlepage page basicpage context-business context-ciso\" id=\"readabilityBody\" readability=\"50.199802176063\"> <!-- Page Scroll: Back to Top --> <a id=\"page-scroll\" title=\"VerticalPageScroll\" href=\"javascript:jumpScroll($(this).scrollTop());\"> <span class=\"icon-chevron-up\"><\/span> <\/a> <!-- \/* Data Layer *\/ --> <\/p>\n<div class=\"root responsivegrid\">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"articleBodyReference aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"research-layout article container \" role=\"contentinfo\" data-display-mode=\"noHero\">\n<article class=\"research-layout--wrapper row\" data-article-pageid=\"1016660970\">\n<div class=\"col-xs-12 col-md-12 one-column\">\n<div class=\"col-xs-12 col-md-12\" readability=\"7.7428571428571\">\n<div class=\"article-details\" role=\"heading\" readability=\"34.842857142857\"> <span class=\"article-details__bar\" role=\"img\"><\/span> <\/p>\n<p class=\"article-details__display-tag\">Risk Management<\/p>\n<p class=\"article-details__description\">Cyber-risk management and security fundamentals are the key to cyber-resilience. 5 best practices to manage your cyber risk.<\/p>\n<p class=\"article-details__author-by\">By: Trend Micro <time class=\"article-details__date\">February 24, 2022<\/time> <span>Read time:&nbsp;<\/span><span class=\"eta\"><\/span> (<span class=\"words\"><\/span> words) <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<hr class=\"research-layout-divider\"> <main class=\"main--content col-xs-12 col-md-8 col-md-push-2\"> <\/p>\n<div class=\"richText\" readability=\"40.5\">\n<div readability=\"26\">\n<p>While it seems almost clich\u00e9 now, we <i>are<\/i> living in unprecedented times. The global pandemic has forced organizations everywhere to deal not only with health and supply-chain challenges, but also with increasing political turmoil that can negatively impact ongoing operations. And with the military action in Ukraine, evidence of widespread defacement of government websites, and targeted attacks against government agencies and financial institutions in the region serving as yet another layer of risk to deal with, it has never been more important to be on top of your security game.&nbsp;<\/p>\n<p><span class=\"body-subhead-title\">Keep focused on the attack surface<\/span><\/p>\n<p>While every organization will have their own definition of what risk means to them, the ability to understand, communicate, and mitigate that risk is critical to being resilient in the face of the global events unfolding. In order to understand your risk, you first need to understand your attack surface\u2014where can risk be introduced in the digital platform that makes up how your organization runs?&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/b\/managing-cyber-risk-in-a-time-of-uncertainty\/attack-surface.png\" alt=\"attack-surface\"> <\/figure>\n<\/p><\/div>\n<div>\n<div class=\"richText\" readability=\"39.584060721063\">\n<div readability=\"26.067552182163\">\n<p>Once you know what your attack surface is, you need the tools to both assess the risk and then mitigate it. Given that the attack surface is constantly changing, it really is a lifecycle\u2014an attack surface risk management lifecycle\u2014that needs the right tools in place to help with cyber resilience.<\/p>\n<p><span class=\"body-subhead-title\">Managing risk with security best practices<\/span><\/p>\n<p>With so much diversity in the attack surface, it\u2019s important to leverage security best practices to manage your cyber risk. Organizations should:<\/p>\n<ol>\n<li>Ensure your systems are updated (especially security solutions) with the latest critical patches and versions. These are a critical part of your attack surface.<\/li>\n<li>Make sure you have configured your security solutions according to best practices from the vendor, including widespread use of multi-factor authentication. For Trend Micro solutions, ensure you are leveraging the latest sophisticated security capabilities like machine learning, behavior monitoring, application control, and more. Get advice here: <a href=\"https:\/\/success.trendmicro.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/success.trendmicro.com<\/a><\/li>\n<li>As outlined in real-world testing activities like the <a href=\"https:\/\/resources.trendmicro.com\/MITRE-Attack-Evaluations.html?_ga=2.16966393.196378256.1645546705-947974810.1644243643\" target=\"_blank\" rel=\"noopener\">Mitre Engenuity ATT&amp;CK evalutions<\/a>, being able to detect and respond across layers to a cyber attack is a fundamental requirement for managing cyber risk. If you are not using some form of extended detection and response (XDR) or managed XDR today, you need to put something in place immediately. Without this type of visibility and ability to respond to attacks, you are at significantly higher risk.<\/li>\n<li>Pay close attention to unrecognized network traffic (both inbound and outbound) and watch for sophisticated new phishing attacks. Follow-up quickly on security alerts and conduct more close investigation as necessary.<\/li>\n<li>Where possible, reduce your attack surface. Whether a financially motivated group, a nation state, or an advanced group that behaves like one, attackers facing a smaller attack surface along with the greater visibility in #3 mean a stronger security and reduced risk. How to do that? Reducing attack surface includes patching and Zero Trust techniques for better posture, including knowing the true state of identities, devices, cloud assets, and things.<\/li>\n<\/ol>\n<p>Following these best practices will help you to better manage the cyber risk that your organization is facing, regardless of the unknowns that we are all dealing with today\u2014and tomorrow.&nbsp;&nbsp;<\/p>\n<p>Our research teams and threat hunters will work vigilantly to monitor and identify any new threat intelligence and will continue to share updates here: <a href=\"https:\/\/resources.trendmicro.com\/ukrainecrisis.html\" target=\"_blank\" rel=\"noopener\">trendmicro.com\/ukrainecrisis<\/a>.<\/p>\n<p><span class=\"rte-legal-text\">This blog has been revised to include new facts that have been released since the original posting.<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<section class=\"tag--list\">\n<p>Tags<\/p>\n<\/section>\n<p> <\/main> <\/article>\n<\/div>\n<\/div><\/div>\n<\/div>\n<p> <!-- \/* Core functionality javascripts, absolute URL to leverage Akamai CDN *\/ --> <!--For Modal-start--> <\/p>\n<p> <span>sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk<\/span> <\/p>\n<p> <!--For Modal-end--> <!-- Go to www.addthis.com\/dashboard to customize your tools --> <\/body> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/b\/global-cyberattacks-cyber-risk.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber-risk management and security fundamentals are the key to cyber-resilience. 5 best practices to manage your cyber risk. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":45557,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9528,9527,9529],"class_list":["post-45556","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-ciso-article","tag-trend-micro-ciso-expert-perspective","tag-trend-micro-ciso-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Global Cyberattacks Tied to the Russian Invasion of Ukraine 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Global Cyberattacks Tied to the Russian Invasion of Ukraine 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-24T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/b\/managing-cyber-risk-in-a-time-of-uncertainty\/managing-cyber-risk-in-time-of-uncertainty.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Global Cyberattacks Tied to the Russian Invasion of Ukraine\",\"datePublished\":\"2022-02-24T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/\"},\"wordCount\":625,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine.png\",\"keywords\":[\"Trend Micro CISO : Article\",\"Trend Micro CISO : Expert Perspective\",\"Trend Micro CISO : Risk Management\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/\",\"name\":\"Global Cyberattacks Tied to the Russian Invasion of Ukraine 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine.png\",\"datePublished\":\"2022-02-24T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine.png\",\"width\":1122,\"height\":596},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro CISO : Article\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-article\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Global Cyberattacks Tied to the Russian Invasion of Ukraine\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Global Cyberattacks Tied to the Russian Invasion of Ukraine 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/","og_locale":"en_US","og_type":"article","og_title":"Global Cyberattacks Tied to the Russian Invasion of Ukraine 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-02-24T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/b\/managing-cyber-risk-in-a-time-of-uncertainty\/managing-cyber-risk-in-time-of-uncertainty.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Global Cyberattacks Tied to the Russian Invasion of Ukraine","datePublished":"2022-02-24T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/"},"wordCount":625,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine.png","keywords":["Trend Micro CISO : Article","Trend Micro CISO : Expert Perspective","Trend Micro CISO : Risk Management"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/","url":"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/","name":"Global Cyberattacks Tied to the Russian Invasion of Ukraine 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine.png","datePublished":"2022-02-24T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine.png","width":1122,"height":596},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/global-cyberattacks-tied-to-the-russian-invasion-of-ukraine\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro CISO : Article","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-article\/"},{"@type":"ListItem","position":3,"name":"Global Cyberattacks Tied to the Russian Invasion of Ukraine"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45556"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45556\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/45557"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}