Government to tighten screws on cybercriminals

Solve china dataset issues with shared expertise and innovation.
Post Reply
tanjimajuha20
Posts: 679
Joined: Thu Jan 02, 2025 7:05 am

Government to tighten screws on cybercriminals

Post by tanjimajuha20 »

Urvan Parfentyev, coordinator of the Safe Internet Center, spoke about the trend of hybrid threats at the Internet security conference. He identified three main types of threats for the near future.

"The most obvious example of hybrid threats are economic threats that combine software and content elements. The task of a modern swindler is not to break through software and hardware protection, but to make the user himself "open the door to the apartment where the money is," Urvan Parfentyev shared his opinion.

A representative of the press costa rica whatsapp number database service of the system integrator for information security Angara Security explained what could become the main target of attackers: "All types of attacks primarily create financial risks for government organizations and businesses. For example, when ransomware attacks, workstations that manage business processes are destroyed, databases and even IT infrastructure can be destroyed. Then, like a snowball, problems associated with production downtime increase if the attack is carried out on an industrial facility. Against the background of direct economic losses, which amount to tens and hundreds of millions of rubles, risks to supply chains of vital resources for the economy and the sustainability of the social sector are of great importance. Supply chains of electricity, food, medicines, and environmental safety of enterprises may be at risk."

Also, one of the main types of cyber threats will remain attacks on personal data. According to Urvan Parfentyev, the overwhelming majority of sites collect data. In some cases, they are not processed in accordance with the requirements of the law, which is why personal data leaks. "Criminals are good analysts. They compare several databases: they see which clients ordered what, where they went, and create a picture of the behavior of a potential victim," Urvan Parfentyev noted.

Read also


At the spring session of the State Duma of the Russian Federation, deputies will consider new bills concerning information security. The agenda will include issues of liability of companies to citizens for leaks of personal data, legalization of white hackers and legislative equating of SIM cards to means of payment.

Pavel Kuznetsov, Director of Strategic Alliances and Interaction with Government Authorities at Garda, a developer of economic and information security systems, noted the role of the state in combating data leaks: "The issue of personal data security, as well as other big data arrays collected and processed by large services, is currently being worked out by both expert groups of specialized associations and the state. In 2023, the Federal Service for Technical and Export Control (FSTEC) adopted requirements for certified database management systems, which include specific security requirements. Therefore, the problem is really acute, but the movement towards increasing the level of security of the information collected is also obvious."

As Urvan Parfentyev noted, cyber-humiliation is becoming the most common threat. According to him, nine out of 10 users, especially minors, have encountered this. Neural networks also went in this direction when they began to generate fake videos based on deepfakes. He also noted that cyber-humiliation is the least regulated threat in legal terms.

Andrey Mishukov, CEO of iTPROTECT, believes that in order to resolve the issue, it is necessary to at least define the term: "In order to regulate something in the legal field, we first need to define the problem that we are going to regulate. Cyber-humiliation is an unsettled term, so there is no clear understanding of what is meant by it. It can be assumed that this is some content or communications on the Internet that humiliate the honor and dignity of specific citizens or their groups. In this case, what is required is not legal regulation, but rather tools for monitoring and removing such information, as well as mechanisms for monitoring communications for minors in order to protect them from possible cyber-humilia
Post Reply