{"id":23182,"date":"2023-08-09T18:26:40","date_gmt":"2023-08-09T16:26:40","guid":{"rendered":"https:\/\/www.eurotechconseil.com\/en\/?p=23182"},"modified":"2023-12-06T18:26:40","modified_gmt":"2023-12-06T17:26:40","slug":"cyber-attack-and-digital-war-what-impact","status":"publish","type":"post","link":"https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/","title":{"rendered":"Cyber attack and digital war : what&#8217;s the impact ?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; min_height=&#8221;2741.2px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.22.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Cyber attack and digital war : what&#8217;s the impact?<\/h1>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2023\/08\/cyber-attack.webp&#8221; alt=&#8221;Cyber-attack&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">The Russian invasion of Ukraine for instance takes place not only on the battlefield: Ukraine is looking for hackers to declare a digital war against Vladimir Poutine\u2019s country.<br \/>In fact, in the 21st century, war is not only fought with weapons, Computer cyber attacks have also become a fairly powerful means to wage a digital war. Truth to be told, this is a war where anyone can join, without the need for a machine gun. It is in this sense, that the Ukrainian government appealed to hacktivist movements to join a cyber war against Russia. The project is coordinated via the messaging service Telegram.<\/p>\n<p>In parallel, some assert that Russia has been for years carrying out digital attacks against its enemies.<br \/>\nHowever, nothing can be confirmed or proven in such a war. In other words, it is impossible to verify which groups or individuals are behind a cyberattack and what motives they are pursuing.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\">What is a cyberattack ?<\/h2>\n<p style=\"text-align: left;\">By cyberattack, we mean all the electronic attacks that take place over a network connection and which take place in a virtual cyberspace. Attacks of this type aim to circumvent or overcome the existing security barriers in computer systems.<br \/>For instance various systems, software and methods such as phishing, ransomware and spoofing are used to spy or misappropriate confidential or personal data. These malicious programs are now so sophisticated and highly developed that conventional defence and traceability options are often limited.<\/p>\n<p style=\"text-align: left;\">Theoretically any computer connected to a network can be the victim of a hacker attack. The only way to get oneself protected against a cyber attack is to have a customized and reliable cyber security solution to minimize risks.<br \/>Moreover, recent studies show that cyber criminality increases from year to year. Attackers repeatedly attempt to take advantage of particularly vulnerable enterprise systems and skilfully exploit their possible weaknesses. They often aim for a ransom. On the other hand, some cyber threats also have deeper motives, sometimes political and this is the case for Ukraine and Russia. In this event, attackers attempt to steal, destroy or hijack systems and data in the name of &#8220;hacktivism&#8221;.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||-2px|||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>What is the purpose of a cyberattack?<\/h2>\n<p style=\"text-align: justify;\">The purpose of a cyber attack is to disturb business processes or to damage permanently the reputation of the target. Thus, cybercriminals use various techniques to launch a cyber attack including malware and spyware like Trojan horse virus, viruses or malware.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;223px&#8221; custom_margin=&#8221;||-19px|||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>What are the most common types of Cyberattacks?<\/h2>\n<p style=\"text-align: left;\">These last years, cybercriminals are increasingly perfecting their methods and constantly find ever more treacherous ways and means to launch attacks on the computer systems of their victims.<\/p>\n<p style=\"text-align: justify;\"><strong> <span class=\"markeur\">Some of the most notorious and common methods include : <\/span><\/strong><\/p>\n<ul>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/padlockblog1.webp');\">Malware or malicious software: spyware, ransomware, viruses and spyware<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp');\">Phishing: method of sending fraudulent communications<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/padlockblog1.webp');\">DDoS or attack through denial of service<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp');\">Injection SQL<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/padlockblog1.webp');\">Zero Day Attacks<\/li>\n<\/ul>\n<div id=\"gtx-trans\" style=\"position: absolute; left: 241px; top: 208.391px;\">\n<div class=\"gtx-trans-icon\"><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>What are the consequences of a cyberattack ?<\/h2>\n<p>The more digitization there is, the more <strong>cyber attacks<\/strong> there are and they can be dangerous if, for instance, the energy supply or the health system are affected. The reason why security in the digital space has gained such political importance is that this security no longer exists.<br \/>There are not just countless criminal gangs that are working havoc on the internet today attacking companies, encrypting data and extorting ransoms. The secret services of numerous countries are also active on the Internet.<br \/>In fact governmental security of several countries runs a real risk due to cyber espionage. <strong><br \/>So are we in the middle of a digital war, a cyber war ?<\/strong><br \/>Truth be told, a digital attack can have serious consequences: power cuts, administrations paralyzed, no phone or internet. Similarly, cyber attacks are part of modern warfare. In the Russian-Ukrainian war, they serve to demoralize and misinform but also have an impact on the war. Finally, in some cases, however, digital attacks can also have a very specific impact on the course of the war.<\/p>\n<div id=\"gtx-trans\" style=\"position: absolute; left: 200px; top: 408.516px;\">\n<div class=\"gtx-trans-icon\">\u00a0<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; disabled_on=&#8221;on|on|on&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/ezgif.com-gif-maker.jpg&#8221; background_position=&#8221;top_left&#8221; custom_padding=&#8221;8%|3%|4%|3%|false|true&#8221; custom_css_main_element=&#8221;display: flex;||align-items: center;&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; box_shadow_style=&#8221;preset2&#8243; disabled=&#8221;on&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;\/*display: flex;||align-items: center;*\/&#8221; custom_css_main_element_phone=&#8221;\/*display: flex;||align-items: center;*\/&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;||||||||&#8221; header_5_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>Enhance the security of your data and assets through our reliable cybersecurity solutions.<\/h5>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;\/en\/contact-us-software-development-company\/&#8221; button_text=&#8221;Protect Your Business &#8221; button_alignment=&#8221;left&#8221; _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;20px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;rgba(0,0,0,0.28)&#8221; button_bg_use_color_gradient=&#8221;on&#8221; button_bg_color_gradient_direction=&#8221;115deg&#8221; button_bg_color_gradient_stops=&#8221;rgba(0,0,0,0.5) 0%|rgba(5,161,209,0.65) 100%&#8221; button_bg_color_gradient_start=&#8221;rgba(0,0,0,0.5)&#8221; button_bg_color_gradient_end=&#8221;rgba(5,161,209,0.65)&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;5px&#8221; custom_padding=&#8221;2%|6%|2%|6%|true|true&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;726px&#8221; custom_padding=&#8221;||0px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>How to protect against cyberattacks in 2022 ?<\/h2>\n<p style=\"text-align: justify;\">Although cyber attacks are an ongoing battle, they can be avoided by knowing the different types of protocols and resources that malicious actors made use of. Thus, preventing a breach of your network and its systems, requires a protection against a variety of cyber attacks.<br \/>For each attack, the appropriate countermeasure must be used to dissuade it from exploiting a vulnerability or weakness.<\/p>\n<p><strong>Here are some of the common ways to prevent cyber-attacks:<\/strong><\/p>\n<ul>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp'); text-align: justify;\">Cybersecurity\u00a0Policy Development<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/padlockblog1.webp');\">Implementation of security awareness training<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp');\">Installation of spam filters and anti-malware software<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/padlockblog1.webp');\">Deployment of a next generation firewall (NGFW)<\/li>\n<\/ul>\n<p>For advanced cyberattacks, a team of at least 2 to 3 computer security engineers would be required to manage customized software solutions and advanced testing of an organization\u2019s environment, including:<\/p>\n<ul>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp');\">Carry out vulnerability evaluations<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/padlockblog1.webp');\">Performing routine penetration tests<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp');\">Implementing information management and event security (SIEM)<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp');\">Deployment of detection and prevention of intrusions software (IDS and IPS)<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/padlockblog1.webp');\">Creation of a data loss prevention program (DLP)<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_id=&#8221;tags-articles&#8221; _builder_version=&#8221;4.17.6&#8243; _dynamic_attributes=&#8221;content&#8221; _module_preset=&#8221;default&#8221; text_font=&#8221;|700|||||||&#8221; text_text_color=&#8221;#000000&#8243; link_text_color=&#8221;#007bff&#8221; header_text_color=&#8221;#000000&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF90YWdzIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiIiwiYWZ0ZXIiOiIiLCJsaW5rX3RvX3Rlcm1fcGFnZSI6Im9uIiwic2VwYXJhdG9yIjoiIHwgIiwiY2F0ZWdvcnlfdHlwZSI6InBvc3RfdGFnIn19@[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Russian invasion of Ukraine for instance takes place not only on the battlefield..<\/p>\n","protected":false},"author":1,"featured_media":23186,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[61],"tags":[135,136,138,137,140,139],"class_list":["post-23182","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-antispam","tag-cyberattacks","tag-cyberthreats","tag-cyberwar","tag-malware","tag-virus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber attack and digital war : what&#039;s the impact ?<\/title>\n<meta name=\"description\" content=\"Battleground Online: Cyber Attacks Exposed.Discover the unseen battles of the digital realm and the rise of cyber warfare.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber attack and digital war : what&#039;s the impact ?\" \/>\n<meta property=\"og:description\" content=\"Battleground Online: Cyber Attacks Exposed.Discover the unseen battles of the digital realm and the rise of cyber warfare.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/\" \/>\n<meta property=\"og:site_name\" content=\"Eurotechconseil\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eurotechconseilfrance\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-09T16:26:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-06T17:26:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2023\/08\/cyberattack.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Eurotechconseil\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eurotechconseil\" \/>\n<meta name=\"twitter:site\" content=\"@eurotechconseil\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eurotechconseil\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/cyber-attack-and-digital-war-what-impact\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/cyber-attack-and-digital-war-what-impact\\\/\"},\"author\":{\"name\":\"Eurotechconseil\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#\\\/schema\\\/person\\\/7e817c65e51afd1a598ebefb45995b2b\"},\"headline\":\"Cyber attack and digital war : what&#8217;s the impact ?\",\"datePublished\":\"2023-08-09T16:26:40+00:00\",\"dateModified\":\"2023-12-06T17:26:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/cyber-attack-and-digital-war-what-impact\\\/\"},\"wordCount\":1399,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/cyber-attack-and-digital-war-what-impact\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/cyberattack.webp\",\"keywords\":[\"#Antispam\",\"#Cyberattacks\",\"#Cyberthreats\",\"#Cyberwar\",\"#Malware\",\"#virus\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/cyber-attack-and-digital-war-what-impact\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/cyber-attack-and-digital-war-what-impact\\\/\",\"url\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/cyber-attack-and-digital-war-what-impact\\\/\",\"name\":\"Cyber attack and digital war : what's the impact ?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/cyber-attack-and-digital-war-what-impact\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/cyber-attack-and-digital-war-what-impact\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/cyberattack.webp\",\"datePublished\":\"2023-08-09T16:26:40+00:00\",\"dateModified\":\"2023-12-06T17:26:40+00:00\",\"description\":\"Battleground Online: Cyber Attacks Exposed.Discover the unseen battles of the digital realm and the rise of cyber warfare.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/cyber-attack-and-digital-war-what-impact\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/cyber-attack-and-digital-war-what-impact\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/cyber-attack-and-digital-war-what-impact\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/cyberattack.webp\",\"contentUrl\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/cyberattack.webp\",\"width\":400,\"height\":250,\"caption\":\"Cyber-attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/cyber-attack-and-digital-war-what-impact\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber attack and digital war : what&#8217;s the impact ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/\",\"name\":\"Euro Tech Conseil\",\"description\":\"Software development company\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#organization\"},\"alternateName\":\"Euro Tech Conseil\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#organization\",\"name\":\"Euro Tech Conseil\",\"alternateName\":\"Euro Tech Conseil\",\"url\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/logo-etc-en.webp\",\"contentUrl\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/logo-etc-en.webp\",\"width\":88,\"height\":35,\"caption\":\"Euro Tech Conseil\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/eurotechconseilfrance\\\/\",\"https:\\\/\\\/x.com\\\/eurotechconseil\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#\\\/schema\\\/person\\\/7e817c65e51afd1a598ebefb45995b2b\",\"name\":\"Eurotechconseil\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d3182bb9b74af92755e7d6b83fe4ce97d1f45f082632bc795d6b69a35d7bf19?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d3182bb9b74af92755e7d6b83fe4ce97d1f45f082632bc795d6b69a35d7bf19?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d3182bb9b74af92755e7d6b83fe4ce97d1f45f082632bc795d6b69a35d7bf19?s=96&d=mm&r=g\",\"caption\":\"Eurotechconseil\"},\"sameAs\":[\"https:\\\/\\\/www.eurotechconseil.com\\\/en\"],\"url\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/author\\\/admin00\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber attack and digital war : what's the impact ?","description":"Battleground Online: Cyber Attacks Exposed.Discover the unseen battles of the digital realm and the rise of cyber warfare.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/","og_locale":"en_US","og_type":"article","og_title":"Cyber attack and digital war : what's the impact ?","og_description":"Battleground Online: Cyber Attacks Exposed.Discover the unseen battles of the digital realm and the rise of cyber warfare.","og_url":"https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/","og_site_name":"Eurotechconseil","article_publisher":"https:\/\/www.facebook.com\/eurotechconseilfrance\/","article_published_time":"2023-08-09T16:26:40+00:00","article_modified_time":"2023-12-06T17:26:40+00:00","og_image":[{"width":400,"height":250,"url":"https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2023\/08\/cyberattack.webp","type":"image\/webp"}],"author":"Eurotechconseil","twitter_card":"summary_large_image","twitter_creator":"@eurotechconseil","twitter_site":"@eurotechconseil","twitter_misc":{"Written by":"Eurotechconseil","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/#article","isPartOf":{"@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/"},"author":{"name":"Eurotechconseil","@id":"https:\/\/www.eurotechconseil.com\/en\/#\/schema\/person\/7e817c65e51afd1a598ebefb45995b2b"},"headline":"Cyber attack and digital war : what&#8217;s the impact ?","datePublished":"2023-08-09T16:26:40+00:00","dateModified":"2023-12-06T17:26:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/"},"wordCount":1399,"commentCount":0,"publisher":{"@id":"https:\/\/www.eurotechconseil.com\/en\/#organization"},"image":{"@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2023\/08\/cyberattack.webp","keywords":["#Antispam","#Cyberattacks","#Cyberthreats","#Cyberwar","#Malware","#virus"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/","url":"https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/","name":"Cyber attack and digital war : what's the impact ?","isPartOf":{"@id":"https:\/\/www.eurotechconseil.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/#primaryimage"},"image":{"@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2023\/08\/cyberattack.webp","datePublished":"2023-08-09T16:26:40+00:00","dateModified":"2023-12-06T17:26:40+00:00","description":"Battleground Online: Cyber Attacks Exposed.Discover the unseen battles of the digital realm and the rise of cyber warfare.","breadcrumb":{"@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/#primaryimage","url":"https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2023\/08\/cyberattack.webp","contentUrl":"https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2023\/08\/cyberattack.webp","width":400,"height":250,"caption":"Cyber-attack"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/cyber-attack-and-digital-war-what-impact\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eurotechconseil.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber attack and digital war : what&#8217;s the impact ?"}]},{"@type":"WebSite","@id":"https:\/\/www.eurotechconseil.com\/en\/#website","url":"https:\/\/www.eurotechconseil.com\/en\/","name":"Euro Tech Conseil","description":"Software development company","publisher":{"@id":"https:\/\/www.eurotechconseil.com\/en\/#organization"},"alternateName":"Euro Tech Conseil","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eurotechconseil.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eurotechconseil.com\/en\/#organization","name":"Euro Tech Conseil","alternateName":"Euro Tech Conseil","url":"https:\/\/www.eurotechconseil.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eurotechconseil.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2026\/04\/logo-etc-en.webp","contentUrl":"https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2026\/04\/logo-etc-en.webp","width":88,"height":35,"caption":"Euro Tech Conseil"},"image":{"@id":"https:\/\/www.eurotechconseil.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eurotechconseilfrance\/","https:\/\/x.com\/eurotechconseil"]},{"@type":"Person","@id":"https:\/\/www.eurotechconseil.com\/en\/#\/schema\/person\/7e817c65e51afd1a598ebefb45995b2b","name":"Eurotechconseil","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0d3182bb9b74af92755e7d6b83fe4ce97d1f45f082632bc795d6b69a35d7bf19?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0d3182bb9b74af92755e7d6b83fe4ce97d1f45f082632bc795d6b69a35d7bf19?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0d3182bb9b74af92755e7d6b83fe4ce97d1f45f082632bc795d6b69a35d7bf19?s=96&d=mm&r=g","caption":"Eurotechconseil"},"sameAs":["https:\/\/www.eurotechconseil.com\/en"],"url":"https:\/\/www.eurotechconseil.com\/en\/blog\/author\/admin00\/"}]}},"_links":{"self":[{"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/posts\/23182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/comments?post=23182"}],"version-history":[{"count":0,"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/posts\/23182\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/media\/23186"}],"wp:attachment":[{"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/media?parent=23182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/categories?post=23182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/tags?post=23182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}