• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

European Union to Launch Supply Chain Attack Simulation

You are here: Home / General Cyber Security News / European Union to Launch Supply Chain Attack Simulation
January 12, 2022

The European Union (EU) is scheduling a main provide chain cyber-attack simulation, it has been reported.

According to Bloomberg, the workout will get area in the coming days and continue on for 6 weeks. The drill is developed to take a look at member states’ preparedness for an attack influencing the continent’s distribution networks.

Citing internal paperwork and resources “familiar with the issue,” Bloomberg said that the simulated attack will mainly target source chains across Europe. The coordinated attack will be dependent on past provide chain hacks or individuals regarded to be possible in the long run to be as reasonable as attainable.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


All those participating in the ‘stress test’ will coordinate diplomatic and public responses to the attacks and offer with the spillover of socioeconomic impacts in other member states.

It is considered the drill was proposed by France, which took around the presidency of the council of the European Union on January 1 2022. Following the workout, the EU aims to produce a framework for a joint response to a important incident, which it presently lacks.

New incidents these kinds of as SolarWinds and Kaseya have demonstrated the common injury that supply chain cyber-attacks can bring about, which appears to be a rising target for threat actors.

Commenting, Todd Carroll, CISO at CybelAngel, reported: “Supply chain attacks are an ongoing development and will only develop in severity. This is mainly attributed to the point that, as a condition or organization’s provide chain and digital ecosystems develop, their attack area grows exponentially along with it. In a number of months from now, attacks like SolarWinds may perhaps seem comparatively little.

“Ransomware can’t be identified as a hypothetical, systemic risk any longer. It really is now a systemic issue that will only increase. This is nevertheless a different distinct illustration that cybersecurity impacts physical security and the daily life of all of us at scale.  

“Unfortunately, we assume much more provide chain attacks to arise. As businesses increasingly entrust a significant part of their services to solitary details of failure – assume AWS or Google – this is turning into a problem, and as these types of, businesses turn out to be targets of selection.

“This stress examination is a welcomed motion plan and highlights the increasing have to have for early threat detection capabilities and ransomware preparedness. Member states and corporations urgently will need to get forward of threats ahead of attackers defeat them to it.”

In December last yr, Israel led a similar 10-nation attack simulation focusing on the world wide monetary system.


Some parts of this posting are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News UK Launches Initiative to Develop Global AI Standards
Next Post: US Issues Alert Over Russian Hackers Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.