{"id":3027,"date":"2025-09-30T15:39:42","date_gmt":"2025-09-30T13:39:42","guid":{"rendered":"https:\/\/cyberoperations.hu\/?p=3027"},"modified":"2025-09-30T15:50:14","modified_gmt":"2025-09-30T13:50:14","slug":"amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje","status":"publish","type":"post","link":"https:\/\/cyberoperations.hu\/en\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/","title":{"rendered":"When the beer stops: a new level of cyberattacks"},"content":{"rendered":"<p data-start=\"211\" data-end=\"726\">At the end of September, a serious cyberattack paralyzed the <strong data-start=\"265\" data-end=\"280\">Asahi Group<\/strong> Japanese factories. Japan&#039;s largest beer producer - which owns world-renowned brands such as <strong data-start=\"378\" data-end=\"416\">Peroni, Pilsner Urquell and Grolsch<\/strong> \u2013 was forced <strong data-start=\"434\" data-end=\"469\">to completely stop production<\/strong>and suspend the <strong data-start=\"497\" data-end=\"572\">order processing, shipping and customer service activities<\/strong>Although the international supply chain fortunately remained undisrupted, the loss of the domestic market was a serious <strong data-start=\"664\" data-end=\"699\">economic and reputational damage<\/strong> reported to the company.<\/p>\n<p data-start=\"728\" data-end=\"925\">This case once again highlights that cyberattacks are no longer just IT problems: <strong data-start=\"815\" data-end=\"873\">strategic threats that endanger business operations<\/strong>, which can reach anyone, regardless of industry.<\/p>\n<h2 data-start=\"927\" data-end=\"982\">Not a unique case \u2013 instructive examples from other companies<\/h2>\n<h2 data-start=\"71\" data-end=\"120\">Pandora jewelry manufacturer (August 2025)<\/h2>\n<p data-start=\"121\" data-end=\"736\">Danish Pandora, one of the world&#039;s largest jewelry distributors <strong data-start=\"180\" data-end=\"248\">confirmed in early August that it had been the victim of a cyberattack<\/strong>. The incident resulted in unauthorized access to the company&#039;s IT systems and a significant amount of data being compromised. Although the full extent of the damage is unknown, experts say the personal data of millions of customers may have been affected. After the attack, Pandora temporarily shut down some of its online systems and initiated emergency recovery processes. The incident also resulted in a serious reputational crisis, as customer trust is of paramount importance to a luxury brand.<\/p>\n<h2 data-start=\"743\" data-end=\"827\">European airports (September 2025)<\/h2>\n<p data-start=\"828\" data-end=\"1509\">Mid-September <strong data-start=\"847\" data-end=\"910\">Coordinated cyberattack hits several major European airports<\/strong>The targets included London Heathrow, Berlin and Brussels airports. The attacks resulted in <strong data-start=\"1021\" data-end=\"1093\">Hundreds of flights were canceled, tens of thousands of passengers were stranded in the terminals<\/strong>, and airlines suffered losses in the millions. Experts say the attacks may have been carried out by politically motivated groups testing the vulnerabilities of Europe&#039;s critical infrastructure. The incident highlights how airports&#039; digital systems are a prime target, and cybersecurity risks can directly translate into passenger safety concerns.<\/p>\n<h2 data-start=\"1516\" data-end=\"1603\">Jaguar Land Rover (September 2025)<\/h2>\n<p data-start=\"1604\" data-end=\"2297\">Jaguar Land Rover <strong data-start=\"1625\" data-end=\"1676\">suffered a large-scale cyberattack in early September<\/strong>, which is why the company&#039;s factories have at least <strong data-start=\"1720\" data-end=\"1765\">Production completely stopped by October 1st<\/strong>This meant the loss of production of thousands of cars per day, as well as <strong data-start=\"1835\" data-end=\"1872\">tens of millions of pounds in losses<\/strong> caused to the company. The attack did not only affect JLR: the <strong data-start=\"1930\" data-end=\"1971\">Suppliers operating in Nitra, Slovakia<\/strong> (e.g. exhaust system manufacturer Ebersp\u00e4cher) were also forced to shut down, with their employees working part-time or on leave. The UK&#039;s National Cyber Security Centre (NCSC) and the authorities are working together to restore systems. Unions fear that without government help, mass layoffs could follow.<\/p>\n<h3 data-start=\"2018\" data-end=\"2046\">Why is all this happening?<\/h3>\n<p data-start=\"2047\" data-end=\"2270\">Cybercriminals have many motivations: making money, pursuing political or ideological goals, or simply destabilizing critical infrastructure. However, there is one thing in common: <strong data-start=\"2228\" data-end=\"2267\">they are looking for the weak link in the defense<\/strong>.<\/p>\n<h2 data-start=\"2272\" data-end=\"2303\">What can companies do?<\/h2>\n<p data-start=\"2305\" data-end=\"2507\">The days of outdated antiviruses and firewalls are over. Against today&#039;s cyberattacks, only <strong data-start=\"2384\" data-end=\"2417\">proactive, multi-layered protection<\/strong>, <strong data-start=\"2419\" data-end=\"2449\">24\/7 security monitoring<\/strong> and <strong data-start=\"2453\" data-end=\"2478\">rapid incident management<\/strong> means real security.<\/p>\n<p data-start=\"2509\" data-end=\"2602\">THE <strong data-start=\"2511\" data-end=\"2531\">Cyber Operations<\/strong> provided by <strong data-start=\"2547\" data-end=\"2576\">Managed Security Services<\/strong> offers the following:<\/p>\n<p data-start=\"253\" data-end=\"420\">Cyber Operations managed services combine state-of-the-art technologies that can <strong data-start=\"355\" data-end=\"389\">prevent, detect and treat<\/strong> the latest cyberattacks:<\/p>\n<ul data-start=\"422\" data-end=\"1160\">\n<li data-start=\"422\" data-end=\"706\">\n<p data-start=\"424\" data-end=\"706\"><strong data-start=\"424\" data-end=\"453\">Stellar Cyber OpenSOC XDR<\/strong>: An AI-powered cyber defense center that analyzes data from IT, OT, and cloud systems in real time. It provides complete visibility into a single interface, allowing attacks to be detected and stopped much faster.<\/p>\n<\/li>\n<li data-start=\"707\" data-end=\"1002\">\n<p data-start=\"709\" data-end=\"1002\"><strong data-start=\"709\" data-end=\"726\">Deep Instinct<\/strong>: The world&#039;s first deep learning-based cybersecurity framework that costs less than <strong data-start=\"811\" data-end=\"838\">In 20 milliseconds<\/strong> It can also stop unknown, zero-day attacks. Its advantage is <strong data-start=\"906\" data-end=\"958\">extremely low false alarm rate (&lt;0.1%)<\/strong>, resulting in more efficient SOC operation.<\/p>\n<\/li>\n<li data-start=\"1003\" data-end=\"1160\">\n<p data-start=\"1005\" data-end=\"1160\"><strong data-start=\"1005\" data-end=\"1031\">Continuous monitoring<\/strong>: We provide 24\/7 security monitoring and incident management, with remote or even on-site intervention, upon request.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"1162\" data-end=\"1201\">Why is this beneficial for companies?<\/h3>\n<ul data-start=\"1202\" data-end=\"1696\">\n<li data-start=\"1202\" data-end=\"1298\">\n<p data-start=\"1204\" data-end=\"1298\"><strong data-start=\"1204\" data-end=\"1227\">Full transparency<\/strong>: all digital environments (IT, OT, cloud) can be monitored in one place.<\/p>\n<\/li>\n<li data-start=\"1299\" data-end=\"1410\">\n<p data-start=\"1301\" data-end=\"1410\"><strong data-start=\"1301\" data-end=\"1331\">Automated responses<\/strong>: the system responds in a coordinated and fast manner, minimizing human errors.<\/p>\n<\/li>\n<li data-start=\"1411\" data-end=\"1588\">\n<p data-start=\"1413\" data-end=\"1588\"><strong data-start=\"1413\" data-end=\"1435\">Technological advantage<\/strong>: a single subscription can fill the technological gap typical in the market (XDR, SIEM, SOAR, IDS, etc.), so the company meets the <strong data-start=\"1561\" data-end=\"1582\">NIS2 regulations<\/strong> also.<\/p>\n<\/li>\n<li data-start=\"1589\" data-end=\"1696\">\n<p data-start=\"1591\" data-end=\"1696\"><strong data-start=\"1591\" data-end=\"1619\">Cost-effective solution<\/strong>: available in a monthly fee model, scalable to the size of the protected network.<\/p>\n<\/li>\n<\/ul>\n<ul data-start=\"2604\" data-end=\"3078\">\n<li data-start=\"2604\" data-end=\"2707\">\n<p data-start=\"2606\" data-end=\"2707\"><strong data-start=\"2606\" data-end=\"2665\">Continuous SOC (Security Operations Center) monitoring<\/strong> with the support of artificial intelligence<\/p>\n<\/li>\n<li data-start=\"2708\" data-end=\"2791\">\n<p data-start=\"2710\" data-end=\"2791\"><strong data-start=\"2710\" data-end=\"2758\">Real-time threat detection and remediation<\/strong> with the most modern technologies<\/p>\n<\/li>\n<li data-start=\"2792\" data-end=\"2891\">\n<p data-start=\"2794\" data-end=\"2891\"><strong data-start=\"2794\" data-end=\"2827\">NIS2 and ISO 27001 compliance<\/strong> ensuring compliance with regulatory requirements<\/p>\n<\/li>\n<li data-start=\"2892\" data-end=\"2971\">\n<p data-start=\"2894\" data-end=\"2971\"><strong data-start=\"2894\" data-end=\"2931\">Experienced engineers and consultants<\/strong> immediate support in case of incidents<\/p>\n<\/li>\n<li data-start=\"2972\" data-end=\"3078\">\n<p data-start=\"2974\" data-end=\"3078\"><strong data-start=\"2974\" data-end=\"3007\">Supply chain risk management<\/strong>, which keeps not only the company but also its partners safe<\/p>\n<\/li>\n<\/ul>\n<h2 data-start=\"417\" data-end=\"463\">Technology + Insurance = Complete Protection<\/h2>\n<p data-start=\"465\" data-end=\"697\">Protecting against cyberattacks is not just a matter of technology. Even with the best defense systems, an attack can still succeed. In such cases, <strong data-start=\"625\" data-end=\"694\">In addition to a quick response, managing financial damage is also vital<\/strong>.<\/p>\n<p data-start=\"699\" data-end=\"814\">This is helped by the <strong data-start=\"724\" data-end=\"783\">Colonnade Insurance Virtual Safety Net Cyber Insurance<\/strong>, which covers, among others:<\/p>\n<ul data-start=\"815\" data-end=\"1099\">\n<li data-start=\"815\" data-end=\"878\">\n<p data-start=\"817\" data-end=\"878\">the costs of data recovery and system restore,<\/p>\n<\/li>\n<li data-start=\"879\" data-end=\"928\">\n<p data-start=\"881\" data-end=\"928\">losses resulting from business interruption,<\/p>\n<\/li>\n<li data-start=\"929\" data-end=\"988\">\n<p data-start=\"931\" data-end=\"988\">ransom payments related to ransomware attacks,<\/p>\n<\/li>\n<li data-start=\"989\" data-end=\"1045\">\n<p data-start=\"991\" data-end=\"1045\">the costs of legal proceedings and regulatory fines,<\/p>\n<\/li>\n<li data-start=\"1046\" data-end=\"1099\">\n<p data-start=\"1048\" data-end=\"1099\">as well as PR and reputation management expenses.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1101\" data-end=\"1322\">Thus, the <strong data-start=\"1107\" data-end=\"1164\">Cyber Operations Managed Security Services<\/strong> and the <strong data-start=\"1170\" data-end=\"1200\">Colonnade Cyber Insurance<\/strong> Together, they are able to not only prevent but also manage the largest incidents \u2013 both technologically and financially.<\/p>\n<h2 data-start=\"3080\" data-end=\"3119\">The biggest risk: inaction<\/h2>\n<p data-start=\"3121\" data-end=\"3300\">Cyberattacks today are no longer about whether they \u201ccould happen,\u201d but rather whether they will happen. <strong data-start=\"3208\" data-end=\"3217\">When<\/strong> The question is whether the company will be prepared or unprepared.<\/p>\n<p data-start=\"3302\" data-end=\"3466\">\ud83d\udc49 <strong data-start=\"3305\" data-end=\"3342\">Request a free consultation now<\/strong>and show you how we can protect your company against the most modern cyberattacks. <a href=\"https:\/\/cyberoperations.hu\/en\/kapcsolat\/\">https:\/\/cyberoperations.hu\/kapcsolat\/<\/a><\/p>\n<p data-start=\"3302\" data-end=\"3466\">","protected":false},"excerpt":{"rendered":"<p>Szeptember v\u00e9g\u00e9n s\u00falyos kibert\u00e1mad\u00e1s b\u00e9n\u00edtotta meg az Asahi Group jap\u00e1n \u00fczemeit. Jap\u00e1n legnagyobb s\u00f6rgy\u00e1rt\u00f3ja \u2013 amely vil\u00e1gszerte ismert m\u00e1rk\u00e1kat birtokol, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":3028,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3027","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-egyeb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje - Cyber Operations Group Kft.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberoperations.hu\/en\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje\" \/>\n<meta property=\"og:description\" content=\"Szeptember v\u00e9g\u00e9n s\u00falyos kibert\u00e1mad\u00e1s b\u00e9n\u00edtotta meg az Asahi Group jap\u00e1n \u00fczemeit. Jap\u00e1n legnagyobb s\u00f6rgy\u00e1rt\u00f3ja \u2013 amely vil\u00e1gszerte ismert m\u00e1rk\u00e1kat birtokol, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberoperations.hu\/en\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Operations Group Kft.\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-30T13:39:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-30T13:50:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sales Cyberoperations\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sales Cyberoperations\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/\"},\"author\":{\"name\":\"Sales Cyberoperations\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/person\\\/ca194f8232fedc6dfea84a20e83bebbe\"},\"headline\":\"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje\",\"datePublished\":\"2025-09-30T13:39:42+00:00\",\"dateModified\":\"2025-09-30T13:50:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/\"},\"wordCount\":1326,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/cyber-Attack.png\",\"articleSection\":[\"Egy\u00e9b\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/\",\"name\":\"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje - Cyber Operations Group Kft.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/cyber-Attack.png\",\"datePublished\":\"2025-09-30T13:39:42+00:00\",\"dateModified\":\"2025-09-30T13:50:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/cyber-Attack.png\",\"contentUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/cyber-Attack.png\",\"width\":800,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Kezd\u0151lap\",\"item\":\"https:\\\/\\\/cyberoperations.hu\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"name\":\"Cyber Operations Group Kft.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberoperations.hu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\",\"name\":\"Cyber Operations Group Kft.\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"contentUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"width\":1500,\"height\":400,\"caption\":\"Cyber Operations Group Kft.\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/person\\\/ca194f8232fedc6dfea84a20e83bebbe\",\"name\":\"Sales Cyberoperations\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/en\\\/author\\\/sales\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"When the beer stops: a new level of cyberattacks - Cyber Operations Group Kft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberoperations.hu\/en\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/","og_locale":"en_GB","og_type":"article","og_title":"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje","og_description":"Szeptember v\u00e9g\u00e9n s\u00falyos kibert\u00e1mad\u00e1s b\u00e9n\u00edtotta meg az Asahi Group jap\u00e1n \u00fczemeit. Jap\u00e1n legnagyobb s\u00f6rgy\u00e1rt\u00f3ja \u2013 amely vil\u00e1gszerte ismert m\u00e1rk\u00e1kat birtokol, [&hellip;]","og_url":"https:\/\/cyberoperations.hu\/en\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/","og_site_name":"Cyber Operations Group Kft.","article_published_time":"2025-09-30T13:39:42+00:00","article_modified_time":"2025-09-30T13:50:14+00:00","og_image":[{"width":800,"height":1200,"url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png","type":"image\/png"}],"author":"Sales Cyberoperations","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sales Cyberoperations","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#article","isPartOf":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/"},"author":{"name":"Sales Cyberoperations","@id":"https:\/\/cyberoperations.hu\/#\/schema\/person\/ca194f8232fedc6dfea84a20e83bebbe"},"headline":"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje","datePublished":"2025-09-30T13:39:42+00:00","dateModified":"2025-09-30T13:50:14+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/"},"wordCount":1326,"commentCount":0,"publisher":{"@id":"https:\/\/cyberoperations.hu\/#organization"},"image":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png","articleSection":["Egy\u00e9b"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/","url":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/","name":"When the beer stops: a new level of cyberattacks - Cyber Operations Group Kft.","isPartOf":{"@id":"https:\/\/cyberoperations.hu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#primaryimage"},"image":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png","datePublished":"2025-09-30T13:39:42+00:00","dateModified":"2025-09-30T13:50:14+00:00","breadcrumb":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#primaryimage","url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png","contentUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png","width":800,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Kezd\u0151lap","item":"https:\/\/cyberoperations.hu\/"},{"@type":"ListItem","position":2,"name":"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje"}]},{"@type":"WebSite","@id":"https:\/\/cyberoperations.hu\/#website","url":"https:\/\/cyberoperations.hu\/","name":"Cyber Operations Group Ltd.","description":"","publisher":{"@id":"https:\/\/cyberoperations.hu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberoperations.hu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/cyberoperations.hu\/#organization","name":"Cyber Operations Group Ltd.","url":"https:\/\/cyberoperations.hu\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/","url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","contentUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","width":1500,"height":400,"caption":"Cyber Operations Group Kft."},"image":{"@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cyberoperations.hu\/#\/schema\/person\/ca194f8232fedc6dfea84a20e83bebbe","name":"Sales Cyberoperations","url":"https:\/\/cyberoperations.hu\/en\/author\/sales\/"}]}},"_links":{"self":[{"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/posts\/3027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/comments?post=3027"}],"version-history":[{"count":0,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/posts\/3027\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/media\/3028"}],"wp:attachment":[{"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/media?parent=3027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/categories?post=3027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/tags?post=3027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}