{"id":3027,"date":"2025-09-30T15:39:42","date_gmt":"2025-09-30T13:39:42","guid":{"rendered":"https:\/\/cyberoperations.hu\/?p=3027"},"modified":"2025-09-30T15:50:14","modified_gmt":"2025-09-30T13:50:14","slug":"amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje","status":"publish","type":"post","link":"https:\/\/cyberoperations.hu\/nb\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/","title":{"rendered":"N\u00e5r \u00f8let stopper: et nytt niv\u00e5 av cyberangrep"},"content":{"rendered":"<p data-start=\"211\" data-end=\"726\">I slutten av september ble det lammet et alvorlig cyberangrep. <strong data-start=\"265\" data-end=\"280\">Asahi-gruppen<\/strong> Japanske fabrikker. Japans st\u00f8rste \u00f8lprodusent \u2013 som eier verdenskjente merker som <strong data-start=\"378\" data-end=\"416\">Peroni, Pilsner Urquell og Grolsch<\/strong> \u2013 ble tvunget <strong data-start=\"434\" data-end=\"469\">\u00e5 stoppe produksjonen helt<\/strong>og suspendere <strong data-start=\"497\" data-end=\"572\">ordrebehandling, frakt og kundeserviceaktiviteter<\/strong>Selv om den internasjonale forsyningskjeden heldigvis forble uforstyrret, var tapet av hjemmemarkedet en alvorlig <strong data-start=\"664\" data-end=\"699\">\u00f8konomisk og omd\u00f8mmeskade<\/strong> rapportert til selskapet.<\/p>\n<p data-start=\"728\" data-end=\"925\">Denne saken understreker nok en gang at cyberangrep ikke lenger bare er IT-problemer: <strong data-start=\"815\" data-end=\"873\">strategiske trusler mot forretningsdriften<\/strong>, som kan n\u00e5 alle, uavhengig av bransje.<\/p>\n<h2 data-start=\"927\" data-end=\"982\">Ikke et unikt tilfelle \u2013 l\u00e6rerike eksempler fra andre selskaper<\/h2>\n<h2 data-start=\"71\" data-end=\"120\">Pandora-smykkeprodusent (august 2025)<\/h2>\n<p data-start=\"121\" data-end=\"736\">Danske Pandora, en av verdens st\u00f8rste smykkedistribut\u00f8rer <strong data-start=\"180\" data-end=\"248\">bekreftet tidlig i august at den hadde v\u00e6rt offer for et cyberangrep<\/strong>Hendelsen f\u00f8rte til uautorisert tilgang til selskapets IT-systemer og at en betydelig mengde data ble kompromittert. Selv om det fulle omfanget av skaden er ukjent, sier eksperter at personopplysningene til millioner av kunder kan ha blitt p\u00e5virket. Etter angrepet stengte Pandora midlertidig ned noen av sine nettsystemer og igangsatte n\u00f8dgjenopprettingsprosesser. Hendelsen resulterte ogs\u00e5 i en alvorlig omd\u00f8mmekrise, ettersom kundenes tillit er av st\u00f8rste betydning for et luksusmerke.<\/p>\n<h2 data-start=\"743\" data-end=\"827\">Europeiske flyplasser (september 2025)<\/h2>\n<p data-start=\"828\" data-end=\"1509\">Midt i september <strong data-start=\"847\" data-end=\"910\">Koordinert cyberangrep rammer flere store europeiske flyplasser<\/strong>M\u00e5lene inkluderte flyplassene London Heathrow, Berlin og Brussel. Angrepene resulterte i <strong data-start=\"1021\" data-end=\"1093\">Hundrevis av flyvninger ble kansellert, titusenvis av passasjerer ble strandet i terminalene<\/strong>, og flyselskapene led tap i millionklassen. Eksperter sier at angrepene kan ha blitt utf\u00f8rt av politisk motiverte grupper som testet s\u00e5rbarhetene til Europas kritiske infrastruktur. Hendelsen fremhever hvordan flyplassenes digitale systemer er et hovedm\u00e5l, og hvordan cybersikkerhetsrisikoer kan direkte f\u00f8re til bekymringer for passasjersikkerheten.<\/p>\n<h2 data-start=\"1516\" data-end=\"1603\">Jaguar Land Rover (september 2025)<\/h2>\n<p data-start=\"1604\" data-end=\"2297\">Jaguar Land Rover <strong data-start=\"1625\" data-end=\"1676\">ble utsatt for et omfattende cyberangrep tidlig i september<\/strong>, og det er derfor selskapets fabrikker har minst <strong data-start=\"1720\" data-end=\"1765\">Produksjonen ble fullstendig stoppet innen 1. oktober<\/strong>Dette betydde tap av produksjon av tusenvis av biler per dag, samt <strong data-start=\"1835\" data-end=\"1872\">titalls millioner pund i tap<\/strong> for\u00e5rsaket selskapet. Angrepet rammet ikke bare JLR: <strong data-start=\"1930\" data-end=\"1971\">Leverand\u00f8rer som opererer i Nitra, Slovakia<\/strong> (f.eks. eksosanleggprodusenten Ebersp\u00e4cher) ble ogs\u00e5 tvunget til \u00e5 stenge, og deres ansatte jobbet deltid eller var i permisjon. Storbritannias nasjonale cybersikkerhetssenter (NCSC) og myndighetene samarbeider for \u00e5 gjenopprette systemene. Fagforeninger frykter at uten hjelp fra myndighetene kan det f\u00f8re til masseoppsigelser.<\/p>\n<h3 data-start=\"2018\" data-end=\"2046\">Hvorfor skjer alt dette?<\/h3>\n<p data-start=\"2047\" data-end=\"2270\">Nettkriminelle har mange motiver: \u00e5 tjene penger, forf\u00f8lge politiske eller ideologiske m\u00e5l, eller rett og slett \u00e5 destabilisere kritisk infrastruktur. Det er imidlertid \u00e9n ting til felles: <strong data-start=\"2228\" data-end=\"2267\">de leter etter det svake leddet i forsvaret<\/strong>.<\/p>\n<h2 data-start=\"2272\" data-end=\"2303\">Hva kan bedrifter gj\u00f8re?<\/h2>\n<p data-start=\"2305\" data-end=\"2507\">Dagene med utdaterte antivirusprogrammer og brannmurer er over. Mot dagens cyberangrep er det bare <strong data-start=\"2384\" data-end=\"2417\">proaktiv, flerlagsbeskyttelse<\/strong>, <strong data-start=\"2419\" data-end=\"2449\">Sikkerhetsoverv\u00e5king d\u00f8gnet rundt<\/strong> og <strong data-start=\"2453\" data-end=\"2478\">rask hendelsesh\u00e5ndtering<\/strong> betyr reell trygghet.<\/p>\n<p data-start=\"2509\" data-end=\"2602\">DE <strong data-start=\"2511\" data-end=\"2531\">Cyberoperasjoner<\/strong> levert av <strong data-start=\"2547\" data-end=\"2576\">Administrerte sikkerhetstjenester<\/strong> tilbyr f\u00f8lgende:<\/p>\n<p data-start=\"253\" data-end=\"420\">Administrerte tjenester for cyberoperasjoner kombinerer toppmoderne teknologier som kan <strong data-start=\"355\" data-end=\"389\">forebygge, oppdage og behandle<\/strong> de siste cyberangrepene:<\/p>\n<ul data-start=\"422\" data-end=\"1160\">\n<li data-start=\"422\" data-end=\"706\">\n<p data-start=\"424\" data-end=\"706\"><strong data-start=\"424\" data-end=\"453\">Stellar Cyber OpenSOC XDR<\/strong>Et AI-drevet cyberforsvarssenter som analyserer data fra IT-, OT- og skysystemer i sanntid. Det gir fullstendig innsikt i ett enkelt grensesnitt, slik at angrep kan oppdages og stoppes mye raskere.<\/p>\n<\/li>\n<li data-start=\"707\" data-end=\"1002\">\n<p data-start=\"709\" data-end=\"1002\"><strong data-start=\"709\" data-end=\"726\">Dypt instinkt<\/strong>Verdens f\u00f8rste rammeverk for cybersikkerhet basert p\u00e5 dyp l\u00e6ring som koster mindre enn <strong data-start=\"811\" data-end=\"838\">P\u00e5 20 millisekunder<\/strong> Den kan ogs\u00e5 stoppe ukjente nulldagsangrep. Fordelen er <strong data-start=\"906\" data-end=\"958\">ekstremt lav falsk alarmrate (&lt;0,1%)<\/strong>, noe som resulterer i mer effektiv SOC-drift.<\/p>\n<\/li>\n<li data-start=\"1003\" data-end=\"1160\">\n<p data-start=\"1005\" data-end=\"1160\"><strong data-start=\"1005\" data-end=\"1031\">Kontinuerlig overv\u00e5king<\/strong>Vi tilbyr sikkerhetsoverv\u00e5king og hendelsesh\u00e5ndtering d\u00f8gnet rundt, med fjernintervensjon eller til og med intervensjon p\u00e5 stedet, p\u00e5 foresp\u00f8rsel.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"1162\" data-end=\"1201\">Hvorfor er dette gunstig for bedrifter?<\/h3>\n<ul data-start=\"1202\" data-end=\"1696\">\n<li data-start=\"1202\" data-end=\"1298\">\n<p data-start=\"1204\" data-end=\"1298\"><strong data-start=\"1204\" data-end=\"1227\">Full \u00e5penhet<\/strong>Alle digitale milj\u00f8er (IT, OT, sky) kan overv\u00e5kes p\u00e5 ett sted.<\/p>\n<\/li>\n<li data-start=\"1299\" data-end=\"1410\">\n<p data-start=\"1301\" data-end=\"1410\"><strong data-start=\"1301\" data-end=\"1331\">Automatiserte svar<\/strong>Systemet reagerer p\u00e5 en koordinert og rask m\u00e5te, og minimerer menneskelige feil.<\/p>\n<\/li>\n<li data-start=\"1411\" data-end=\"1588\">\n<p data-start=\"1413\" data-end=\"1588\"><strong data-start=\"1413\" data-end=\"1435\">Teknologisk fordel<\/strong>et enkelt abonnement kan fylle det teknologiske gapet som er typisk i markedet (XDR, SIEM, SOAR, IDS osv.), slik at selskapet oppfyller <strong data-start=\"1561\" data-end=\"1582\">NIS2-spesifikasjoner<\/strong> ogs\u00e5.<\/p>\n<\/li>\n<li data-start=\"1589\" data-end=\"1696\">\n<p data-start=\"1591\" data-end=\"1696\"><strong data-start=\"1591\" data-end=\"1619\">Kostnadseffektiv l\u00f8sning<\/strong>tilgjengelig i en m\u00e5nedlig avgiftsmodell, skalerbar til st\u00f8rrelsen p\u00e5 det beskyttede nettverket.<\/p>\n<\/li>\n<\/ul>\n<ul data-start=\"2604\" data-end=\"3078\">\n<li data-start=\"2604\" data-end=\"2707\">\n<p data-start=\"2606\" data-end=\"2707\"><strong data-start=\"2606\" data-end=\"2665\">Kontinuerlig SOC-overv\u00e5king (sikkerhetsoperasjonssenter)<\/strong> med st\u00f8tte fra kunstig intelligens<\/p>\n<\/li>\n<li data-start=\"2708\" data-end=\"2791\">\n<p data-start=\"2710\" data-end=\"2791\"><strong data-start=\"2710\" data-end=\"2758\">Trusseldeteksjon og -utbedring i sanntid<\/strong> med de mest moderne teknologiene<\/p>\n<\/li>\n<li data-start=\"2792\" data-end=\"2891\">\n<p data-start=\"2794\" data-end=\"2891\"><strong data-start=\"2794\" data-end=\"2827\">NIS2- og ISO 27001-samsvar<\/strong> sikre samsvar med regelverkskrav<\/p>\n<\/li>\n<li data-start=\"2892\" data-end=\"2971\">\n<p data-start=\"2894\" data-end=\"2971\"><strong data-start=\"2894\" data-end=\"2931\">Erfarne ingeni\u00f8rer og konsulenter<\/strong> umiddelbar st\u00f8tte ved hendelser<\/p>\n<\/li>\n<li data-start=\"2972\" data-end=\"3078\">\n<p data-start=\"2974\" data-end=\"3078\"><strong data-start=\"2974\" data-end=\"3007\">Risikostyring i forsyningskjeden<\/strong>, som ikke bare holder selskapet, men ogs\u00e5 partnerne trygge<\/p>\n<\/li>\n<\/ul>\n<h2 data-start=\"417\" data-end=\"463\">Teknologi + Forsikring = Fullstendig beskyttelse<\/h2>\n<p data-start=\"465\" data-end=\"697\">\u00c5 beskytte mot cyberangrep er ikke bare et sp\u00f8rsm\u00e5l om teknologi. Selv med de beste forsvarssystemene kan et angrep fortsatt lykkes. I slike tilfeller, <strong data-start=\"625\" data-end=\"694\">I tillegg til rask respons er det ogs\u00e5 viktig \u00e5 h\u00e5ndtere \u00f8konomisk skade<\/strong>.<\/p>\n<p data-start=\"699\" data-end=\"814\">Dette hjelpes av <strong data-start=\"724\" data-end=\"783\">Colonnade Forsikring Virtuelt sikkerhetsnett Cyberforsikring<\/strong>, som blant annet dekker:<\/p>\n<ul data-start=\"815\" data-end=\"1099\">\n<li data-start=\"815\" data-end=\"878\">\n<p data-start=\"817\" data-end=\"878\">kostnadene for datagjenoppretting og systemgjenoppretting,<\/p>\n<\/li>\n<li data-start=\"879\" data-end=\"928\">\n<p data-start=\"881\" data-end=\"928\">tap som f\u00f8lge av driftsavbrudd,<\/p>\n<\/li>\n<li data-start=\"929\" data-end=\"988\">\n<p data-start=\"931\" data-end=\"988\">l\u00f8sepenger knyttet til ransomware-angrep,<\/p>\n<\/li>\n<li data-start=\"989\" data-end=\"1045\">\n<p data-start=\"991\" data-end=\"1045\">kostnadene ved rettslige prosesser og b\u00f8ter,<\/p>\n<\/li>\n<li data-start=\"1046\" data-end=\"1099\">\n<p data-start=\"1048\" data-end=\"1099\">samt utgifter til PR og omd\u00f8mmeh\u00e5ndtering.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1101\" data-end=\"1322\">Dermed, den <strong data-start=\"1107\" data-end=\"1164\">Sikkerhetstjenester for cyberoperasjoner<\/strong> og den <strong data-start=\"1170\" data-end=\"1200\">Colonnade Cyberforsikring<\/strong> Sammen er de i stand til ikke bare \u00e5 forhindre, men ogs\u00e5 \u00e5 h\u00e5ndtere de st\u00f8rste hendelsene \u2013 b\u00e5de teknologisk og \u00f8konomisk.<\/p>\n<h2 data-start=\"3080\" data-end=\"3119\">Den st\u00f8rste risikoen: passivitet<\/h2>\n<p data-start=\"3121\" data-end=\"3300\">Dagens cyberangrep handler ikke lenger om hvorvidt de \u00abkan skje\u00bb, men snarere om de vil skje. <strong data-start=\"3208\" data-end=\"3217\">N\u00e5r<\/strong> Sp\u00f8rsm\u00e5let er om selskapet vil v\u00e6re forberedt eller uforberedt.<\/p>\n<p data-start=\"3302\" data-end=\"3466\">\ud83d\udc49 <strong data-start=\"3305\" data-end=\"3342\">Be om en gratis konsultasjon n\u00e5<\/strong>og vise deg hvordan vi kan beskytte bedriften din mot de mest moderne cyberangrepene. <a href=\"https:\/\/cyberoperations.hu\/nb\/kapcsolat\/\">https:\/\/cyberoperations.hu\/kapcsolat\/<\/a><\/p>\n<p data-start=\"3302\" data-end=\"3466\">","protected":false},"excerpt":{"rendered":"<p>Szeptember v\u00e9g\u00e9n s\u00falyos kibert\u00e1mad\u00e1s b\u00e9n\u00edtotta meg az Asahi Group jap\u00e1n \u00fczemeit. Jap\u00e1n legnagyobb s\u00f6rgy\u00e1rt\u00f3ja \u2013 amely vil\u00e1gszerte ismert m\u00e1rk\u00e1kat birtokol, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":3028,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3027","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-egyeb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje - Cyber Operations Group Kft.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberoperations.hu\/nb\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/\" \/>\n<meta property=\"og:locale\" content=\"nb_NO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje\" \/>\n<meta property=\"og:description\" content=\"Szeptember v\u00e9g\u00e9n s\u00falyos kibert\u00e1mad\u00e1s b\u00e9n\u00edtotta meg az Asahi Group jap\u00e1n \u00fczemeit. Jap\u00e1n legnagyobb s\u00f6rgy\u00e1rt\u00f3ja \u2013 amely vil\u00e1gszerte ismert m\u00e1rk\u00e1kat birtokol, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberoperations.hu\/nb\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Operations Group Kft.\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-30T13:39:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-30T13:50:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sales Cyberoperations\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet av\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sales Cyberoperations\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ansl. lesetid\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/\"},\"author\":{\"name\":\"Sales Cyberoperations\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/person\\\/ca194f8232fedc6dfea84a20e83bebbe\"},\"headline\":\"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje\",\"datePublished\":\"2025-09-30T13:39:42+00:00\",\"dateModified\":\"2025-09-30T13:50:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/\"},\"wordCount\":1326,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/cyber-Attack.png\",\"articleSection\":[\"Egy\u00e9b\"],\"inLanguage\":\"nb-NO\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/\",\"name\":\"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje - Cyber Operations Group Kft.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/cyber-Attack.png\",\"datePublished\":\"2025-09-30T13:39:42+00:00\",\"dateModified\":\"2025-09-30T13:50:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#breadcrumb\"},\"inLanguage\":\"nb-NO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/cyber-Attack.png\",\"contentUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/cyber-Attack.png\",\"width\":800,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Kezd\u0151lap\",\"item\":\"https:\\\/\\\/cyberoperations.hu\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"name\":\"Cyber Operations Group Kft.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberoperations.hu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nb-NO\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\",\"name\":\"Cyber Operations Group Kft.\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"contentUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"width\":1500,\"height\":400,\"caption\":\"Cyber Operations Group Kft.\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/person\\\/ca194f8232fedc6dfea84a20e83bebbe\",\"name\":\"Sales Cyberoperations\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/nb\\\/author\\\/sales\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"N\u00e5r \u00f8let stopper: et nytt niv\u00e5 av cyberangrep - Cyber Operations Group Kft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberoperations.hu\/nb\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/","og_locale":"nb_NO","og_type":"article","og_title":"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje","og_description":"Szeptember v\u00e9g\u00e9n s\u00falyos kibert\u00e1mad\u00e1s b\u00e9n\u00edtotta meg az Asahi Group jap\u00e1n \u00fczemeit. Jap\u00e1n legnagyobb s\u00f6rgy\u00e1rt\u00f3ja \u2013 amely vil\u00e1gszerte ismert m\u00e1rk\u00e1kat birtokol, [&hellip;]","og_url":"https:\/\/cyberoperations.hu\/nb\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/","og_site_name":"Cyber Operations Group Kft.","article_published_time":"2025-09-30T13:39:42+00:00","article_modified_time":"2025-09-30T13:50:14+00:00","og_image":[{"width":800,"height":1200,"url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png","type":"image\/png"}],"author":"Sales Cyberoperations","twitter_card":"summary_large_image","twitter_misc":{"Skrevet av":"Sales Cyberoperations","Ansl. lesetid":"5 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#article","isPartOf":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/"},"author":{"name":"Sales Cyberoperations","@id":"https:\/\/cyberoperations.hu\/#\/schema\/person\/ca194f8232fedc6dfea84a20e83bebbe"},"headline":"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje","datePublished":"2025-09-30T13:39:42+00:00","dateModified":"2025-09-30T13:50:14+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/"},"wordCount":1326,"commentCount":0,"publisher":{"@id":"https:\/\/cyberoperations.hu\/#organization"},"image":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png","articleSection":["Egy\u00e9b"],"inLanguage":"nb-NO","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/","url":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/","name":"N\u00e5r \u00f8let stopper: et nytt niv\u00e5 av cyberangrep - Cyber Operations Group Kft.","isPartOf":{"@id":"https:\/\/cyberoperations.hu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#primaryimage"},"image":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png","datePublished":"2025-09-30T13:39:42+00:00","dateModified":"2025-09-30T13:50:14+00:00","breadcrumb":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#breadcrumb"},"inLanguage":"nb-NO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/"]}]},{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#primaryimage","url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png","contentUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png","width":800,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Kezd\u0151lap","item":"https:\/\/cyberoperations.hu\/"},{"@type":"ListItem","position":2,"name":"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje"}]},{"@type":"WebSite","@id":"https:\/\/cyberoperations.hu\/#website","url":"https:\/\/cyberoperations.hu\/","name":"Cyber Operations Group Ltd.","description":"","publisher":{"@id":"https:\/\/cyberoperations.hu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberoperations.hu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nb-NO"},{"@type":"Organization","@id":"https:\/\/cyberoperations.hu\/#organization","name":"Cyber Operations Group Ltd.","url":"https:\/\/cyberoperations.hu\/","logo":{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/","url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","contentUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","width":1500,"height":400,"caption":"Cyber Operations Group Kft."},"image":{"@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cyberoperations.hu\/#\/schema\/person\/ca194f8232fedc6dfea84a20e83bebbe","name":"Salg Cyberoperasjoner","url":"https:\/\/cyberoperations.hu\/nb\/author\/sales\/"}]}},"_links":{"self":[{"href":"https:\/\/cyberoperations.hu\/nb\/wp-json\/wp\/v2\/posts\/3027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberoperations.hu\/nb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberoperations.hu\/nb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/nb\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/nb\/wp-json\/wp\/v2\/comments?post=3027"}],"version-history":[{"count":0,"href":"https:\/\/cyberoperations.hu\/nb\/wp-json\/wp\/v2\/posts\/3027\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/nb\/wp-json\/wp\/v2\/media\/3028"}],"wp:attachment":[{"href":"https:\/\/cyberoperations.hu\/nb\/wp-json\/wp\/v2\/media?parent=3027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberoperations.hu\/nb\/wp-json\/wp\/v2\/categories?post=3027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberoperations.hu\/nb\/wp-json\/wp\/v2\/tags?post=3027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}