{"id":11122,"date":"2022-02-23T13:32:18","date_gmt":"2022-02-23T12:32:18","guid":{"rendered":"https:\/\/www.show.it\/cybercriminals-seek-to-profit-from-russia-ukraine-conflict\/"},"modified":"2022-02-23T13:32:18","modified_gmt":"2022-02-23T12:32:18","slug":"cybercriminals-seek-to-profit-from-russia-ukraine-conflict","status":"publish","type":"post","link":"https:\/\/www.show.it\/en\/cybercriminals-seek-to-profit-from-russia-ukraine-conflict\/","title":{"rendered":"Cybercriminals Seek to Profit From Russia-Ukraine Conflict"},"content":{"rendered":"<p><strong><span><span>Dark web threat actors are looking to take advantage of the tensions between Russia and Ukraine, offering network access and databases that could be relevant to those involved in the conflict, according to a new report from Accenture.<\/span><\/span><\/strong><\/p>\n<p><a href=\"https:\/\/www.securityweek.com\/cybercriminals-seek-profit-russia-ukraine-conflict\" target=\"_blank\" rel=\"noopener\">read more<\/a><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=NF8xWRZ0poo:tmtIFpbC2gM:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=yIl2AUoC8zA\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=NF8xWRZ0poo:tmtIFpbC2gM:-BTjWOF_DHI\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=NF8xWRZ0poo:tmtIFpbC2gM:-BTjWOF_DHI\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=NF8xWRZ0poo:tmtIFpbC2gM:dnMXMwOfBR0\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=dnMXMwOfBR0\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=NF8xWRZ0poo:tmtIFpbC2gM:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=NF8xWRZ0poo:tmtIFpbC2gM:V_sGLiPBpWU\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=NF8xWRZ0poo:tmtIFpbC2gM:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=qj6IDK7rITs\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=NF8xWRZ0poo:tmtIFpbC2gM:gIN9vFwOqvQ\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=NF8xWRZ0poo:tmtIFpbC2gM:gIN9vFwOqvQ\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=NF8xWRZ0poo:tmtIFpbC2gM:TzevzKxY174\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=TzevzKxY174\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=NF8xWRZ0poo:tmtIFpbC2gM:F7zBnMyn0Lo\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=NF8xWRZ0poo:tmtIFpbC2gM:F7zBnMyn0Lo\" border=\"0\"><\/a>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Dark web threat actors are looking to take advantage of the tensions between Russia and Ukraine, offering network access and databases that could be relevant to those involved in the conflict, according to a new report from Accenture. read more<\/p>\n","protected":false},"author":2,"featured_media":11123,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[27,28,11],"tags":[],"class_list":["post-11122","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","category-cyberwarfare","category-news-industry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/11122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/comments?post=11122"}],"version-history":[{"count":0,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/11122\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media\/11123"}],"wp:attachment":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media?parent=11122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/categories?post=11122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/tags?post=11122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}