• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Computer security data security Latest Cybersecurity News

WHO reports fivefold increase in cyberattacks and theft of data

William Marshal Posted On April 26, 2020
6



WHO fivefold cyberattacks

The World Health Organization (WHO) is experiencing a substantial amount of pressure due to this global pandemic. They are already taking enough measures, warning countries about the pandemic, and are already working with other health agencies in several different ways to reduce the spread of the pandemic. However, now WHO needs to worry about the humongous increase in cyberattacks. On April 23rd, WHO reported fivefold increase in cyberattacks.

WHO mentioned that around 450 active email addresses have been leaked online, along with several other personnel’s working on this coronavirus pandemic. Although, the leaked data does not include any recent information, but confessed that the attack had impacted their older extranet which is now used by the retired staff and their partners. However, considering the threats, WHO is moving to a more secured authentication system that will ensure increased security for their data.

Download a e-book titled ‘Securing endpoint to improve IT security‘ to enhance your corporate security.

Cyber criminals have become hyperactive during this pandemic, and they are launching sophisticated attacks on critical enterprises. Healthcare industry is at high alert, as any information on the discovery of a vaccine could be a huge new for the world. Hackers could be acting individually, or through their organized dark web groups, or at times this could be a state sponsored cyber espionage.

“Ensuring the security of health information for Member States and the privacy of users interacting with us a priority for WHO at all times, but also particularly during the COVID-19 pandemic. We are grateful for the alerts we receive from Member States and the private sector. We are all in this fight together,” 

– Bernardo Mariano, WHO’s Chief Information Officer. 

#cybersecurity attacks on @WHO and partners fighting #COVID19 are unacceptable, and during this pandemic, it's reprehensible. @WHO is grateful for the support of member states and the private sector helping us combat the cyber attacks. Together WE CAN! https://t.co/sLyrFambJc

— Bernardo Mariano Jr. (@BMarianoJr) April 23, 2020

WHO will do its best to improve its security by partnering with several security vendors and other cyber agencies to establish robust cybersecurity frameworks, configurations and policies. In the last week of March, WHO was attacked by cyber criminals by mimicking WHO’s internal email system. However, it was a failure, but now it appears that hackers have infiltrated the network and have accessed the WHO’s data. With more robust cyber strategies, WHO hopes to reduce the quantity of cyberattacks in the future.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit. 

Share the article with your friends




Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

6 Comments

online
February 7, 2021 at 1:51 am
Reply

You made some good points there. I did a search on the subject matter and found most persons will agree with your site. Sioux Massimiliano Wiencke


altyazili
February 7, 2021 at 8:25 am
Reply

Hello, I enjoy reading through your article. I wanted to write a little comment to support you. Petronia Tibold Gunn


altyazili
February 7, 2021 at 9:22 am
Reply

Fantastic website. A lot of useful info here. I am sending it to a few pals ans additionally sharing in delicious. And of course, thank you on your sweat! Emmalyn Valentine Michaud


altyazili
February 7, 2021 at 11:12 am
Reply

I happen to be writing to let you be aware of what a notable discovery our child found visiting your web site. She noticed a lot of pieces, with the inclusion of what it is like to possess a great helping nature to make folks with ease understand a variety of tricky subject areas. You undoubtedly exceeded her expected results. I appreciate you for imparting such practical, healthy, informative as well as easy thoughts on that topic to Gloria. Sydney Dolph Sackman


anime
February 7, 2021 at 1:56 pm
Reply

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor ut labore et dolore magna aliqua. Iseabal Teodoor Forras


720p
February 7, 2021 at 3:16 pm
Reply

I see something genuinely interesting about your site so I bookmarked . Tabina Normie Adon


Leave a Reply to altyazili Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search