{"id":2723,"date":"2024-04-12T19:46:16","date_gmt":"2024-04-12T17:46:16","guid":{"rendered":"https:\/\/www.tec4net.com\/web\/?p=2723"},"modified":"2024-04-15T20:04:25","modified_gmt":"2024-04-15T18:04:25","slug":"1946","status":"publish","type":"post","link":"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/","title":{"rendered":"Weltkarte der Cyberkriminalit\u00e4t &#8211; f\u00fcnf L\u00e4nder stehen an der Spitze"},"content":{"rendered":"<p>Eine neue Kartierung offenbart erstmals, von welchen L\u00e4ndern die meisten Cyberattacken ausgehen. An der Spitze steht \u2013 wenig \u00fcberraschend \u2013 Russland, gefolgt von der Ukraine (vor dem Krieg), China, den USA und Nigeria. Dabei variiert die Art und technische Raffinesse der Cyberangriffe erheblich je nach Herkunftsland. Deutschland erscheint ebenfalls unter den Top-20, wie die Analyse ergab.<\/p>\n<p><a href=\"https:\/\/www.scinexx.de\/news\/technik\/erste-weltkarte-der-cyberkriminalitaet\">https:\/\/www.scinexx.de\/news\/technik\/erste-weltkarte-der-cyberkriminalitaet<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Eine neue Kartierung offenbart erstmals, von welchen L\u00e4ndern die meisten Cyberattacken ausgehen. An der Spitze steht \u2013 wenig \u00fcberraschend \u2013 Russland, gefolgt von der Ukraine (vor dem Krieg), China, den USA und Nigeria. Dabei variiert die Art und technische Raffinesse der Cyberangriffe erheblich je nach Herkunftsland. Deutschland erscheint ebenfalls unter [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[88,87,85,77,61,83,86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Weltkarte der Cyberkriminalit\u00e4t - f\u00fcnf L\u00e4nder stehen an der Spitze - tec4net<\/title>\n<meta name=\"description\" content=\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Weltkarte der Cyberkriminalit\u00e4t - f\u00fcnf L\u00e4nder stehen an der Spitze - tec4net\" \/>\n<meta property=\"og:description\" content=\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/\" \/>\n<meta property=\"og:site_name\" content=\"tec4net\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-12T17:46:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-15T18:04:25+00:00\" \/>\n<meta name=\"author\" content=\"Matthias Walter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthias Walter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/\"},\"author\":{\"name\":\"Matthias Walter\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b\"},\"headline\":\"Weltkarte der Cyberkriminalit\u00e4t &#8211; f\u00fcnf L\u00e4nder stehen an der Spitze\",\"datePublished\":\"2024-04-12T17:46:16+00:00\",\"dateModified\":\"2024-04-15T18:04:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/\"},\"wordCount\":78,\"publisher\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\"},\"keywords\":[\"Compliance\",\"Cyberattacken\",\"Cybercrime-Hotspots\",\"ISO 27001\",\"IT-Sicherheit\",\"Unternehmensnetzwerke\",\"Weltkarte\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/\",\"url\":\"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/\",\"name\":\"Weltkarte der Cyberkriminalit\u00e4t - f\u00fcnf L\u00e4nder stehen an der Spitze - tec4net\",\"isPartOf\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#website\"},\"datePublished\":\"2024-04-12T17:46:16+00:00\",\"dateModified\":\"2024-04-15T18:04:25+00:00\",\"description\":\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.tec4net.com\/web\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Weltkarte der Cyberkriminalit\u00e4t &#8211; f\u00fcnf L\u00e4nder stehen an der Spitze\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#website\",\"url\":\"https:\/\/www.tec4net.com\/web\/\",\"name\":\"tec4net\",\"description\":\"Ihr starker IT-Partner\",\"publisher\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tec4net.com\/web\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\",\"name\":\"tec4net\",\"url\":\"https:\/\/www.tec4net.com\/web\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png\",\"contentUrl\":\"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png\",\"width\":178,\"height\":163,\"caption\":\"tec4net\"},\"image\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b\",\"name\":\"Matthias Walter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g\",\"caption\":\"Matthias Walter\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Weltkarte der Cyberkriminalit\u00e4t - f\u00fcnf L\u00e4nder stehen an der Spitze - tec4net","description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/","og_locale":"de_DE","og_type":"article","og_title":"Weltkarte der Cyberkriminalit\u00e4t - f\u00fcnf L\u00e4nder stehen an der Spitze - tec4net","og_description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","og_url":"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/","og_site_name":"tec4net","article_published_time":"2024-04-12T17:46:16+00:00","article_modified_time":"2024-04-15T18:04:25+00:00","author":"Matthias Walter","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Matthias Walter","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/#article","isPartOf":{"@id":"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/"},"author":{"name":"Matthias Walter","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b"},"headline":"Weltkarte der Cyberkriminalit\u00e4t &#8211; f\u00fcnf L\u00e4nder stehen an der Spitze","datePublished":"2024-04-12T17:46:16+00:00","dateModified":"2024-04-15T18:04:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/"},"wordCount":78,"publisher":{"@id":"https:\/\/www.tec4net.com\/web\/#organization"},"keywords":["Compliance","Cyberattacken","Cybercrime-Hotspots","ISO 27001","IT-Sicherheit","Unternehmensnetzwerke","Weltkarte"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/","url":"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/","name":"Weltkarte der Cyberkriminalit\u00e4t - f\u00fcnf L\u00e4nder stehen an der Spitze - tec4net","isPartOf":{"@id":"https:\/\/www.tec4net.com\/web\/#website"},"datePublished":"2024-04-12T17:46:16+00:00","dateModified":"2024-04-15T18:04:25+00:00","description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","breadcrumb":{"@id":"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.tec4net.com\/web\/2024\/04\/12\/1946\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.tec4net.com\/web\/"},{"@type":"ListItem","position":2,"name":"Weltkarte der Cyberkriminalit\u00e4t &#8211; f\u00fcnf L\u00e4nder stehen an der Spitze"}]},{"@type":"WebSite","@id":"https:\/\/www.tec4net.com\/web\/#website","url":"https:\/\/www.tec4net.com\/web\/","name":"tec4net","description":"Ihr starker IT-Partner","publisher":{"@id":"https:\/\/www.tec4net.com\/web\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tec4net.com\/web\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.tec4net.com\/web\/#organization","name":"tec4net","url":"https:\/\/www.tec4net.com\/web\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/","url":"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png","contentUrl":"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png","width":178,"height":163,"caption":"tec4net"},"image":{"@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b","name":"Matthias Walter","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g","caption":"Matthias Walter"}}]}},"_links":{"self":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/2723"}],"collection":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/comments?post=2723"}],"version-history":[{"count":3,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/2723\/revisions"}],"predecessor-version":[{"id":2728,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/2723\/revisions\/2728"}],"wp:attachment":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/media?parent=2723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/categories?post=2723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/tags?post=2723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}