Threat Zone 17/18: New challenges of the digital world


  • Executive Summary
  • Main trends
  • Attacks on banks
  • Attacks on ATMs
  • Attacks on bank clients
  • Ransomware attacks
  • Supply chain attacks
  • Phishing and social engineering
  • Attacks on Android
  • Internet of Things, botnets and DDoS
  • Data leaks


Reasonable and appropriate measures are taken to ensure that your personal data is protected from unauthorized access or modification, unlawful destruction, and improper use. No information provided by you will be made available to third parties. Personal data will be held only for as long as is necessary for the purpose for which it is provided and, in any event, will only be kept for 24 months after any application you have made has been completed. By submitting your personal information, you consent to the use of your information as set out in this statement.