EU Has Approved Cyber-Attack Sanctions

The European Union has agreed to an automatic set of sanctions to punish any future cyber attackers. EU officials in Brussels have approved a cyber sanctions regime that would impose asset freezes and travel bans on individuals. 

While no specific targets have been named yet, the EU hopes the new system will make it easier for the 28 member nations to act quickly in the event of a cyber-attack.

Cyber-Attacks on the EU
Russia and China regularly engage in cyber warfare against the EU and other nations, and were behind several high-profile attacks in recent months.  Earlier this year, Chinese state-sponsored hackers were revealed to be behind attacks on Norwegian software firm Visma and European aerospace company Airbus

Hackers released the private emails of hundreds of German politicians back in December.  In September, two Russian spies were caught deploying cyber tools in order to sabotage the Swiss defense lab tasked with analyzing the nerve agent used to poison former Russian Agent Sergei Skripal.

EU leaders have voiced concerns that Russia  interfered in the recent European Parliament elections, Held once every five years, the EU Parliament election will be the first since Russia's disinformation campaign aimed at the 2016 US presidential election put other nations on high alert for similar behavior. 

The new sanctions regime sends a clear message to hostile actors everywhere that the UK, and the EU, will impose tough consequences for cyber-attacks.

Over the last two years, we have seen a significant increase in the scale and severity of malicious cyber activity globally. The UK has been clear that it will not tolerate malicious cyber activity of this nature. The UK, alongside a coalition of Member States, has been at the forefront of driving the new approach forward.

The sanctions regime will involve travel bans and asset freezes against those we know have been responsible for these actions.

British Foreign Secretary Jeremy Hunt said: “This is decisive action to deter future cyber-attacks. For too long now, hostile actors have been threatening the EU’s security through disrupting critical infrastructure, attempts to undermine democracy and stealing commercial secrets and money running to billions of Euros. We must now look to impose travel bans and asset freezes against those we know have been responsible for this”.  

“The UK and its allies have been unafraid to call out those who have conducted cyber-attacks with the intent to damage and destroy our institutions and societies. But we have been clear that more must be done to deter future attacks by hostile state and non-state actors”.

Gov.UK:      EndGadget

You Might Also Read: 

What Does The EU Cybersecurity Vote Mean To You?:

 

 

« Ford Cars Employ New AI Systems
Five Reasons To Learn Cyber Security »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

RPC

RPC

RPC is a business law firm. Practice areas include technology and cyber risk.

OneVisage

OneVisage

Our award-winning 3DAuth digital identity platform turns any consumer mobile device into a real-time 3D facial scanner that securely authenticates the user in seconds.

Epati Information Technologies

Epati Information Technologies

ePati Information Technologies is a specialist in information technology and cyber security.

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

Cyan Securiy Group

Cyan Securiy Group

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

Glilot Capital Partners

Glilot Capital Partners

Glilot Capital Partners is an Israeli seed and early-stage VC. We specialize in businesses which disrupt enterprise technology, mainly in the fields of AI, big data and cybersecurity.

1Kosmos

1Kosmos

1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology.

Glocomp Systems

Glocomp Systems

Glocomp Systems is one of Malaysia’s premier ICT infrastructure distributor offering a comprehensive portfolio of solutions including cybersecurity and privacy.

Varen Technologies

Varen Technologies

Varen Technologies is an innovative consulting partner with highly respected cyber security, analytics, Agile Software Development and IT/maintenance expertise.

watchTowr

watchTowr

Continuous Attack Surface Testing, with the watchTowr Platform. The future of Attack Surface Management.

RAND Corporation

RAND Corporation

The RAND Corporation is a non-profit institution that helps improve policy and decision making through research and analysis.

Gorilla Technology Group

Gorilla Technology Group

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

Advanced IT

Advanced IT

Reliable managed IT Security & support services that will help you take your business operations to the next level without breaking the bank!

Tuskira

Tuskira

Tuskira is a Preemptive Cyber Defense & Response Platform powered by Agentic AI, designed to go beyond traditional vulnerability management.