The government computer emergency response team CERT-UA has recorded numerous cases of targeted cyberattacks against both employees of defense-industrial complex enterprises and individual representatives of the Defense Forces of Ukraine.During March 2025, the Signal messenger detected the distribution of messages with archives that allegedly contain a report with the results of a meeting. At the same time, in some cases, to increase trust, messages can be sent from persons from the list of existing contacts whose accounts have been compromised in advance.
Today, digital security is a matter of national resilience, and everyone shares responsibility for cybersecurity – government agencies, the private sector, expert communities, and civil society alike. Women are playing an increasingly important role in this, especially in the context of war, as they find their place in professions traditionally considered "male."
The training was organized by the Cybersecurity and Infrastructure Security Agency of the Department of National Security of the United States of America (CISA) with the support of the USAID Project "Cybersecurity of Critical Infrastructure of Ukraine".
The curriculum consisted of 2 modules and practice:- Module 1 - SQL 1 Fundamentals;- Module 2 - PL/SQL Fundamentals.The training concept was to present the basic principles of operation of industrial control systems, possible vulnerabilities and methods of protection.
The training program consisted of two modules:- Module I – general training;- Module II – specialized training.The concept of the training was to present the training group in the form of a SOC (Security Operations Center) and, using theoretical and practical training elements, familiarize the training group with SOC activities.
Representatives of the State Research Institute of Cyber Security Technologies participated in the ICS-UKR-CERT program and gained theoretical and practical skills in understanding the work of CERT/CSIRT INCIBE, their interaction with the public/private sector and citizens.Completion of the specified training event allowed the participants to find useful tools for testing systems and networks for vulnerability (Shodan), to increase the general level of knowledge about the features and nature of attacks and vulnerabilities, the level of knowledge about cyber defense of systems and networks, to learn new features of testing systems for vulnerability, to obtain statistical data regarding the most common vulnerabilities in network infrastructures, to consider the possibility of applying and implementing the obtained tools and methods in their own activities.
In the conditions of the rapid development of information technologies, the formation of effective approaches that will ensure the cyber resilience of information systems is extremely important. In order for this work to be as effective as possible, it is necessary to develop cooperation both within the state and at the interstate level, create a modern regulatory framework, and train specialists who will be able to resist threats in cyberspace. This was emphasized by Oleksandr Potii, the deputy head of the State Special Service, during his speech at the World Economic Forum.
The Administration of the State Service for Special Communications and Information Protection of Ukraine and the Information Technology and Cyber Security Service of the Republic of Moldova concluded a Memorandum of Understanding in the field of cyber protection. Signatories to the document are Yuriy Shchygol, head of the State Intelligence Service, and Alesandru Koretskyi, head of the Moldovan service.
In addition to the groups controlled by the FSB of the Russian Federation and the Russian Main Directorate of the General Staff of the Armed Forces of the Russian Federation (Gu Gsh ZS RF, formerly Gru), Ukraine is also actively attacked by the so-called "independent hacktivists", who turned out to be an "umbrella" for state-controlled criminals. In particular, these are Killnet, NoName057(16), XakNet, Anonymous Russia and Cyber Army of Russia. These hacker groups actually cooperate with each other. They attacked the same or similar targets and retweeted each other's messages on social media.
In Ukraine, work continues on improving the personnel training system and strengthening personnel potential in the field of information and cyber security. The reform envisages, in particular, the development and implementation of new professional standards taking into account the best international experience. The new professional standards are important both for employers and for educational institutions, which can adapt their educational and professional programs accordingly.