Check Point cyber security experts: The cybercrime malicious code has new capabilities, features and distribution vectors. The first three positions are occupied by cryptominers.
The Recorded Future cyber security experts, “local and international players are waging a secondary war through internet control and other cyber means”.