{"id":6543,"date":"2026-04-13T14:13:45","date_gmt":"2026-04-13T12:13:45","guid":{"rendered":"https:\/\/bezpecnevofirme.eset.com\/sk\/?p=6543"},"modified":"2026-04-13T14:13:46","modified_gmt":"2026-04-13T12:13:46","slug":"reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\/","title":{"rendered":"Reporty o kyberzlo\u010dine v\u00e1m daj\u00fa n\u00e1skok pred hackermi"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/04\/ecrime_reports_blog-1024x576.png\" alt=\"BVF_ecrime_reports_nahladovy_obrazok\" class=\"wp-image-6544\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/04\/ecrime_reports_blog-1024x576.png 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/04\/ecrime_reports_blog-300x169.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/04\/ecrime_reports_blog-768x432.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/04\/ecrime_reports_blog-1536x864.png 1536w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/04\/ecrime_reports_blog-370x208.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/04\/ecrime_reports_blog-1170x658.png 1170w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/04\/ecrime_reports_blog-972x546.png 972w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/04\/ecrime_reports_blog-760x428.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/04\/ecrime_reports_blog-270x152.png 270w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/04\/ecrime_reports_blog.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Kyberzlo\u010dineck\u00e9 skupiny vyu\u017e\u00edvaj\u00face ransomv\u00e9r s\u00fa \u010doraz odv\u00e1\u017enej\u0161ie a\u00a0po\u010det \u00fatokov dosahuje rekordn\u00fa \u00farove\u0148. Podrobn\u00e9 inform\u00e1cie o\u00a0aktu\u00e1lnych hrozb\u00e1ch, medzi ktor\u00e9 patria aj reporty o kyberzlo\u010dine, s\u00fa preto dnes k\u013e\u00fa\u010dov\u00e9, ak chc\u00fa firmy posilni\u0165 svoje tradi\u010dn\u00e9 bezpe\u010dnostn\u00e9 mechanizmy.<\/p>\n\n\n\n<p>Vo\u00a0svete po\u010d\u00edta\u010dovej kriminality sa ransomv\u00e9r stal synonymom \u013eahko zaroben\u00fdch pe\u0148az\u00ed. Bezpe\u010dnostn\u00ed v\u00fdskumn\u00edci pravidelne odha\u013euj\u00fa nov\u00e9 a\u00a0nov\u00e9 skupiny, n\u00e1stroje aj obete, ke\u010f\u017ee kybernetick\u00ed zlo\u010dinci \u010doraz viac prech\u00e1dzaj\u00fa na\u00a0model ransomv\u00e9ru ako slu\u017eby (ransomware\u2011as\u2011a\u2011service) a\u00a0na\u00a0finan\u010dne motivovan\u00e9 \u00fatoky.<\/p>\n\n\n\n<p>V&nbsp;tejto novej realite firmy potrebuj\u00fa spo\u013eahliv\u00fd zdroj aktu\u00e1lnych inform\u00e1ci\u00ed o&nbsp;hrozb\u00e1ch, najm\u00e4 z&nbsp;tejto konkr\u00e9tnej krimin\u00e1lnej sf\u00e9ry, aby ich IT&nbsp;t\u00edmy dok\u00e1zali dr\u017ea\u0165 krok s&nbsp;najnov\u0161\u00edmi trendmi a&nbsp;vyhli sa nepr\u00edjemn\u00fdm prekvapeniam.<\/p>\n\n\n\n<p>Spolo\u010dnos\u0165 ESET preto v\u00a0r\u00e1mci svojej slu\u017eby <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/bezpecnostne-sluzby\/threat-intelligence\/\">ESET Threat Intelligence<\/a> predstavuje \u00faplne nov\u00e9 reporty o\u00a0kyberzlo\u010dine \u2013 <strong><a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/bezpecnostne-sluzby\/ecrime-reporty\/\">ESET eCrime Reports<\/a><\/strong>. S\u00fa navrhnut\u00e9 tak, aby poskytli org\u00e1nom \u010dinn\u00fdm v\u00a0trestnom konan\u00ed, IT\u00a0t\u00edmom a\u00a0bezpe\u010dnostn\u00fdm \u0161pecialistom v\u0161etky inform\u00e1cie potrebn\u00e9 na\u00a0efekt\u00edvnu ochranu firiem pred prebiehaj\u00facimi \u0161kodliv\u00fdmi kampa\u0148ami, najm\u00e4 pred ransomv\u00e9rom a\u00a0infostealermi.<\/p>\n\n\n\n<p>ESET sa <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/apt-report\/\">dlh\u00e9 roky<\/a> venuje zn\u00e1mym skupin\u00e1m APT sponzorovan\u00fdm \u0161t\u00e1tmi, ktor\u00e9 \u00fato\u010dia na&nbsp;v\u00fdznamn\u00e9 firmy a&nbsp;kritick\u00fa infra\u0161trukt\u00faru. Nov\u00e9 reporty o&nbsp;kyberzlo\u010dine upriamuj\u00fa pozornos\u0165 na&nbsp;r\u00fdchlo rast\u00facu oblas\u0165 finan\u010dne motivovan\u00fdch skup\u00edn kybernetick\u00fdch \u00fato\u010dn\u00edkov, ktor\u00ed si svoje obete nevyberaj\u00fa pod\u013ea ve\u013ekosti ani geografick\u00e9ho regi\u00f3nu. Aby boli inform\u00e1cie o&nbsp;hrozb\u00e1ch \u010do najpraktickej\u0161ie, reporty o&nbsp;kyberzlo\u010dine popisuj\u00fa scen\u00e1re re\u00e1lnych \u00fatokov spolu s&nbsp;pou\u017eit\u00fdmi taktikami, technikami a&nbsp;postupmi (TTP) a&nbsp;dop\u013a\u0148aj\u00fa ich o&nbsp;indik\u00e1tory IoC, pravidl\u00e1 vyh\u013ead\u00e1vania hrozieb a&nbsp;odpor\u00fa\u010dania, ktor\u00fdch cie\u013eom je maximalizova\u0165 \u00fa\u010dinnos\u0165 ochrany.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/bezpecnostne-sluzby\/ecrime-reporty\/\">Vysk\u00fa\u0161ajte reporty o kyberzlo\u010dine e\u0161te dnes<\/a><\/div>\n<\/div>\n\n\n\n<p><strong><em>K\u013e\u00fa\u010dov\u00e9 body \u010dl\u00e1nku:<\/em><\/strong><em><\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Po\u010det ransomv\u00e9rov\u00fdch \u00fatokov prudko rastie, ke\u010f\u017ee tento typ malv\u00e9ru je \u010doraz dostupnej\u0161\u00ed a\u00a0z\u00e1rove\u0148 st\u00e1le sofistikovanej\u0161\u00ed.<\/li>\n\n\n\n<li>V\u00a0tak dynamickom a\u00a0r\u00fdchlo sa vyv\u00edjaj\u00facom prostred\u00ed hrozieb firmy nutne potrebuj\u00fa aktu\u00e1lne inform\u00e1cie, aby dok\u00e1zali dr\u017ea\u0165 krok s\u00a0najnov\u0161\u00edmi technikami, ktor\u00e9 ransomv\u00e9rov\u00e9 skupiny pou\u017e\u00edvaj\u00fa.<\/li>\n\n\n\n<li>Spolo\u010dnos\u0165 ESET prich\u00e1dza s\u00a0\u00faplne nov\u00fdmi reportmi o\u00a0kyberzlo\u010dine, ktor\u00e9 kombinuj\u00fa detailn\u00e9 poznatky s\u00a0nepretr\u017eit\u00fdm pr\u00edsunom relevantn\u00fdch \u00fadajov o\u00a0hrozb\u00e1ch.<\/li>\n<\/ul>\n\n\n\n<h1 class=\"wp-block-heading\">\u00datoky na&nbsp;vzostupe<\/h1>\n\n\n\n<p>Situ\u00e1cia v&nbsp;prostred\u00ed kybernetick\u00fdch hrozieb sa z&nbsp;perspekt\u00edvy firiem rap\u00eddne zhor\u0161uje. Z&nbsp;ransomv\u00e9ru sa v&nbsp;podstate stala slu\u017eba dostupn\u00e1 komuko\u013evek, kto je ochotn\u00fd zaplati\u0165, \u010do umo\u017e\u0148uje aj menej sk\u00fasen\u00fdm \u00fato\u010dn\u00edkom sp\u00fa\u0161\u0165a\u0165 rozsiahle \u0161kodliv\u00e9 kampane. Kartami navy\u0161e zamie\u0161ala umel\u00e1 inteligencia, ktor\u00e1 zn\u00ed\u017eila latku vstupu na&nbsp;kyberzlo\u010dineck\u00fa sc\u00e9nu, ke\u010f\u017ee p\u00edsanie k\u00f3du je teraz r\u00fdchlej\u0161ie a&nbsp;jednoduch\u0161ie a&nbsp;potreba \u013eudsk\u00fdch kapac\u00edt na&nbsp;prev\u00e1dzku kampan\u00ed v\u00fdrazne poklesla.<\/p>\n\n\n\n<p>Napriek po\u010detn\u00fdm \u00faspechom org\u00e1nov \u010dinn\u00fdch v&nbsp;trestnom konan\u00ed aj s\u00fakromn\u00e9ho sektora pri zne\u0161kod\u0148ovan\u00ed akt\u00edvnych ransomv\u00e9rov\u00fdch oper\u00e1ci\u00ed zost\u00e1va prostredie ransomv\u00e9ru obrovskou v\u00fdzvou. Neust\u00e1le vznikaj\u00fa nov\u00e9 kyberzlo\u010dineck\u00e9 skupiny a&nbsp;\u00fato\u010dn\u00edci sa pres\u00favaj\u00fa k&nbsp;in\u00fdm autorom malv\u00e9ru. V&nbsp;roku 2025 v\u00fdskumn\u00edci spolo\u010dnosti ESET zaznamenali tak\u00fa vysok\u00fa mieru rivality, \u017ee konkuren\u010dn\u00e9 skupiny <a href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-threat-report-h12025.pdf\">na&nbsp;seba \u00fato\u010dili navz\u00e1jom<\/a>.<\/p>\n\n\n\n<p>Podobn\u00fd n\u00e1rast aktivity mo\u017eno vidie\u0165 aj pri <a href=\"https:\/\/www.eset.com\/blog\/en\/business-topics\/identity-and-data-protection\/how-infostealers-work\/\">infostealeroch<\/a>, ktor\u00e9 \u010dasto sl\u00fa\u017eia ako po\u010diato\u010dn\u00fd vektor pr\u00edstupu v&nbsp;kampaniach, ktor\u00e9 n\u00e1sledne prerast\u00fa do&nbsp;ransomv\u00e9rov\u00fdch incidentov.<\/p>\n\n\n\n<p><strong>Dostupn\u00e9 \u00fadaje tento trend potvrdzuj\u00fa:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Anal\u00fdza spolo\u010dnosti ESET o\u00a0str\u00e1nkach s\u00a0uniknut\u00fdmi \u00fadajmi ukazuje <strong>medziro\u010dn\u00fd n\u00e1rast ransomv\u00e9rov\u00fdch \u00fatokov o\u00a050\u00a0%<\/strong>.<\/li>\n\n\n\n<li>Pod\u013ea <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">spr\u00e1vy Verizon 2025 o\u00a0vy\u0161etrovan\u00ed \u00fanikov \u00fadajov<\/a> ide o\u00a0<strong>viac ne\u017e tretinov\u00fd medziro\u010dn\u00fd n\u00e1rast (z\u00a032\u00a0% na\u00a044\u00a0%)<\/strong>.<\/li>\n\n\n\n<li>T\u00e1 ist\u00e1 spr\u00e1va uv\u00e1dza, \u017ee priemern\u00e1 suma zaplaten\u00e9ho v\u00fdkupn\u00e9ho klesla zo\u00a0150 000 dol\u00e1rov v\u00a0roku 2024 na\u00a0115\u00a0000 dol\u00e1rov v\u00a0roku 2025. Jedn\u00fdm z\u00a0d\u00f4vodov m\u00f4\u017ee by\u0165 zmenen\u00e9 zacielenie \u00fato\u010dn\u00edkov na\u00a0men\u0161ie firmy \u2013 <strong>88\u00a0% napadnut\u00fdch mal\u00fdch a\u00a0stredn\u00fdch podnikov detegovalo vo\u00a0svojich syst\u00e9moch ransomv\u00e9r<\/strong>.<\/li>\n\n\n\n<li>D\u00f4le\u017eit\u00fa \u00falohu zohr\u00e1vaj\u00fa infostealery: \u00dadaje zo\u00a0str\u00e1nok o\u00a0vydieran\u00ed ransomv\u00e9rom ukazuj\u00fa, \u017ee <strong>v\u00a0pr\u00edpade 54\u00a0% obet\u00ed boli ich dom\u00e9ny zachyten\u00e9 minim\u00e1lne v\u00a0jednom protokole infostealera alebo v\u00a0ponuk\u00e1ch na\u00a0neleg\u00e1lnych trhoch<\/strong>, ako uv\u00e1dza rovnak\u00e1 spr\u00e1va.<\/li>\n<\/ul>\n\n\n\n<p>Vy\u0161\u0161ia dostupnos\u0165 ransomv\u00e9ru rozhodne neznamen\u00e1, \u017ee sa st\u00e1va menej nebezpe\u010dn\u00fdm. Krimin\u00e1lne skupiny na\u010falej vyv\u00edjaj\u00fa nov\u00e9 n\u00e1stroje, ako napr\u00edklad <a href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/desifrujeme-pre-vas\/nastroje-na-odstavenie-edr-su-na-vzostupe-ako-sa-branit\/\">EDR killers<\/a>, ktor\u00e9 zneu\u017e\u00edvaj\u00fa zranite\u013en\u00e9 ovl\u00e1da\u010de na\u00a0deaktiv\u00e1ciu bezpe\u010dnostn\u00fdch rie\u0161en\u00ed. Rovnako r\u00fdchlo si osvojuj\u00fa aj nov\u00e9 techniky pozorovan\u00e9 pri in\u00fdch typoch hrozieb \u2013 napr\u00edklad ClickFix, met\u00f3du soci\u00e1lneho in\u017einierstva, ktor\u00e1 zobrazuje falo\u0161n\u00e9 chybov\u00e9 hl\u00e1senie, aby nal\u00e1kala obe\u0165 skop\u00edrova\u0165, vlo\u017ei\u0165 a\u00a0spusti\u0165 \u0161kodliv\u00e9 pr\u00edkazy na\u00a0zariaden\u00ed.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Pre\u010do je d\u00f4le\u017eit\u00e9 ma\u0165 inform\u00e1cie o&nbsp;hrozb\u00e1ch?<\/h1>\n\n\n\n<p>V&nbsp;dne\u0161nom mimoriadne dynamickom prostred\u00ed ransomv\u00e9ru sa firmy u\u017e nem\u00f4\u017eu spolieha\u0165 len na&nbsp;pas\u00edvne n\u00e1stroje kybernetick\u00e9ho zabezpe\u010denia, ako s\u00fa jednoduch\u00e9 produkty na&nbsp;ochranu koncov\u00fdch zariaden\u00ed. Na&nbsp;zvl\u00e1dnutie neust\u00e1le sa vyv\u00edjaj\u00facich hrozieb potrebuj\u00fa proakt\u00edvnu, viacvrstvov\u00fa obranu, ktorej s\u00fa\u010das\u0165ou s\u00fa aj vysokokvalitn\u00e9 inform\u00e1cie o&nbsp;hrozb\u00e1ch.<\/p>\n\n\n\n<p>Ransomv\u00e9rov\u00e9 \u00fatoky s\u00fa \u010dasto komplexn\u00e9 a&nbsp;viacf\u00e1zov\u00e9. \u00dato\u010dn\u00edci za\u010d\u00ednaj\u00fa prieskumom a&nbsp;d\u00f4kladne sleduj\u00fa vybran\u00fa organiz\u00e1ciu. Potom nasadia malv\u00e9r, aby prenikli do&nbsp;prostredia, a&nbsp;a\u017e n\u00e1sledne za\u0161ifruj\u00fa d\u00e1ta a&nbsp;\u017eiadaj\u00fa v\u00fdkupn\u00e9. Cel\u00fd tento proces m\u00f4\u017ee prebieha\u0165 pomal\u00fdm tempom v&nbsp;priebehu nieko\u013ek\u00fdch t\u00fd\u017ed\u0148ov, ke\u010f\u017ee cie\u013eom je vyhn\u00fa\u0165 sa detekcii.<\/p>\n\n\n\n<p>Samozrejme, \u00fato\u010dn\u00edci tie\u017e sleduj\u00fa v\u00fdkonnos\u0165 svojich kampan\u00ed a&nbsp;priebe\u017ene vylep\u0161uj\u00fa svoje n\u00e1stroje a&nbsp;taktiky.<\/p>\n\n\n\n<p>Ekosyst\u00e9m infostealerov takisto v\u00fdrazne \u0165a\u017e\u00ed z&nbsp;modelu malv\u00e9r ako slu\u017eba (MaaS), v&nbsp;r\u00e1mci ktor\u00e9ho sa infostealery \u0161\u00edria od&nbsp;autora malv\u00e9ru cez r\u00f4znych vz\u00e1jomne neprepojen\u00fdch \u00fato\u010dn\u00edkov, \u010do s\u0165a\u017euje pr\u00e1cu bezpe\u010dnostn\u00fdm pracovn\u00edkom. K&nbsp;tomu sa prid\u00e1vaj\u00fa \u0161pecializovan\u00e9 trhovisk\u00e1, ktor\u00e9 predstavuj\u00fa mimoriadne jednoduch\u00fd sp\u00f4sob, ako spe\u0148a\u017ei\u0165 ukradnut\u00e9 prihlasovacie \u00fadaje.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">ESET Threat Intelligence \u2013 glob\u00e1lny preh\u013ead podporen\u00fd \u0161pi\u010dkov\u00fdmi v\u00fdskumn\u00edkmi<\/h1>\n\n\n\n<p>V\u010faka ve\u013ek\u00e9mu po\u010dtu pou\u017e\u00edvate\u013eov naprie\u010d r\u00f4znymi regi\u00f3nmi m\u00e1 ESET skuto\u010dne glob\u00e1lny preh\u013ead o&nbsp;re\u00e1lnych incidentoch, ktor\u00e9 jeho bezpe\u010dnostn\u00e9 rie\u0161enia zachyt\u00e1vaj\u00fa a&nbsp;rie\u0161ia. Je to d\u00f4le\u017eit\u00fd z\u00e1klad, ktor\u00fd n\u00e1m umo\u017e\u0148uje vytv\u00e1ra\u0165 kvalitne spracovan\u00e9, fakticky presn\u00e9 a&nbsp;skuto\u010dne podrobn\u00e9 inform\u00e1cie o&nbsp;hrozb\u00e1ch.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color wp-elements-97cb27eb9cf2f8735cc8f82b5372c43e\">Pri ka\u017edoro\u010dnom ude\u013eovan\u00ed ceny P\u00e9tera Sz\u0151ra organiz\u00e1cie Virus Bulletin za\u00a0najlep\u0161\u00ed technick\u00fd bezpe\u010dnostn\u00fd v\u00fdskum sa v\u00fdskumn\u00edci spolo\u010dnosti ESET pravidelne radia medzi \u0161pi\u010dku. <br><br><strong>V\u00ed\u0165azi:<\/strong><br><br>2024: \u201eEbury je st\u00e1le akt\u00edvny, len nevidite\u013en\u00fd: 400\u00a0000 napadnut\u00fdch Linux serverov s\u00a0cie\u013eom kr\u00e1de\u017ee kryptomien a\u00a0finan\u010dn\u00e9ho zisku\u201c \u2013 Marc-Etienne M. L\u00e9veill\u00e9 (ESET)<br><br>2023: \u201eBlackLotus UEFI bootkit: M\u00fdtus potvrden\u00fd\u201c \u2013 Martin Smol\u00e1r (ESET)<br><br>2014: \u201eOper\u00e1cia Windigo\u201c \u2013 v\u00fdskumn\u00edci spolo\u010dnosti ESET: Olivier Bilodeau, Pierre-Marc Bureau, Joan Calvet, Alexis Dorais-Joncas, Marc-Etienne L\u00e9veill\u00e9 a\u00a0Benjamin Vanheuverzwijn<br><br><strong>Nominovan\u00ed:<\/strong><br><br>2019 \u201eLoJax: Prv\u00fd rootkit v\u00a0UEFI n\u00e1jden\u00fd v\u00a0re\u00e1lnom prostred\u00ed, ktor\u00fd nasadila skupina Sednit\u201c \u2013 v\u00fdskum spolo\u010dnosti ESET<br><br>2016 \u201eDistribuovan\u00e9 obnovovanie vysok\u00farov\u0148ovej IR pre anal\u00fdzu malv\u00e9ru vo ve\u013ekom rozsahu\u201c \u2013 Alex Matrosov (Intel Security), Eugene Rodionov (ESET), Gabriel Negreira<\/p>\n\n\n\n<p>Pr\u00edkladom z\u00a0praxe je n\u00e1\u0161 <a href=\"https:\/\/www.welivesecurity.com\/2023\/03\/01\/blacklotus-uefi-bootkit-myth-confirmed\/\">oce\u0148ovan\u00fd v\u00fdskum<\/a> bootkitu BlackLotus UEFI, prv\u00e9ho verejne zn\u00e1meho UEFI bootkitu, ktor\u00fd dok\u00e1zal ob\u00eds\u0165 z\u00e1kladn\u00fa bezpe\u010dnostn\u00fa funkciu UEFI Secure Boot. V\u00fdskumn\u00edk spolo\u010dnosti ESET Martin Smol\u00e1r tento malv\u00e9r detailne rozanalyzoval, pop\u00edsal jeho hist\u00f3riu, krok za krokom vysvetlil cel\u00fd proces ob\u00eddenia ochrany a\u00a0pon\u00fakol odpor\u00fa\u010dania, ako sa proti dan\u00e9mu bootkitu br\u00e1ni\u0165.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/bezpecnostne-sluzby\/threat-intelligence\/\">ESET Threat Intelligence<\/a> sa opiera o\u00a0\u0161pi\u010dkov\u00fdch v\u00fdskumn\u00edkov a\u00a0detek\u010dn\u00fdch in\u017einierov, ktor\u00ed spolupracuj\u00fa s\u00a0popredn\u00fdmi in\u0161tit\u00faciami v\u00a0oblasti kybernetickej bezpe\u010dnosti vr\u00e1tane FBI, Joint Cyber Defense Collaborative v\u00a0r\u00e1mci agent\u00fary CISA, Centra v\u00fdnimo\u010dnosti pre spolo\u010dn\u00fa kybernetick\u00fa obranu aliancie NATO (organiz\u00e1tor cvi\u010denia Locked Shields) a\u00a0Europolu.<\/p>\n\n\n\n<p>Presne t\u00edto kvalitn\u00ed v\u00fdskumn\u00edci prispievaj\u00fa aj do&nbsp;reportov a&nbsp;informa\u010dn\u00fdch kan\u00e1lov v&nbsp;r\u00e1mci slu\u017eby <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/bezpecnostne-sluzby\/threat-intelligence\/\">ESET Threat Intelligence<\/a>.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">\u010co prin\u00e1\u0161aj\u00fa nov\u00e9 reporty o\u00a0kyberzlo\u010dine<\/h1>\n\n\n\n<p>Reporty spolo\u010dnosti ESET o&nbsp;kyberzlo\u010dine (ESET eCrime Reports) s\u00fa najnov\u0161\u00edm pr\u00edrastkom do&nbsp;portf\u00f3lia ESET Threat Intelligence. Odha\u013euj\u00fa met\u00f3dy, infra\u0161trukt\u00faru a&nbsp;spr\u00e1vanie dne\u0161n\u00fdch kyberkrimin\u00e1lnych skup\u00edn \u2013 najm\u00e4 t\u00fdch, ktor\u00e9 stoja za&nbsp;ransomv\u00e9rom, infostealermi a&nbsp;masovo \u0161\u00edren\u00fdmi phishingov\u00fdmi kampa\u0148ami.<\/p>\n\n\n\n<p>Tieto kampane p\u00f4sobia glob\u00e1lne a&nbsp;vo&nbsp;ve\u013ekom rozsahu, pri\u010dom ohrozuj\u00fa organiz\u00e1cie v\u0161etk\u00fdch ve\u013ekost\u00ed takmer vo&nbsp;v\u0161etk\u00fdch regi\u00f3noch.<\/p>\n\n\n\n<p>Cie\u013eom reportov o&nbsp;kyberzlo\u010dine je poskytn\u00fa\u0165 firm\u00e1m jasn\u00fd a&nbsp;aktu\u00e1lny preh\u013ead o&nbsp;re\u00e1lnych \u00fatokoch vr\u00e1tane pou\u017eit\u00fdch indik\u00e1torov IoC. Pon\u00fakaj\u00fa tie\u017e s\u00fahrnn\u00e9 zistenia a&nbsp;praktick\u00e9 odpor\u00fa\u010dania, ktor\u00e9 m\u00f4\u017eu bezpe\u010dnostn\u00e9 t\u00edmy okam\u017eite uplatni\u0165 na&nbsp;posilnenie odolnosti firmy.<\/p>\n\n\n\n<p>Pokro\u010dil\u00e1 \u00farove\u0148 reportov ESET eCrime Reports Advanced navy\u0161e obsahuje pr\u00edstup k&nbsp;n\u00e1stroju ESET AI Advisor, ktor\u00fd zr\u00fdch\u013euje spracovanie inform\u00e1ci\u00ed, a&nbsp;mo\u017enos\u0165 integr\u00e1cie s&nbsp;<a href=\"https:\/\/help.eset.com\/eti_portal\/en-US\/misp.html\">ESET MISP serverom<\/a>.<\/p>\n\n\n\n<p><strong>Hlavn\u00e9 v\u00fdhody reportov spolo\u010dnosti ESET o&nbsp;kyberzlo\u010dine:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Kompletn\u00fd preh\u013ead najnov\u0161\u00edch kampan\u00ed ransomv\u00e9ru a\u00a0infostealerov, ktor\u00fd \u010faleko prekra\u010duje izolovan\u00e9 indik\u00e1tory.<\/li>\n\n\n\n<li>H\u013abkov\u00e9 anal\u00fdzy pokr\u00fdvaj\u00fa vzory \u00fatokov, ich priebeh, indik\u00e1tory IoC, taktiky, n\u00e1stroje, mapovanie infra\u0161trukt\u00fary a\u00a0pokrytie v\u00a0r\u00e1mci datab\u00e1zy MITRE ATT&amp;CK\u00ae.<\/li>\n\n\n\n<li>Praktick\u00e9 odpor\u00fa\u010dania na\u00a0obranu pred \u00fatokmi, ktor\u00e9 vych\u00e1dzaj\u00fa zo\u00a0zisten\u00fdch poznatkov a\u00a0expertnej anal\u00fdzy.<\/li>\n\n\n\n<li>Mesa\u010dn\u00e9 aktualiz\u00e1cie s\u00a0podrobn\u00fdmi inform\u00e1ciami o\u00a0prebiehaj\u00facej aktivite ransomv\u00e9ru a\u00a0infostealerov, hlavn\u00fdch trendoch, v\u00fdznamn\u00fdch incidentoch a\u00a0nov\u00fdch hrozb\u00e1ch.<\/li>\n\n\n\n<li>Informa\u010dn\u00fd kan\u00e1l o\u00a0kyberzlo\u010dine \u2013 priebe\u017ene aktualizovan\u00fd pr\u00edsun d\u00f4kladne spracovan\u00fdch indik\u00e1torov IoC, ktor\u00e9 s\u00fa zameran\u00e9 na\u00a0ransomv\u00e9rov\u00e9 skupiny, s\u00a0nimi spolupracuj\u00facich \u00fato\u010dn\u00edkov a\u00a0kampane infostealerov.<\/li>\n\n\n\n<li>ESET AI Advisor \u2013 pomocn\u00fd n\u00e1stroj zalo\u017een\u00fd na\u00a0umelej inteligencii, ktor\u00fd vyu\u017e\u00edva poznatky z\u00a0reportov o\u00a0kyberzlo\u010dine a\u00a0poskytuje r\u00fdchle, kontextovo presn\u00e9 odpovede na\u00a0ot\u00e1zky t\u00fdkaj\u00face sa hrozieb.<\/li>\n\n\n\n<li>Pr\u00edstup k\u00a0ESET MISP serveru, ktor\u00fd umo\u017e\u0148uje priamu integr\u00e1ciu so\u00a0spracovan\u00fdmi inform\u00e1ciami o\u00a0hrozb\u00e1ch a\u00a0umo\u017e\u0148uje bezpe\u010dnostn\u00fdm t\u00edmom automatizova\u0165 prij\u00edmanie indik\u00e1torov IoC.<\/li>\n\n\n\n<li>Podpora dodr\u017eiavania regul\u00e1ci\u00ed, ktor\u00e1 firm\u00e1m pom\u00e1ha plni\u0165 po\u017eiadavky legislat\u00edvnych noriem aj \u0161tandardov v\u00a0odvetv\u00ed.<\/li>\n<\/ul>\n\n\n\n<p>ESET eCrime Reports umo\u017e\u0148uj\u00fa firm\u00e1m v\u010das identifikova\u0165 mo\u017en\u00e9 hrozby, odhali\u0165 a&nbsp;opravi\u0165 chybn\u00e9 konfigur\u00e1cie \u010di&nbsp;bezpe\u010dnostn\u00e9 medzery, spr\u00e1vne si ur\u010di\u0165 priority pri zahlten\u00ed upozorneniami, aktualiz\u00e1ciami alebo z\u00e1platami a&nbsp;prij\u00edma\u0165 strategick\u00e9 rozhodnutia.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Nenechajte sa viac prekvapi\u0165<\/h1>\n\n\n\n<p>Kyberzlo\u010dineck\u00e9 skupiny \u0161pecializuj\u00face sa na&nbsp;ransomv\u00e9r s\u00fa \u010doraz odv\u00e1\u017enej\u0161ie, neust\u00e1le zdokona\u013euj\u00fa svoje n\u00e1stroje a&nbsp;\u017een\u00fa po\u010dty \u00fatokov do&nbsp;rekordn\u00fdch \u010d\u00edsel. V&nbsp;tak dynamickom prostred\u00ed hrozieb potrebuj\u00fa firmy neust\u00e1ly pr\u00edsun najnov\u0161\u00edch inform\u00e1ci\u00ed o&nbsp;hrozb\u00e1ch, aby vedeli predv\u00edda\u0165, o&nbsp;\u010do sa ransomv\u00e9rov\u00e9 gangy pok\u00fasia nabud\u00face.<\/p>\n\n\n\n<p>Reporty spolo\u010dnosti ESET o&nbsp;kyberzlo\u010dine pom\u00e1haj\u00fa predch\u00e1dza\u0165 naru\u0161eniam bezpe\u010dnosti a&nbsp;posil\u0148ova\u0165 odolnos\u0165 t\u00fdm, \u017ee organiz\u00e1ci\u00e1m poskytuj\u00fa podrobn\u00fd preh\u013ead o&nbsp;kybernetick\u00fdch \u00fato\u010dn\u00edkoch a&nbsp;najnov\u0161\u00edch hrozb\u00e1ch.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/bezpecnostne-sluzby\/ecrime-reporty\/\">Vysk\u00fa\u0161ajte reporty o kyberzlo\u010dine e\u0161te dnes<\/a><\/div>\n<\/div>\n\n\n\n<h1 class=\"wp-block-heading\">\u010casto kladen\u00e9 ot\u00e1zky:<\/h1>\n\n\n\n<p><strong>Pre\u010do tak r\u00fdchlo rastie po\u010det \u00fatokov ransomv\u00e9ru a&nbsp;infostealerov?<\/strong><strong><\/strong><\/p>\n\n\n\n<p>Ransomv\u00e9r sa vyvinul do&nbsp;modelu \u013eahko dostupnej slu\u017eby, \u010do umo\u017e\u0148uje aj menej sk\u00fasen\u00fdm kyberzlo\u010dincom sp\u00fa\u0161\u0165a\u0165 rozsiahle \u00fatoky. Umel\u00e1 inteligencia e\u0161te viac zr\u00fdchlila pr\u00edpravu \u00fatokov, ke\u010f\u017ee v\u00fdrazne zjednodu\u0161uje p\u00edsanie k\u00f3du aj automatiz\u00e1ciu.<\/p>\n\n\n\n<p><strong>V&nbsp;\u010dom s\u00fa dne\u0161n\u00e9 kampane ransomv\u00e9ru nebezpe\u010dnej\u0161ie ako predt\u00fdm?<\/strong><strong><\/strong><\/p>\n\n\n\n<p>Modern\u00e9 kampane s\u00fa sofistikovan\u00e9, viacf\u00e1zov\u00e9 oper\u00e1cie. Na\u00a0prienik ransomv\u00e9ru do\u00a0syst\u00e9mu sa \u010dasto zneu\u017e\u00edvaj\u00fa dostupn\u00e9 legit\u00edmne n\u00e1stroje prostredn\u00edctvom techn\u00edk LOTL (living off the land), \u010do v\u00fdrazne s\u0165a\u017euje detekciu. Z\u00e1rove\u0148 je dne\u0161n\u00fd ransomv\u00e9rov\u00fd ekosyst\u00e9m omnoho dostupnej\u0161\u00ed \u2013 ved\u013ea seba funguj\u00fa desiatky kyberzlo\u010dineck\u00fdch skup\u00edn, pri\u010dom ka\u017ed\u00e1 m\u00e1 vlastn\u00fdch spolupracuj\u00facich \u00fato\u010dn\u00edkov. Neust\u00e1le prisp\u00f4sobuj\u00fa svoje techniky, pou\u017e\u00edvaj\u00fa pokro\u010dil\u00e9 n\u00e1stroje, ako s\u00fa <a href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/desifrujeme-pre-vas\/nastroje-na-odstavenie-edr-su-na-vzostupe-ako-sa-branit\/\">EDR killers<\/a>, a\u00a0r\u00fdchlo si osvojuj\u00fa nov\u00e9 met\u00f3dy kompromit\u00e1cie.<\/p>\n\n\n\n<p><strong>Pre\u010do firmy potrebuj\u00fa okrem tradi\u010dn\u00fdch n\u00e1strojov kybernetickej bezpe\u010dnosti aj slu\u017eby prin\u00e1\u0161aj\u00face inform\u00e1cie o&nbsp;hrozb\u00e1ch?<\/strong><strong><\/strong><\/p>\n\n\n\n<p>Tradi\u010dn\u00e9 pas\u00edvne n\u00e1stroje ako jednoduch\u00fd antiv\u00edrus nedok\u00e1\u017eu dr\u017ea\u0165 krok s&nbsp;r\u00fdchlo sa vyv\u00edjaj\u00facimi kybernetick\u00fdmi hrozbami a&nbsp;nepokr\u00fdvaj\u00fa v\u0161etky potenci\u00e1lne vektory \u00fatokov. Slu\u017eby poskytuj\u00face inform\u00e1cie o&nbsp;hrozb\u00e1ch prin\u00e1\u0161aj\u00fa detailn\u00fd preh\u013ead o&nbsp;re\u00e1lnych \u00fatokoch, taktik\u00e1ch a&nbsp;indik\u00e1toroch IoC, \u010do firm\u00e1m umo\u017e\u0148uje v\u010das odhali\u0165 hrozby, r\u00fdchlej\u0161ie reagova\u0165 a&nbsp;predv\u00edda\u0165 \u010fal\u0161ie kroky kyberzlo\u010dincov.<\/p>\n\n\n\n<p><strong>V&nbsp;\u010dom je jedine\u010dn\u00e1 slu\u017eba spolo\u010dnosti ESET, ktor\u00e1 prin\u00e1\u0161a podrobn\u00e9 inform\u00e1cie o&nbsp;hrozb\u00e1ch?<\/strong><strong><\/strong><\/p>\n\n\n\n<p>Informa\u010dn\u00e9 portf\u00f3lio spolo\u010dnosti ESET stoj\u00ed na&nbsp;pokro\u010dil\u00fdch detek\u010dn\u00fdch technol\u00f3gi\u00e1ch a&nbsp;glob\u00e1lnom t\u00edme uzn\u00e1van\u00fdch v\u00fdskumn\u00edkov. T\u00ed monitoruj\u00fa prebiehaj\u00face \u00fatoky, analyzuj\u00fa pou\u017eit\u00fd malv\u00e9r a&nbsp;spolupracuj\u00fa s&nbsp;organiz\u00e1ciami ako NATO, FBI, Europol \u010di&nbsp;CISA. V\u010faka tejto priamej vidite\u013enosti do&nbsp;re\u00e1lnych incidentov dok\u00e1\u017ee ESET prin\u00e1\u0161a\u0165 prelomov\u00e9 odhalenia hrozieb a&nbsp;z\u00e1kazn\u00edkom poskytova\u0165 kvalitn\u00e9, prakticky vyu\u017eite\u013en\u00e9 poznatky v&nbsp;r\u00e1mci pr\u00edslu\u0161n\u00fdch slu\u017eieb.<\/p>\n\n\n\n<p><strong>\u010co pon\u00fakaj\u00fa reporty ESET o&nbsp;kyberzlo\u010dine, aby firm\u00e1m pomohli udr\u017ea\u0165 si n\u00e1skok pred \u00fato\u010dn\u00edkmi?<\/strong><strong><\/strong><\/p>\n\n\n\n<p>ESET eCrime Reports poskytuj\u00fa detailn\u00fd preh\u013ead o&nbsp;oper\u00e1ci\u00e1ch ransomv\u00e9ru, infostealerov a&nbsp;phishingu. Firmy z\u00edskaj\u00fa anal\u00fdzy \u00fatokov, ich vzorov, indik\u00e1torov IoC, takt\u00edk a&nbsp;pou\u017e\u00edvan\u00fdch n\u00e1strojov, mapovania v&nbsp;datab\u00e1ze MITRE ATT&amp;CK\u00ae a&nbsp;mesa\u010dn\u00e9 preh\u013eady nov\u00fdch hrozieb. Pokro\u010dil\u00e1 \u00farove\u0148 reportov ESET eCrime Reports Advanced navy\u0161e zah\u0155\u0148a n\u00e1stroj AI Advisor a&nbsp;integr\u00e1ciu MISP na&nbsp;automatizovan\u00e9 sprac\u00favanie indik\u00e1torov IoC. V\u010faka tomu dok\u00e1\u017eu firmy v\u010das identifikova\u0165 hrozby, opravi\u0165 chybn\u00e9 konfigur\u00e1cie, zn\u00ed\u017ei\u0165 zahltenie mno\u017estvom upozornen\u00ed a&nbsp;prij\u00edma\u0165 informovan\u00e9 rozhodnutia t\u00fdkaj\u00face sa bezpe\u010dnosti.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kyberzlo\u010dineck\u00e9 skupiny vyu\u017e\u00edvaj\u00face ransomv\u00e9r s\u00fa \u010doraz odv\u00e1\u017enej\u0161ie a\u00a0po\u010det \u00fatokov dosahuje rekordn\u00fa \u00farove\u0148. Podrobn\u00e9 inform\u00e1cie o\u00a0aktu\u00e1lnych hrozb\u00e1ch, medzi ktor\u00e9 patria aj reporty o kyberzlo\u010dine, s\u00fa preto dnes k\u013e\u00fa\u010dov\u00e9, ak chc\u00fa firmy posilni\u0165 svoje tradi\u010dn\u00e9 bezpe\u010dnostn\u00e9 mechanizmy. Vo\u00a0svete po\u010d\u00edta\u010dovej kriminality sa ransomv\u00e9r stal synonymom \u013eahko zaroben\u00fdch pe\u0148az\u00ed. Bezpe\u010dnostn\u00ed v\u00fdskumn\u00edci pravidelne odha\u013euj\u00fa nov\u00e9 a\u00a0nov\u00e9 skupiny, n\u00e1stroje aj obete, ke\u010f\u017ee kybernetick\u00ed zlo\u010dinci \u010doraz viac prech\u00e1dzaj\u00fa na\u00a0model&hellip;<\/p>\n","protected":false},"author":8,"featured_media":6545,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[143],"tags":[],"class_list":["post-6543","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eset-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Reporty o kyberzlo\u010dine v\u00e1m daj\u00fa n\u00e1skok pred hackermi | ESET<\/title>\n<meta name=\"description\" content=\"Podrobn\u00e9 reporty o kyberzlo\u010dine s\u00fa k\u013e\u00fa\u010dov\u00e9, ak chc\u00fa firmy posilni\u0165 svoje tradi\u010dn\u00e9 bezpe\u010dnostn\u00e9 mechanizmy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Reporty o kyberzlo\u010dine v\u00e1m daj\u00fa n\u00e1skok pred hackermi | ESET\" \/>\n<meta property=\"og:description\" content=\"Podrobn\u00e9 reporty o kyberzlo\u010dine s\u00fa k\u013e\u00fa\u010dov\u00e9, ak chc\u00fa firmy posilni\u0165 svoje tradi\u010dn\u00e9 bezpe\u010dnostn\u00e9 mechanizmy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-13T12:13:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T12:13:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/04\/ecrime_reports_blog-1-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"igorkmit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"igorkmit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\\\/\"},\"author\":{\"name\":\"igorkmit\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\"},\"headline\":\"Reporty o kyberzlo\u010dine v\u00e1m daj\u00fa n\u00e1skok pred hackermi\",\"datePublished\":\"2026-04-13T12:13:45+00:00\",\"dateModified\":\"2026-04-13T12:13:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\\\/\"},\"wordCount\":2714,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/04\\\/ecrime_reports_blog-1.png\",\"articleSection\":[\"ESET Blog\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\\\/\",\"name\":\"Reporty o kyberzlo\u010dine v\u00e1m daj\u00fa n\u00e1skok pred hackermi | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/04\\\/ecrime_reports_blog-1.png\",\"datePublished\":\"2026-04-13T12:13:45+00:00\",\"dateModified\":\"2026-04-13T12:13:46+00:00\",\"description\":\"Podrobn\u00e9 reporty o kyberzlo\u010dine s\u00fa k\u013e\u00fa\u010dov\u00e9, ak chc\u00fa firmy posilni\u0165 svoje tradi\u010dn\u00e9 bezpe\u010dnostn\u00e9 mechanizmy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/04\\\/ecrime_reports_blog-1.png\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/04\\\/ecrime_reports_blog-1.png\",\"width\":1920,\"height\":1080,\"caption\":\"BVF_ecrime_reports_ilustracny_obrazok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Reporty o kyberzlo\u010dine v\u00e1m daj\u00fa n\u00e1skok pred hackermi\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\",\"name\":\"igorkmit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"caption\":\"igorkmit\"},\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/author\\\/igorkmit\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Reporty o kyberzlo\u010dine v\u00e1m daj\u00fa n\u00e1skok pred hackermi | ESET","description":"Podrobn\u00e9 reporty o kyberzlo\u010dine s\u00fa k\u013e\u00fa\u010dov\u00e9, ak chc\u00fa firmy posilni\u0165 svoje tradi\u010dn\u00e9 bezpe\u010dnostn\u00e9 mechanizmy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\/","og_locale":"sk_SK","og_type":"article","og_title":"Reporty o kyberzlo\u010dine v\u00e1m daj\u00fa n\u00e1skok pred hackermi | ESET","og_description":"Podrobn\u00e9 reporty o kyberzlo\u010dine s\u00fa k\u013e\u00fa\u010dov\u00e9, ak chc\u00fa firmy posilni\u0165 svoje tradi\u010dn\u00e9 bezpe\u010dnostn\u00e9 mechanizmy.","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2026-04-13T12:13:45+00:00","article_modified_time":"2026-04-13T12:13:46+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/04\/ecrime_reports_blog-1-1024x576.png","type":"image\/png"}],"author":"igorkmit","twitter_card":"summary_large_image","twitter_misc":{"Autor":"igorkmit","Predpokladan\u00fd \u010das \u010d\u00edtania":"11 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\/"},"author":{"name":"igorkmit","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3"},"headline":"Reporty o kyberzlo\u010dine v\u00e1m daj\u00fa n\u00e1skok pred hackermi","datePublished":"2026-04-13T12:13:45+00:00","dateModified":"2026-04-13T12:13:46+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\/"},"wordCount":2714,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/04\/ecrime_reports_blog-1.png","articleSection":["ESET Blog"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\/","name":"Reporty o kyberzlo\u010dine v\u00e1m daj\u00fa n\u00e1skok pred hackermi | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/04\/ecrime_reports_blog-1.png","datePublished":"2026-04-13T12:13:45+00:00","dateModified":"2026-04-13T12:13:46+00:00","description":"Podrobn\u00e9 reporty o kyberzlo\u010dine s\u00fa k\u013e\u00fa\u010dov\u00e9, ak chc\u00fa firmy posilni\u0165 svoje tradi\u010dn\u00e9 bezpe\u010dnostn\u00e9 mechanizmy.","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/04\/ecrime_reports_blog-1.png","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/04\/ecrime_reports_blog-1.png","width":1920,"height":1080,"caption":"BVF_ecrime_reports_ilustracny_obrazok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/reporty-o-kyberzlocine-vam-daju-naskok-pred-hackermi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Reporty o kyberzlo\u010dine v\u00e1m daj\u00fa n\u00e1skok pred hackermi"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3","name":"igorkmit","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","caption":"igorkmit"},"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=6543"}],"version-history":[{"count":1,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6543\/revisions"}],"predecessor-version":[{"id":6546,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6543\/revisions\/6546"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/6545"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=6543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=6543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=6543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}