No Data Found
No Data Found
In the second timeline of July 2024 I collected 116 events (7.25 events/day) with a threat landscape dominated by malware with 27.7% ahead of targeted attacks (15.1%) and the exploitation of vulnerabilities (11.8%). It is interesting to notice the drop of ransomware (“only” at number four with 10.1%).
Cyber crime led the motivations with 66.7%, nearly eight points less than the previous timeline, when it was 74.3%, and once again ahead of cyber espionage up to 16.7% from 14.9% of the previous timeline. It is also interested to note the 5% of events characterized by hacktivism.
Besides these trends, as always the timeline is rich of interesting events, such as mega breaches, and attacks against organizations in the fintech space, so my final suggestion does not change.
Feel free to share it to support my work and spread the risk awareness across the community. And last but not least, don’t forget to follow @paulsparrows on X (formerly Twitter), or even connect on Linkedin, or Mastodon for the latest updates.
No Data Found
SUPPORT MY WORK!
MAKE A DONATION
Creating the timelines is a very time-consuming task.
Any little helps!
In the second timeline of May 2024 I collected 136 events (8.5 events/day) with a threat landscape dominated by...
In the first timeline of March 2024, I collected 98 events, once again characterized malware and ransomware attacks. State-sponsored threat actor were equally quite active, but the timeline also features some interesting events related to cyberwarfare.
I aggregated the statistics created from the cyber attacks timelines published in the first quarter of 2024. In this period, I collected a total of 833 events (9.15 events/day) dominated by Cyber Crime with 75.2%...
During April 2024 Cyber Crime continued to lead the Motivations with a value (73%) practically equal to March when it was 72.9%. Operations driven by Cyber Espionage ranked at number two with...
In the first half of May 2023 I collected 173 events (corresponding to 11.53 events/day), a value that confirms the sustained trend characterizing this year from an information security perspective.
Previous slide
Next slide