About Me

Falling DownMy name is Paolo Passeri, and I was born 44 (sigh!) years ago in Senigallia, a charming town on the Adriatic coast (County of Le Marche) known for its Velvet Beach. After graduating in (astro)physics from the University of Milan, I moved to Rome and began to cut my teeth on networks and security in Matisse SPA and later in Telindus.

I have been working steadily on computer security industry for more than 15 years. Currently I am a Principal Sales Engineer at OpenDNS (now part of Cisco).

After a youth spent fiddling with a ZX Spectrum (16K), the real attraction for networking (and later for security) would break out after many years, in a completely random manner, when I was studying black holes (we were talking about attraction, weren’t we?) at CNR (National Research Council) of Milan. With great surprise I discovered to be more attracted by the animated S of the Mosaic browser, used without any knowledge to browse the catalogs of the Hubble telescope, rather than by black holes and neutron stars that I should have studied.

View Paolo Passeri's LinkedIn profile View my LinkedIn profile


85 thoughts on “About Me

  • August 12, 2011 at 5:59 am
    Permalink

    Hello,

    Thanks for the nice work (one-year-of-android-malware-full-list)!
    By the way, the ZX Spectrum was part of my beginnings with such devices as well.
    Greetings from Japan.

    Reply
  • April 4, 2012 at 11:08 pm
    Permalink

    Nice to know about you.. I am the one whos running hackread.com. Good to know you 🙂

    Reply
    • April 4, 2012 at 11:10 pm
      Permalink

      Nice to meet you, you have become one of my preferred sources for the timelines! 🙂

      Reply
  • May 2, 2012 at 3:34 pm
    Permalink

    Hello Paolo
    Thank you very much for your posts, ideas and contribution with the timeline.
    Im enjoying this site more and more day after day :).Keep up the great work.

    Reply
  • July 5, 2012 at 5:50 pm
    Permalink

    I appreciate your aggregation of infosec information; informative and interesting. Thanks!

    Reply
  • July 13, 2012 at 4:55 am
    Permalink

    Hi Paolo.
    Thank your posts.
    Geetings from Ecuador

    Reply
  • August 26, 2012 at 9:11 am
    Permalink

    add flattr buttons to ur articles pls, also nice monthly statistics. love it!

    Reply
  • November 28, 2012 at 10:29 am
    Permalink

    Man you are doing a great work, amazing work you know….

    Reply
  • February 5, 2013 at 11:02 pm
    Permalink

    Hi Paolo

    Just to let you know that I now officially use your blog as my primary source of information for my monthly rapport. If you want to know more email me as I can’t openly disclose much

    Reply
  • April 4, 2013 at 6:44 pm
    Permalink

    I’d like to useone of your charts in a paper that I’m writing. How can i request permission to use it? it’s the infographic on notable cyber attacks against aviation industry.

    Reply
    • April 16, 2013 at 5:48 pm
      Permalink

      Hi Paolo,i am doing a masters project in digital forensic,how can i get the da ta that was used to derive the daily trend of attacks graph, i need for my research.

      Thank you

      Reply
  • May 9, 2013 at 6:00 pm
    Permalink

    Hi Paolo,
    I just realized who is the author of this blog, and not only want to thank you for this bright idea you’ve built and grown. I am also surprised to see how close you are! Have been working with Business-E for a while as I have been in a major Telco SOC managing SIEM and Trendmicro solutions for which Business-E was reseller and trainer.

    Nice to see how a simple but focused project can be so effective!

    Really awesome work!

    Cheers,
    regards,
    Fabrizio

    Reply
  • August 22, 2013 at 12:06 am
    Permalink

    Hi
    I’m a student of university of Liverpool and I’m now working on my dissertation about hacktivism. I’m really like your work. it’s very helpful.Is there any possible you can tell me how you get those data? And is these data accurate and complete?and can I use these data in my work?

    Reply
    • August 22, 2013 at 10:35 am
      Permalink

      Hi Leon,
      the source of the data of the timelines are reported at the bottom of each timeline. The source of the stats are the corresponding timelines. I guess the data is accurate since I rigorously quote the source. Of course it cannot be complete since (I clearly state this), however hopefully indicative of the Cyber Landscape. You can do whatever you want provided you quote the source 🙂 If you also want I will be glad to share the raw data.

      Reply
      • August 22, 2013 at 11:01 pm
        Permalink

        Hi,
        I‘’m glad that you replied so quickly, thank you for share the raw data with me it would be very helpful. here is my e-mail address :[email protected]
        thank you again.

        Reply
  • August 23, 2013 at 10:07 pm
    Permalink

    Paola, Wonderful blog and a fantastic source of information. I am working on a college paper for my information security class and wanted to do a deep dive analysis on some of the data you have collected. Based on the conversations above and in your blog you are very generous in sharing your data. I wanted to request a copy of the raw data if possible. I will be sure to properly quote you as the source and reference the blog for all instances the data is used. my e-mail is [email protected]. Thanks!

    Reply
  • September 5, 2013 at 11:29 am
    Permalink

    Awesome stuff thank you

    Reply
  • September 20, 2013 at 4:33 pm
    Permalink

    Hi Paolo,
    Great site – it came recommended in a presentation I attended recently. By any chance is the timeline available in clear text (as opposed to an image) anywhere? I ask because I’d love to setup a Google alert for whenever my industry ever shows up in the timeline.

    Reply
  • October 3, 2013 at 7:22 pm
    Permalink

    Love your site and appreciate the metrics!!! Keep movn’!

    Reply
  • October 19, 2013 at 9:56 pm
    Permalink

    Thank you for compiling this critical data regarding cyber attacks. Is there anywhere I can get access to this data in a spreadsheet format to attempt to perform some statistical analysis?

    Thank you,

    Joe Yacura

    Reply
  • January 16, 2014 at 2:27 pm
    Permalink

    Thanks for your excellent information on Infosec and cyber attack time line, I am your regular reader and use your data in many of my cyber security conference presentations and always acknowledge you in my presentation slides. .. Regards .. Abbas Kudrati.. from Kuwait and Melbourne

    Reply
  • February 4, 2014 at 4:56 pm
    Permalink

    Thanks for great Info. I would like to establish contact and talk about our work at ENISA (ENISA Threat Landscape). Would be great if you could contact me per mail. Thanks, Louis

    Reply
  • February 7, 2014 at 2:02 pm
    Permalink

    Hello Paolo, I would like to join those who very much appreciate your work. I have the same wish like many others – is it possible to get data in a spredsheet ? And the rest of the last year Sep – Dec 2013 ? I would like to make analyses of attacks to special business sector. Looking forward to your answer to my email.

    Reply
  • February 10, 2014 at 6:05 am
    Permalink

    Great site. As a researcher, I found your timeline fantastic. If I could offer one suggestion, would it be possible to make searches based upon suspected country of origin/country attacked, victim/suspected attacker? I tried to use the search bar, but, alas, I must not be that clever.

    Keep up the outstanding work.

    Reply
    • February 15, 2014 at 1:37 am
      Permalink

      Thanks! If you want I can give the raw data from where you can easily query the countries.

      Reply
  • February 11, 2014 at 1:18 pm
    Permalink

    Paolo:

    We are publishing a report on defense and security trends and would like to cite you as a source on cyber attacks. I was hoping to get the source data for 2012 and 2013 in whatever format you have available. Basically our report breaks down countries into four categories so I would like to do the same with your data. Please see my email in the details of this post. I am happy to provide you with a copy of last year’s report. Of course, your data would be properly sourced to you and this website.

    Please let me know if I can get a copy. Feel free to email me with any questions!

    Regards,

    Bud Roth

    Reply
    • February 15, 2014 at 1:38 am
      Permalink

      Apologies for my delay. I just sent you the link of the repository with the raw data.

      Paolo.

      Reply
  • February 17, 2014 at 12:28 pm
    Permalink

    First of all many many thanks for your work.
    Then a request 😉
    Have you got or can you point me to statistical data about cybercrime in Italy (es Polizia Postale data on ransomware, identity theft and so on)?
    I’ve searched on italian law enforcement sites with no success 🙁

    Reply
    • April 9, 2014 at 10:30 pm
      Permalink

      Try to have a look the yearly report of Clusit. You can request a copy from Clusit website (www.clusit.it).

      Reply
  • April 9, 2014 at 10:18 pm
    Permalink

    Hi Paolo,

    I am putting an internal slide deck with a slide on web attacks and I really like your monthly graphics. I would like to use your data for the last few years to show the trend. I will add you as source for people to come to your site. Can you give me access to the raw data?

    Thanks!
    Emilio.

    Reply
  • June 3, 2014 at 9:01 pm
    Permalink

    Hi! I am working on an undergraduate thesis and am having an incredibly hard time finding statistics that show cyberattack trends over the last couple of years. Your site is very helpful however i was wondering how you acquire your statistics? Would love to use you as a source but i am not sure i can. Also do you think there is a lack of information released regarding state sponsored cyber attacks? Or lack of information regarding successful breaches in government systems? If you could maybe point me to some useful sources that would be awesome. My thesis is due tomorrow so i am really trying to beef up my statistics as that is the part i am noticeably lacking in

    Reply
    • June 3, 2014 at 10:19 pm
      Permalink

      Dear Marissa, the stats are taken from the timelines that I publish (almost) on a bi-weekly basis. On the bottom of each timelines the source are reported. I collect each month the most remarkable attacks according to me. However you could try to have a look to datalossdb.org and hacksufer.com.

      Good Luck!

      Reply
  • August 8, 2014 at 11:27 am
    Permalink

    Dear Paolo,
    Excellent work!
    I am interested in analyzing the raw data.
    Would it be possible to get a link to the raw data?
    Thanks!
    –Theodoor

    Reply
  • August 17, 2014 at 3:46 pm
    Permalink

    Dear Paolo
    Thank you so much for sharing those impressive information.
    Ali

    Reply
  • October 14, 2014 at 10:13 am
    Permalink

    Hello Paolo,
    Your work is really really interesting! Would it be possible to have a look at your raw data for my theses please? I sent you an email at [email protected].

    Reply
  • October 21, 2014 at 3:41 pm
    Permalink

    Was looking for a way to contact you offline, but change the date on your last entry… it’s still 2014.

    Reply
  • November 25, 2014 at 4:35 am
    Permalink

    Dear Paolo,
    You have done great job, absolutely outstanding! Thank you very much. I just want to download your data in spreadsheet like in csv format or any format for analysis purposes. I’m a PhD student at Sheffield Hallam universtiy in cyber security. I would appreciate if can get access to your raw data. Again thanks for your amazing work.

    Best wishes.

    Sina.

    Reply
    • November 25, 2014 at 9:50 pm
      Permalink

      Sina,

      apologies for my delay. I have replied you separately. I just noticed I have your gmail address. I will give you immediate access.

      Regards.

      Paolo.

      Reply
  • Pingback: November Events Summary | LBD

  • January 7, 2015 at 9:58 pm
    Permalink

    Dear Paolo,

    Amazing and super fascinating work! Thank you, so much for publishing this. I’m working on a project trying to understand the shift in the type of cyber attacks over time. If you could share the link to the raw historical data in .csv or similar format, that would be very much appreciated. My email is timpj(at)stanford[dot]com.

    Thanks!

    Best regards,
    Tim

    Reply
  • January 9, 2015 at 11:30 am
    Permalink

    Excellent ressources! Is there a way to search cyber attacks for a specific country ?

    Reply
    • January 10, 2015 at 12:07 pm
      Permalink

      I can give you access to the repository containing the raw data in XLS format. From there is much easier to look for attacks targeting a specific country.

      Reply
  • January 30, 2015 at 3:57 pm
    Permalink

    Paolo,

    Could you please send me the raw data of cyber attacks? This definitely pertains to my field and it may greatly assist my team!

    Reply
  • February 3, 2015 at 12:37 am
    Permalink

    Hi Paolo, i am very appreciate for your working… Could you send me the raw data of cyber attacks so that I can filter for a specific attack category? If you do, I will be very appreciate.

    Regards,
    Summer Tong

    Reply
  • February 17, 2015 at 5:29 pm
    Permalink

    Hi Paolo,
    Thank you very much for your time and dedication to security. If possible, I would like to request the raw data. I am a doctoral student focused on data breaches and cyber attacks, and this would be very helpful for my research. Thanks in advance.

    Best,
    Bill

    Reply
  • February 24, 2015 at 6:47 am
    Permalink

    Hello Paulo,

    I admire your work and assess it very high. I am a PhD student at the University of Shumen and deal with the problems of computer security. As many other colleagues, I would like to ask whether it is possible to using your data for my dissertation and use your raw data? I would be very grateful and will be happy if I can and I can help with something.

    Reply
  • March 8, 2015 at 3:28 pm
    Permalink

    Hi Paolo,

    Very nice website, and I like the monthly update on cyber attacks. I have one important question however. In the field ‘Attack Techniques’, most of which are understandable as the methods with which attackers broke the security (eg, SQL for data leakage, MITM to hack communications), you list ‘Defacement’ as an attack technique. Perhaps I am missing something, but although this may have been the purpose of an attack, I can’t see it as the technique for the attack itself. Although the purpose of the attack is important to know, you seem to cover these in another of your analyses (Motivations behind attacks). I wonder if you could explain, is there a reason to include ‘Defacement’ as a category here?

    Keep up the hard work. Thanks,

    Mustafa

    Reply
    • March 13, 2015 at 7:33 am
      Permalink

      Mustafa, your are right. Unfortunately it is an approximation, since in many case the source does not provide the underlying reason but just the effect. If you have any idea is well accepted.

      Reply
      • March 15, 2015 at 4:59 pm
        Permalink

        Paolo, thanks for replying. My opinion is that if the effect is unknown, it should be categorised under ‘unknown’. This is to maintain consistency in all categories, since you already have motivations in other data you produce, and the current method mixes the technique and effect together. But that is just my opinion, I still think its a great resource.

        Thanks,

        Mustafa

        Reply
  • April 1, 2015 at 3:19 pm
    Permalink

    Hi Paolo,

    I am very much enjoying the data available on your website, some of which is useful for a project we are currently working on. Do you happen to have any graphs or statistics which cover the evolution of cyber attacks over the last 25 (or longer) years?

    Keep up the good work!

    Cheers,

    Iwan

    Reply
  • April 23, 2015 at 6:44 pm
    Permalink

    Hi Paolo,

    This work is fantastic. Would it be possible for you to provide the raw data of cyber attacks? I would like to do further analysis on the attack category, target, and region.

    Thanks,

    Mike

    Reply
  • April 30, 2015 at 3:49 am
    Permalink

    thanks a lot, it’s really great work, Would it be possible to have the raw data 2011-2015 for my theses please, because I want to look for a specific country.

    Reply
  • May 1, 2015 at 1:14 am
    Permalink

    Not sure if this is intentional or not, but you posted on your January timeline that Pay Ivy .com was compromised and 10,000 passwords were dump in plain text. There are no proof to back this up. PayIvy didn’t even have 10,000 users back in January 2015 and any business with some common sense wouldn’t put password in plain text. Also there is no proof whatsoever this has ever happened. I would advice you to check and verify your sources before publishing them.

    Reply
  • May 5, 2015 at 5:36 pm
    Permalink

    Hi Paolo,

    Forgive me if you’ve seen this post twice. I’m right now doing a report on remote access Trojans. It would be great to get some new information and include you as an expert in our report. Would you be interested in discussing further? If so, how could I reach you?

    Reply
  • May 14, 2015 at 5:44 pm
    Permalink

    This is great information and thank you for providing. However, do you happen to have the aggregated quarterly or annual statistics, as opposed monthly?

    Reply
    • May 27, 2015 at 5:14 am
      Permalink

      I can give you the raw data from where you can derive the needed information, i just need a gmail address.

      Reply
  • May 20, 2015 at 2:35 am
    Permalink

    Incredible job ! Congratulations on your research and patience. It is impossible to find similar information as on your site!

    Reply
  • May 22, 2015 at 7:45 pm
    Permalink

    Hi Paolo,

    I think you work is amazing, and thank you for you time and dedication of this project. Actually i´m working in a security threats and incidents reports, i would like to know if you could share me your raw data?
    My Email address is [email protected]

    Keep up on this amazing work!!!!

    Reply
  • June 25, 2015 at 10:18 am
    Permalink

    Hi Paolo,
    Your work is amazing! IEveryday i am looking for hackmageddon. I have a question: whats with the Hacks of June? I’m missing them…

    Reply
    • June 25, 2015 at 2:06 pm
      Permalink

      Unfortunately I am late this month, I am working on it though. The stats be available early next week.

      Paolo.

      Reply
  • July 4, 2015 at 3:53 am
    Permalink

    Hello, my name is Dillon. First, I’d like to applaud you on your work. From all my searches you have the most comprehensive listing of cyber incidents that I have seen. Second, I am a student at the University of Pittsburgh’s Graduate School of Public and International Affairs. We are currently working on an online searchable cyber attacks database (not dissimilar from the Global Terrorism Database if you’re familiar) and I was wondering if we could use your data? You would obviously receive the credit and I would personally make sure your name and website are published to our database. It would definitely be a huge help!

    Best,
    Dillon

    Reply
    • July 4, 2015 at 8:40 pm
      Permalink

      Dillon, no problem. I am sending you the link with the share. A credit is highly appreciated.

      Reply
  • August 4, 2015 at 11:00 am
    Permalink

    Hello!
    Your work is fantastic. is there any possibility to gain access to your raw data?

    thanks you!

    Reply
  • August 17, 2015 at 9:01 pm
    Permalink

    Paolo,

    Great work on the data! The dedication is fantastic. Is there anyway I can get a link to the complete raw data?

    Thanks,
    Jack

    Reply
  • September 23, 2015 at 8:36 am
    Permalink

    Dear Paolo,
    What a great website!
    Currently I’m writing my master thesis, topic/ question: is there a relation between cyber threat actors, their intentions and ways of attack?

    Could you be so kind to sent me some recent raw data? I’m also wondering if you’ve got a list with common attack tools (like DDoS/ SQL etc.), and are willing to share that as well?
    Thank you in advance. I’m looking forward to your e-mail.

    My e-mailadres: [email protected].

    Best, Peter

    Reply
  • October 29, 2015 at 1:39 pm
    Permalink

    Dear Paolo,

    I am a researcher in cyber attacks and social networks. I am trying to find hints of cyber attacks on social networks. It will be great if you could share your raw data with me. I will certainly cite your website in our work.

    Please keep up the nice work.

    Reply
  • November 7, 2015 at 8:25 am
    Permalink

    Hey Paolo,
    This is an amazing resource.
    The Boss

    Reply
  • December 11, 2015 at 6:05 pm
    Permalink

    Paolo,

    I am currently a masters student at American University and I am working on a statistics project in which I would love to use your data. While I can certainly compile it by going through each month and downloading what you have, I would greatly appreciate if you would be willing to send me the raw data. If not I still want to say thank you for the fantastic resource!

    Reply
    • December 20, 2015 at 4:26 pm
      Permalink

      I sent you an email with the information I need to give you access.

      Reply
  • January 15, 2016 at 1:20 pm
    Permalink

    Hi Paolo,

    Thanks for the amazing resource. I’m doing some work in which I’d like to use your data, but haven’t found consistent links to the spreadsheets. As with Rebecca, I can go through each month and download what you have, but it would be very useful to have access to the raw data. If that’s not possible, the resource is still extremely useful, so thanks!

    Reply
    • January 15, 2016 at 9:13 pm
      Permalink

      You need a gmail address!

      Reply
  • January 22, 2016 at 11:48 am
    Permalink

    Hi Paolo,
    thank you again for your great work. I was wondering if you could send me too your raw data. I would really appreciate it and it would be very useful for my ongoing research on cybercrime and cybersecurity.
    Thank you again
    Luca

    Reply
  • February 24, 2016 at 9:44 am
    Permalink

    Hello Sir,

    Myself Pooja from India working as a faculty member in college in computer dept.As I m interested in cyber crime analysis and doing research in cyber crime analysis .While searching different sites today I come to know about ur site it is very interesting and informative Would it be possible for you to provide the raw data of cyber attacks? I would like to do further analysis on the attack category.My mail id is [email protected]

    Thanks,

    Reply
  • February 24, 2016 at 6:19 pm
    Permalink

    Hello, is there a process to request permission to use some of your graphic tables in an educational setting (with copies distributed)? Thanks!

    Reply
  • February 28, 2016 at 7:45 pm
    Permalink

    Hi Paolo,

    Thank you for the useful resource. I am an undergraduate student writing a research project on cyber terrorism. Is there any chance you can send me the raw data of your timelines in excel format? That would be a huge help.

    Thank you,
    Sam

    Reply

Leave a Reply

%d bloggers like this: