Great news! With this article, I have decided to change the timeline, moving from a static infographic-style format, to a tabular format, which allows to sort, filter and search for specific items inside the timeline.... Read More
In information security, raw data is an important piece of information to understand the threat landscape, however it must be opportunely correlated to create value added.... Read More
It’s time for the first timeline of May, reporting the main cyber attacks occurred between 1 and 15 May 2015.
The Summer is at the gates, but apparently the nice weather is not stopping the attackers from their intentions: I have recorded 52 attacks, a dramatic turnaround in comparison with April, and a strong indication that the slowing trend of the past couple of months has suffered a sudden stop.