It’s time to publish the statistics derived from the Cyber Attacks Timelines of February (part I and part II). In February I have collected 240 events, the largest number recorded over the last 12 months, caused primarily by the constantly growing number of ransomware attacks and the consequences of the Accellion zero day.
Once again, cyber crime leads the Motivations chart with 85.2% (it was 90% in January.) And similarly, malware continues to lead the Attack Techniques chart with 28.3% (it was 36.1% in January.) The Target Distribution chart shows a change: healthcare organizations jump at number one with 12.1% while campaigns against multiple targets plunge at number two with 11.3% (from 23.1%.)
The statistics are also available as an infographic.

16-31 July 2022 Cyber Attacks Timeline
The second cyber attacks timeline of July 2022 confirms the sustained level of activity. In this fortnight I have collected 139 entries, once again…

1-15 July 2022 Cyber Attacks Timeline
The first cyber attacks timeline of July 2022 shows a sharp increase in the number of events. In this fortnight I have collected 131 entries, which…

Q2 2022 Cyber Attacks Statistics
I have aggregated the statistics created from the cyber attacks timelines published in the second quarter of 2022. In total I collected…

June 2022 Cyber Attack Statistics
After the corresponding cyber attacks timelines, it’s time to publish the statistics of June 2022 where I have collected and analyzed…

16-30 June 2022 Cyber Attacks Timeline
And finally I can publish the second timeline of June 2022. In the second half of the month I collected 117 events, corresponding to…

1-15 June 2022 Cyber Attacks Timeline
The first timeline of June 2022 is out. In the first half of the month I collected 109 events, corresponding to an average of 7.27 events/day, in line with the sustained level of activity that is characterizing the latest months. And if…

Leaky Buckets in 2022
Similarly to what I have done in 2021, I am now collecting the incidents due to cloud misconfigurations and leading to the exposure of data.

Cloud-Native Threats in 2022
This blog post lists the main cloud-native threats, that is those cyber events exploiting the cloud in one or more stage of the kill chain. I have collected…

The Biggest Data Breaches of 2022
Similarly to what I have done in 2021, I am collecting all the mega breaches (with more than 1 million records leaked). The information is derived from the cyber attacks timelines…

January 2021 Cyber Attacks Statistics
It’s time to publish the cyber attacks statistics derived from the corresponding timelines that I have recently posted. In January I have collected 160 events…
As always bear in mind that the sample refers exclusively to the attacks included in my timelines, available from public sources such as blogs and news sites. Obviously the sample cannot be complete, but only aims to provide an high level overview of the threat landscape.
Finally, please support my work, sharing the content, and of course follow @paulsparrows on Twitter for the latest updates.

16-31 July 2022 Cyber Attacks Timeline
The second cyber attacks timeline of July 2022 confirms the sustained level of activity. In this fortnight I have collected 139 entries, once again…

1-15 July 2022 Cyber Attacks Timeline
The first cyber attacks timeline of July 2022 shows a sharp increase in the number of events. In this fortnight I have collected 131 entries, which…

Q2 2022 Cyber Attacks Statistics
I have aggregated the statistics created from the cyber attacks timelines published in the second quarter of 2022. In total I collected…

June 2022 Cyber Attack Statistics
After the corresponding cyber attacks timelines, it’s time to publish the statistics of June 2022 where I have collected and analyzed…

16-30 June 2022 Cyber Attacks Timeline
And finally I can publish the second timeline of June 2022. In the second half of the month I collected 117 events, corresponding to…

1-15 June 2022 Cyber Attacks Timeline
The first timeline of June 2022 is out. In the first half of the month I collected 109 events, corresponding to an average of 7.27 events/day, in line with the sustained level of activity that is characterizing the latest months. And if…

Leaky Buckets in 2022
Similarly to what I have done in 2021, I am now collecting the incidents due to cloud misconfigurations and leading to the exposure of data.

Cloud-Native Threats in 2022
This blog post lists the main cloud-native threats, that is those cyber events exploiting the cloud in one or more stage of the kill chain. I have collected…

The Biggest Data Breaches of 2022
Similarly to what I have done in 2021, I am collecting all the mega breaches (with more than 1 million records leaked). The information is derived from the cyber attacks timelines…

16-28 February 2021 Cyber Attacks Timeline
I can finally publish the second timeline of February, covering the main cyber attacks. What an incredible timeline! I have…

16-31 July 2022 Cyber Attacks Timeline
The second cyber attacks timeline of July 2022 confirms the sustained level of activity. In this fortnight I have collected 139 entries, once again…

1-15 July 2022 Cyber Attacks Timeline
The first cyber attacks timeline of July 2022 shows a sharp increase in the number of events. In this fortnight I have collected 131 entries, which…

Q2 2022 Cyber Attacks Statistics
I have aggregated the statistics created from the cyber attacks timelines published in the second quarter of 2022. In total I collected…

June 2022 Cyber Attack Statistics
After the corresponding cyber attacks timelines, it’s time to publish the statistics of June 2022 where I have collected and analyzed…

16-30 June 2022 Cyber Attacks Timeline
And finally I can publish the second timeline of June 2022. In the second half of the month I collected 117 events, corresponding to…

1-15 June 2022 Cyber Attacks Timeline
The first timeline of June 2022 is out. In the first half of the month I collected 109 events, corresponding to an average of 7.27 events/day, in line with the sustained level of activity that is characterizing the latest months. And if…

Leaky Buckets in 2022
Similarly to what I have done in 2021, I am now collecting the incidents due to cloud misconfigurations and leading to the exposure of data.

Cloud-Native Threats in 2022
This blog post lists the main cloud-native threats, that is those cyber events exploiting the cloud in one or more stage of the kill chain. I have collected…

The Biggest Data Breaches of 2022
Similarly to what I have done in 2021, I am collecting all the mega breaches (with more than 1 million records leaked). The information is derived from the cyber attacks timelines…

1-15 February 2021 Cyber Attacks Timeline
The first timeline of February is here! I am happy to introduce the “Breachometer”, a counter that measures how the current timeline stacks up with the values recorded in the previous 12 months.
16-31 July 2022 Cyber Attacks Timeline
The second cyber attacks timeline of July 2022 confirms the sustained level of activity. In this fortnight I have collected 139 entries, once again...
Leaky Buckets in 2022
Similarly to what I have done in 2021, I am now collecting the incidents due to cloud misconfigurations and leading to the exposure of data.
1-15 July 2022 Cyber Attacks Timeline
The first cyber attacks timeline of July 2022 shows a sharp increase in the number of events. In this fortnight I have collected 131 entries, which...
1-15 June 2022 Cyber Attacks Timeline
The first timeline of June 2022 is out. In the first half of the month I collected 109 events, corresponding to an average of 7.27 events/day, in line with the sustained level of activity that is characterizing the latest months. And if...
2020 Cyber Attacks Statistics
As promised, I have pulled together some statistics from the data collected in 2020. The master table is available at the end of the post after the charts.