I have decided to create a new timeline tracking the high-impact vulnerabilities targeting both remote access technologies and internet-facing servers, and exploited by cyber criminals to implant ransomware or, even worse, to accumulate compromised credentials to sell in the flourishing market of the initial access brokers.
I called it the perfect storm, since there might have been no worse period for these vulnerabilities to be exploited since, after the pandemic, remote access technologies such as VPN concentrators, are playing a fundamental role to let the distributed workforce access the internal resources, in many cases not conceived to be exposed directly in the internet.
Expand for details
Enjoy the interactive timeline, and thanks for sharing it, and supporting my work in spreading the risk awareness across the community. Also, don’t forget to follow @paulsparrows on Twitter, or even connect on Linkedin, for the latest updates.
May 2022 Cyber Attack Statistics
After the corresponding cyber attacks timelines, it’s time to publish the statistics of May 2022 once again, unsurprisingly, characterized by...
16-31 May 2022 Cyber Attacks Timeline
The second timeline of May 2022 is out. In the second half of the month I collected 120 events, corresponding to an average of 7.50 events/day, an important...
2021 Cyber Attacks Statistics
And finally I have aggregated all the data collected in 2021 from the cyber attacks timelines. In the past year I have collected 2539 events, meaning...
The Biggest Data Breaches of 2021
With this new project I am going to track the biggest data breaches of 2021 extracted from my cyber attack timelines.
2020 Cyber Attacks Statistics
As promised, I have pulled together some statistics from the data collected in 2020. The master table is available at the end of the post after the charts.