I have decided to create a new timeline tracking the high-impact vulnerabilities targeting both remote access technologies and internet-facing servers, and exploited by cyber criminals to implant ransomware or, even worse, to accumulate compromised credentials to sell in the flourishing market of the initial access brokers.

I called it the perfect storm, since there might have been no worse period for these vulnerabilities to be exploited since, after the pandemic, remote access technologies such as VPN concentrators, are playing a fundamental role to let the distributed workforce access the internal resources, in many cases not conceived to be exposed directly in the internet.

Expand for details

Enjoy the interactive timeline, and thanks for sharing it, and supporting my work in spreading the risk awareness across the community. Also, don’t forget to follow @paulsparrows on Twitter, or even connect on Linkedin, for the latest updates.

BREACHES
POPULAR POSTS
  • May 2022 Featured ImageMay 2022 Cyber Attack Statistics

    After the corresponding cyber attacks timelines, it’s time to publish the statistics of May 2022 once again, unsurprisingly, characterized by...

  • Photo by Philipp Katzenberger on Unsplash16-31 May 2022 Cyber Attacks Timeline

    The second timeline of May 2022 is out. In the second half of the month I collected 120 events, corresponding to an average of 7.50 events/day, an important...

  • 2021 Cyber Attacks Statistics

    And finally I have aggregated all the data collected in 2021 from the cyber attacks timelines. In the past year I have collected 2539 events, meaning...

  • The Biggest Data Breaches of 2021

    With this new project I am going to track the biggest data breaches of 2021 extracted from my cyber attack timelines.

  • 2020 Cyber Attacks Statistics

    As promised, I have pulled together some statistics from the data collected in 2020. The master table is available at the end of the post after the charts.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.