I have decided to create a new timeline tracking the high-impact vulnerabilities targeting both remote access technologies and internet-facing servers, and exploited by cyber criminals to implant ransomware or, even worse, to accumulate compromised credentials to sell in the flourishing market of the initial access brokers.

I called it the perfect storm, since there might have been no worse period for these vulnerabilities to be exploited since, after the pandemic, remote access technologies such as VPN concentrators, are playing a fundamental role to let the distributed workforce access the internal resources, in many cases not conceived to be exposed directly in the internet.

Expand for details

Enjoy the interactive timeline, and thanks for sharing it, and supporting my work in spreading the risk awareness across the community. Also, don’t forget to follow @paulsparrows on Twitter, or even connect on Linkedin, for the latest updates.

BREACHES
POPULAR POSTS
  • 1-15 September 2021 Cyber Attacks Timeline

    The Autumn has begun, and I can finally publish the first timeline of September 2021. Despite we are still far from the highest peaks of activity of this year, in this timeline...

  • August 2021 Cyber Attacks Statistics

    During August 2021, I have collected 170 events that I can finally aggregate into (hopefully useful) statistics. This number represents a 10% decrease in comparison to the

  • August 2016 Cyber Attacks Statistics

    It's time to publish the statistics derived from the cyber attacks timelines of August (Part I and Part II), a month particularly active from an Information Security perspective, despite the Summer time. As always, let’s start from the Daily Trend Chart ...

  • 2020 Cyber Attacks Statistics

    As promised, I have pulled together some statistics from the data collected in 2020. The master table is available at the end of the post after the charts.

  • The Biggest Data Breaches of 2021

    With this new project I am going to track the biggest data breaches of 2021 extracted from my cyber attack timelines.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.