I have been working in the information security arena for the last 20 years. After Lastline (now VMWare), and Cisco (through the acquisition of OpenDNS), I am now a Senior Sales Engineer and a Cyber Intelligence Principal in Netskope.

I started this project in 2011, when every day started with a new attack by the anonymous. I was inspired by a Thomson Reuters chart, which is no longer available, but can still be found in my original post of that time.

Ever since I am patiently collecting the main cyber attacks (according to my personal judgement) in timelines published on a bi-weekly basis (sometime I am not able to publish them in a timely manner, but for me this is just a very time-consuming hobby). I have been changing the format of the timelines over the years to make them consumable in a better fashion, while storing the raw data for the historical memory.

Yes the raw data, since 2011, it is available for any requester. Just drop me an email at [email protected] and I will be happy to share it! You can use the data as you need, and I ask only you the favor to quote the source (and please don’t do like some Italian folks in the past who did publications without quoting the source).

Also I would appreciate if you can share the blog across the community, and if you want to connect, my social profiles are below:

Stay safe!

View Paolo Passeri's LinkedIn profile View my LinkedIn profile

This Post Has 120 Comments

  1. Yi Wu

    Dear Paolo,
    I am a graduate student. I want to do some research on network security risks. Your data is great and important for my graduation thesis. Can I have the honor to get your original data? Thank you very much!

    1. Paolo Passeri

      Sure thing! Please send me a gmail address to [email protected] and I will give you access to the data. Thanks! Paolo.

  2. yasir burney

    Hello Paolo,
    You are doing a great work mate. I emailed you asking about raw data for 2020 stats. Please check and reply.
    Thanks

    1. Paolo Passeri

      Yasir, I tried to email you but the message was rejected. Please provide me with a gmail address and I will give you access to the data.

      1. yasir burney

        Dear Paolo,
        i emailed you my gmail address. please check and thank you very much.

  3. yasir burney

    Dear Paolo,
    I’m doing Phd in cyber security and your dataset is the best one the internet. I want to use it for one of my project of CTI prediction and if you send me raw data file that will be very helpful to me. I’d already sent an email to you yesterday so if you kindly sent it asap I’ll be very grateful to you.

  4. Peter von Bodelschwingh

    Dear Paolo,
    thanks for providing these amazing statistics. I study software engineering in the netherlands and we are currently writing a research paper about cyber attacks. We are looking for events that trigger a rise of these attacks. May I ask you to provide the raw data to me (as CSV for example)? I am sure it would help a lot! Thank you in advance!

  5. Amal T R

    Hi Paolo,
    I am doing an ML project on cyber threat intel, your data seems to be good for my work. Would you mind sending me the raw data, or access to a database that you may have? Please let me know if there’s any more info you need from me.
    Thank you so much,
    Amal

  6. Ankita Thakkar

    Hi Paolo,

    I am doing my PhD research on attack predictions. And I found your data best for training.
    I was wondering if you had aggregated data for year 2015 and 2016. I will be of much help. Thanks!

  7. Ray Marie Tischio

    Hi Paolo,
    This is a wonderful resource that I am so glad to have come across. I am an undergraduate student writing my thesis on cyberwarfare and its impacts on bilateral nation-state relationships and the world order. Would you mind sending me the raw data, or access to a database that you may have? Any raw data would be an amazing help. Of course, I will cite your resource! Please let me know if there’s any more info you need from me.
    Thank you so much,
    Ray

    1. Paolo Passeri

      Please provide me with a gmail address and I will grant you access. Feel free to send it to [email protected].

      Thanks.

      Paolo.

  8. Hwai Liang

    Hi Paulo,
    Greetings from Singapore. Found your detailed information presented in a visually attractive design. May I use your graphics with your kind permission? I will quote your source.

    Hwai Liang

    1. Paolo Passeri

      Hi Hwai Liang,

      Sure thing! Feel free to use whatever you need. Thanks for asking.

      Cheers,

      Paolo

  9. Margaret

    Hi Paolo, great work! One question please – where do you get your data from? Not trying to duplicate your efforts, just trying to understand where this data is coming from.

  10. Brady Aiello

    Hi Paolo, I’m wondering if you have a database with all this information? I’m hoping to be able to do fast analytical queries using cyber attack data.

    1. Paolo Passeri

      Sure send me a valid gmail address to [email protected] and I will give you access.

  11. Justin Lister

    Excellent work – some suggestions/corrections

    1/ Cyber Attacks Timeline Page Drop-down – only includes 2011 – 2015

    2/ 2017 Timeline Google Doc Links missing or pointing to wrong data set

    16-28 Feb – http://www.hackmageddon.com/2017/03/13/16-28-february-cyber-attacks-timeline/
    Missing Doc Link (image only)

    16-31 Mar 2017 http://www.hackmageddon.com/2017/05/03/16-31-march-2017-cyber-attacks-timeline/
    Links to 1-15 Mar 2017 data https://docs.google.com/spreadsheets/d/1lLqxWSNySufKFBA_jO6FR_aMNnrakJZDoyVFpVUyqCk/edit?usp=sharing

    1-15 May 2017 http://www.hackmageddon.com/2017/06/14/1-15-may-2017-cyber-attacks-timeline/
    Link is to 1-15 Mar 2017 data https://docs.google.com/spreadsheets/d/1lLqxWSNySufKFBA_jO6FR_aMNnrakJZDoyVFpVUyqCk/edit?usp=sharing

    3/ Industry Categorisation – may want to use the International Standard for Industrial Classification (ISICv4)

    https://en.wikipedia.org/wiki/International_Standard_Industrial_Classification
    https://unstats.un.org/unsd/cr/registry/isic-4.asp

    E.g. 2017 YTD (excluding the missing Feb/Mar & May)

    Grp Category Total
    B Mining and quarrying 1
    C Manufacturing 12
    D Electricity gas steam and air conditioning supply 5
    E Water supply; sewerage waste management and remediation activities 1
    G Wholesale and retail trade; repair of motor vehicles and motorcycles 11
    H Transportation and storage 3
    I Accommodation and food service activities 13
    J Information and communication 55
    K Financial and insurance activities 29
    L Real estate activities 1
    M Professional scientific and technical activities 4
    N Administrative and support service activities 2
    O Public administration and defence; compulsory social security 9
    P Education 25
    Q Human health and social work activities 28
    R Arts entertainment and recreation 22
    S Other service activities 9
    U Activities of extraterritorial organizations and bodies 54
    X Individual 85
    Y Multiple Industries 37
    Z Unknown 3

    1. Paolo Passeri

      Thanks Justin, I will fix the link ASAP. Starting from the timelines of 2018 I will adopt the classification you suggested. Great Advice!

  12. Arush

    Hey, i am amazed with the post for cyber attacks visible on your web page ever 15 days. But from past 1 month the updates aren’t on time . May i know the reason ?

    1. Paolo Passeri

      The reason is just time. This is a best effort project 🙂 Few hours more and I will start the post the new ones…

      1. Arush

        Sure, but i need for May month by today or tomorrow EOD as i am regular follower of your updates and need every time for presentation purposes.

        1. AndreC

          @Arush Heuh ? if you NEED something you should get a payed service or assemble the report yourself. A big Thank You to Paolo for his effort would be a better reply.

  13. Fabio Latrofa

    Dear Paolo,
    I would like to use some of your data in my presentations. Obviously I will quote the source.
    Is it possible?

    1. Paolo Passeri

      Sure you can!

  14. Charles Martineau

    Dear Paolo,
    Like many people who have requested, could I also have your raw data? I am a Phd Student in Finance and for future work I would like to research the impact of cyber attacks on firms’ capital budgeting and corporate decision. Your site is fantastic and having your data would represent a big plus. Thank you Paolo

  15. Vinny Sakore

    Paolo,
    Are we free to use your graphics in presentations and other materials? We will reference the report of course. Please let me know.

    Vinny

  16. Julia

    Hello, I too am doing some research for a masters certificate with University of California. I was hoping that I could also gain access or receive an export in excel format of the entire timeline (from 2011 – present).

    I have also emailed view the [email protected] but have not received a response, so I thought I would try here as well.

  17. ANDREA

    Hi Paolo, I discovered your website few days ago. I would like to congratulate first of all. I kindly request if you have relevant data regarding Maritime Cyber Security breach that could be useful to take some decison on the matter in the short future. Thanks .

  18. Santiago

    Hi Paolo, fist of all I would like to congratulate you for this great effort and dedication very few people have in gathering, classifying and presenting in a very user friendly the information. Im doing an investigation regarding Cyber Risk and Resilience and doing the research found your page/blog. Could you PLEASE share with me your raw data for my investigation? Obviously quote and link the source!! Thanks in advance, and please keep the GREAT work! no much sites with this valuable information.

  19. Sam

    Hi Paolo,

    Thank you for the useful resource. I am an undergraduate student writing a research project on cyber terrorism. Is there any chance you can send me the raw data of your timelines in excel format? That would be a huge help.

    Thank you,
    Sam

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.