It’s time to publish the statistics derived from the cyber attack timelines of October (Part I and Part II): this month I have collected a total of 113 events, a slight increase compared with September, when I collected 106 events.Read more
I have decided to write a dedicated blog post with all the attacks recorded so far in 2018 and the related statistics (with interactive charts). Some charts are also compared with the corresponding stats in 2017. The timeline containing all the events, which I will try to keep updated on monthly basis.Read more
t’s time to publish the statistics derived from the cyber attack timelines of September (Part I and Part II), a month that shows a new uptick in term of number of events given that I collected 106 events against the 80 of August.
And as always, let’s start with the Daily Trend of Attacks chart, where…Read more
After the two timeline of August (Part I and Part II), it’s time to publish the corresponding statistics.
August has been a month with two faces, with a first half quite lazy, and a tail of events in the second half. In any case, all in all I have collected 80 events, which seem quite few compared to the 130 of July.Read more
I have just published the second timeline of July, and now I can finally post the statistics for the same month. Let’s start saying that this month was surprisingly rich in terms of events (I collected 130 records vs. 96 in June), maybe the crooks wanted to complete their home works before going to vacation.Read more
It’s time to publish the statistics related to the main cyber attacks occurred in June and derived from the twoRead more
It’s time to publish the statistics derived from the Cyber Attacks Timelines of May (Part I and Part II). Let’sRead more
It’s time to publish the statistics derived from the cyber attacks timelines of April (part I and part II). AsRead more
I have just publish the second timeline of March (the first is here), so I can now compile the statisticsRead more
Time flies, and finally I have found the time to publish the statistics derived from the cyber attacks timelines ofRead more