Leaky Buckets: a List of Cloud Misconfigurations
Cloud services are playing a crucial role to guarantee business continuity during this complicated period...
Cloud services are playing a crucial role to guarantee business continuity during this complicated period...
I have aggregated the statistics created from the cyber attacks timelines published in the second quarter of 2022. In total I collected...
The second cyber attacks timeline of July 2022 confirms the sustained level of activity. In this fortnight I have collected 139 entries, once again...
The first cyber attacks timeline of July 2022 shows a sharp increase in the number of events. In this fortnight I have collected 131 entries, which...
After the corresponding cyber attacks timelines, it’s time to publish the statistics of June 2022 where I have collected and analyzed...
And finally I can publish the second timeline of June 2022. In the second half of the month I collected 117 events, corresponding to...
The first timeline of June 2022 is out. In the first half of the month I collected 109 events, corresponding to an average of 7.27 events/day, in line with the sustained level of activity that is characterizing the latest months. And if...
After the corresponding cyber attacks timelines, it’s time to publish the statistics of May 2022 once again, unsurprisingly, characterized by...
The second timeline of May 2022 is out. In the second half of the month I collected 120 events, corresponding to an average of 7.50 events/day, an important...
The first timeline of May 2022 is out. In the first half of the month I collected 101 events, that is an average of 6.73 events/day. The level of activity, reflected by...