August 2015 Cyber Attacks Statistics
It's time to publish the statistics derived from the August 2015 Cyber Attacks Timeline (Part I and Part II). As…
It's time to publish the statistics derived from the August 2015 Cyber Attacks Timeline (Part I and Part II). As…
It's time to publish the statistics derived from the July Cyber Attacks Timelines (part I and part II). As usual…
It's time to aggregate the data collected from the Cyber Attacks Timelines of June (part I and part II) into…
In a previous post entitled "The Importance of Data (Part I)" we have shown several charts built using the data collected from Hackmageddon. Inside…
It's time to aggregate the two timelines of May 2015 (Part I and Part II) into statistics. Nothing new for…
In information security, raw data is an important piece of information to understand the threat landscape, however it must be opportunely correlated to…
It is time for the report of the cyber landscape of the second half of November.
This month will be probably remembered for the discovery of the giant breach targeting Cupid Media and involving potentially 42 million users. However, this was not the only remarkable breach of November: chronicles report of 77,000 customers of Vodafone Island having their details leaked.
Other interesting events involve a brute-force attack to GitHub, forcing several users to change password, and yet another attack against a Bitcoin Wallet (the equivalent of $1 million stole).
Not only Cyber Criminals. Even Hacktivists were particularly active in this period: the attacks of Indonesian hackers against Australian targets continued in the second part of November, as also the mutual defacements between Pakistani and Indian crews. Last but not least, the Anonymous leaked some documents and emails allegedly belonging to the Italian Governor of Lombardy and the details of 40,000 individuals from an Israeli Job search portal.
As usual, if you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012 and now 2013 (regularly updated). You may also want to have a look at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.
Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).
It is time to summarize the data collected into the January 2015 Cyber Attacks timelines (Part I and Part II)…
As an ideal follow-up of my old post A (Graphical) World of Botnets and Cyber Attacks, I would like to mention a…
Here we go with the aggregated statistics extracted from the Cyber Attacks Timelines of February 2015 (Part I and Part…