Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
  • Toggle website search
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
  • Toggle website search
Read more about the article 16-31 July 2023 Cyber Attacks Timeline
Image by Dee from Pixabay

16-31 July 2023 Cyber Attacks Timeline

  • Post author:Paolo Passeri
  • Post last modified:September 5, 2023
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:5 mins read
  • Post published:September 5, 2023

New victims of attacks carried out by the Clop (AKA Cl0p) ransomware gang exploiting the CVE-2023-34362 MOVEit vulnerability emerged even during...

Continue Reading16-31 July 2023 Cyber Attacks Timeline
Read more about the article Q2 2023 Cyber Attacks Statistics

Q2 2023 Cyber Attacks Statistics

  • Post author:Paolo Passeri
  • Post last modified:August 8, 2023
  • Post category:Cyber Attacks Statistics/Security
  • Post comments:1 Comment
  • Reading time:6 mins read
  • Post published:August 8, 2023

I have aggregated the statistics created from the cyber attacks timelines published in the second quarter of 2023. In total I have collected 1040 events...

Continue ReadingQ2 2023 Cyber Attacks Statistics
Read more about the article June 2023 Cyber Attacks Statistics

June 2023 Cyber Attacks Statistics

  • Post author:Paolo Passeri
  • Post last modified:August 3, 2023
  • Post category:Cyber Attacks Statistics/Security
  • Post comments:1 Comment
  • Reading time:7 mins read
  • Post published:August 3, 2023

After the cyber attacks timelines, it’s time to publish the statistics of June 2023 where I have collected and analyzed 354 events...

Continue ReadingJune 2023 Cyber Attacks Statistics
Read more about the article 1-15 January 2023 Cyber Attacks Timeline
Image by Pete Linforth from Pixabay

1-15 January 2023 Cyber Attacks Timeline

  • Post author:Paolo Passeri
  • Post last modified:February 3, 2023
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:5 mins read
  • Post published:January 31, 2023

Let’s kick off this infosec year with the first cyber attacks timeline for January 2023. In this fortnight I have collected...

Continue Reading1-15 January 2023 Cyber Attacks Timeline
Read more about the article 16-30 September 2022 Cyber Attacks Timeline
Image by Reto Scheiwiller from Pixabay

16-30 September 2022 Cyber Attacks Timeline

  • Post author:Paolo Passeri
  • Post last modified:November 23, 2022
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:4 mins read
  • Post published:October 28, 2022

Unsurprisingly, the level of cyber activity continued to be quite sustained even during the second half of September. In this timeline...

Continue Reading16-30 September 2022 Cyber Attacks Timeline
Read more about the article August 2021 Cyber Attacks Statistics

August 2021 Cyber Attacks Statistics

  • Post author:Paolo Passeri
  • Post last modified:February 10, 2022
  • Post category:Cyber Attacks Statistics/Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:October 12, 2021

During August 2021, I have collected 170 events that I can finally aggregate into (hopefully useful) statistics. This number represents a 10% decrease in comparison to the

Continue ReadingAugust 2021 Cyber Attacks Statistics
Read more about the article 16-31 May 2021 Cyber Attacks Timeline

16-31 May 2021 Cyber Attacks Timeline

  • Post author:Paolo Passeri
  • Post last modified:February 10, 2022
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:June 3, 2021

The second timeline of May is finally out confirming the decreasing trend (at least in terms of recorded events) that we have seen in the last few months. In fact, in this timeline I have collected...

Continue Reading16-31 May 2021 Cyber Attacks Timeline
Read more about the article 1-15 May 2021 Cyber Attacks Timeline

1-15 May 2021 Cyber Attacks Timeline

  • Post author:Paolo Passeri
  • Post last modified:February 10, 2022
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:May 19, 2021

The first timeline of May is out! In this timeline I have collected 89 events, with an average rate of 5.9 events per day, that’s...

Continue Reading1-15 May 2021 Cyber Attacks Timeline
Read more about the article 16-30 April 2021 Cyber Attacks Timeline

16-30 April 2021 Cyber Attacks Timeline

  • Post author:Paolo Passeri
  • Post last modified:February 10, 2022
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:May 5, 2021

The second timeline of April is finally out! In this timeline I have collected 123 events, with an average rate of 8 events per day. A daily value slightly higher than the previous timeline...

Continue Reading16-30 April 2021 Cyber Attacks Timeline

The Alphabet of Cyber Crime from APT to Zeus

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:9 mins read
  • Post published:February 24, 2012

If you need to know what Cyber Crime is but you are bored and fed up with the too many information security terms, loosing yourself among the acronyms, you have stumbled upon the correct place. I have just compiled a very special alphabet which collects the terms related to Cybercrime. Forgive me for some “poetic license” and enjoy this half-serious list.

A like APT

Yes, the Advanced Persistent Threats have been the undisputed  protagonists of 2011. An APT is essentially an attack carried on with different vectors, different stages and on a distributed time windows (yes, it Persistent). APT are behind the most remarkable events of 2011 such as the RSA Breach, Stuxnet, and so on…

B like Botnet

Botnet are networks of compromised machines that are used by cybercriminals to perpetrate their malicious action. Tipically a compromised machine becomes part of a botnet where the master distributes the commands from a C&C Server. Command may include the theft of information or the attack to other machines.

C like Crime-As-A-Service

The last frontier of Cybercrime: why developing costly malware if you can find a wide offer of customizable malware on the black market offering help desk and support services?

D like DLP

Data Leackage (or Lost) prevention is a suite of technologies that may help organization to counter the theft of information by preventing misuse or leak of data while they are in use at the endpoint (DIU), in transit on the network (DIM), or simply it is an aggregated Dark Matter on the corporate servers (DAR) that needs to be indexed and cataloged (and possibly classified and assessed).

(more…)

Like this:

Like Loading...

Continue ReadingThe Alphabet of Cyber Crime from APT to Zeus
  • 1
  • 2
  • Go to the next page

Subscribe

Enter your email address to subscribe and receive notifications of new posts by email.

Join 1,190 other subscribers
Copyright 2022 - HACKMAGEDDON.COM
 

Loading Comments...
 

    %d bloggers like this: