Know the threats. Reduce your risk exposure. Be resilient.

Today’s global cyberattacks pose an increased threat to our daily lives with real-world, far-reaching consequences such as economic loss, social upheaval, and even political instability. As generative technology advances and the world becomes increasingly connected, timely detection of cyberattacks is the first step in protecting your networks, data, digital assets, and hybrid infrastructure from ruin. Get the tools and resources you need to understand how to protect your organization from cyberattacks and drive perpetual resilience with this year’s Global Threat Intelligence Report.

Top 5 most-attacked sectors

Technology, manufacturing, and transport/distribution remained in our top five most-attacked sectors, with critical infrastructure and supply chain remaining high-value targets. The public sector also made the biggest jump in the past year, moving from #6 to #4.

Top 5 most attacked sectors.png

Key findings from this year’s report

Cloud and SaaS attacks

Web based applications and desktop applications made up 70% of cyberattacks with a 45% and 25% attack-split to web vs application use. This trend was popular in critical vulnerabilities that exist in products such as JIRA, Confluence and Bitbucket to mention a few.

WordPress mania

WordPress was the most attacked CMS software in America, APAC (Asia Pacific) and EMEA (Europe, the Middle East and Africa). Attacks on web applications tend to be based more heavily on exploits integrated into malware and botnets than on targeted campaigns.

Banking Trojans and Cryptominers

Banking trojans tapered off a bit from last year, but still lead the pack at 48.97%. Despite many crypto currencies losing value, cryptominers rose back up after a lull. Malware is evolving more quickly with many of them, changing their Tactics, Techniques, and Procedures (TTPs).

High impact vulnerability

Attackers are targeting high-impact vulnerabilities with nearly 75% having critical or high-severity CVSSv3. This simply means that known hackers and cyberthreats are still highly successful even though they’ve been published by the Cybersecurity and Infrastructure Security Agency (CISA).

Get your copy of the full report

Download the full report and learn five ways to prepare your defenses against evolving cyberattacks plus:

  • Five recommendations for managing risk exposure

  • Ransomware insights

  • Newcomers in the dark web

  • A year in cyberattacks around the world (January to December)
GTIR-Screenshot.jpg 

Previous Reports