{"id":48267,"date":"2021-12-30T10:34:21","date_gmt":"2021-12-30T18:34:21","guid":{"rendered":"http:\/\/www.enxmag.com\/twii\/?p=48267"},"modified":"2021-12-30T11:55:24","modified_gmt":"2021-12-30T19:55:24","slug":"organizations-worldwide-experience-over-722-million-attacks-in-the-last-30-days","status":"publish","type":"post","link":"http:\/\/www.enxmag.com\/twii\/the-week-in-imaging-twii\/editors-blog\/2021\/12\/organizations-worldwide-experience-over-722-million-attacks-in-the-last-30-days\/","title":{"rendered":"Organizations Worldwide Experience Over 722 Million Attacks in the Last 30 Days"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignleft size-medium\"><img loading=\"lazy\" width=\"300\" height=\"165\" src=\"https:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2021\/12\/KnowBe4-blog-300x165.jpg\" alt=\"\" class=\"wp-image-48269\" srcset=\"http:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2021\/12\/KnowBe4-blog-300x165.jpg 300w, http:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2021\/12\/KnowBe4-blog.jpg 399w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n\n<p>Analysis of data collected by Internet and security services vendor Akamai shows an unimaginable number of cyberattacks, demonstrating how frequently these attacks are happening.<\/p>\n\n\n\n<p>If you\u2019ve been paying attention at all the last few years, you\u2019re already keenly aware that cyberattacks are an ongoing problem, with attack attempts occurring every day. But new Akamai data analyzed by VPN vendor Atlas VPN shows there are nearly 17,000 cyberattacks against organizations around the globe every second. Considering Akamai processes somewhere between 15-30% of the world\u2019s Internet traffic, this new analysis speaks volumes representing much of the world.<\/p>\n\n\n\n<p>According to the data, the breakdown of the attacks is as follows:<\/p>\n\n\n\n<ul><li>72% of attacks involved malware<\/li><li>22% were command &amp; control (that is, the attacker takes over control of a system and then steals or deletes data)<\/li><li>5% of attacks were strictly phishing attacks<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"457\" height=\"324\" src=\"https:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2021\/12\/KnowBe4-Art.jpg\" alt=\"\" class=\"wp-image-48268\" srcset=\"http:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2021\/12\/KnowBe4-Art.jpg 457w, http:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2021\/12\/KnowBe4-Art-300x213.jpg 300w\" sizes=\"(max-width: 457px) 100vw, 457px\" \/><\/figure>\n\n\n\n<p>According to the article, the delineation between when phishing is and is not used in the other types of attacks is not clear, stating that C&amp;C and malware attacks can be a part of phishing attacks. I\u2019m curious about this lack of clarity, as there are really only a few initial attack vectors possible today:<\/p>\n\n\n\n<ul><li>Vulnerabilities in applications and operating systems<\/li><li>Web-based attacks<\/li><li>Remote desktop attacks (RDP)<\/li><li>Phishing attacks<\/li><\/ul>\n\n\n\n<p>Given that malware attacks rely on gaining access to an endpoint or server, it makes sense that phishing and\/or RDP attacks are likely used in a majority of the largest segment of the Atlas VPN analysis.<\/p>\n\n\n\n<p>Whether phishing attacks represent 5% of attacks on your organization or (in my opinion) the majority of them, it\u2019s necessary to stop phishing by empowering users to spot suspicious content immediately through Security Awareness Training so they won\u2019t interact with and engage the potentially malicious links, attachments, or email content.<\/p>\n\n\n\n<p><em>This blog originally appeared on the <a href=\"https:\/\/blog.knowbe4.com\/\">KnowBe4<\/a> website.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Analysis of data collected by Internet and security services vendor Akamai shows an unimaginable number of cyberattacks, demonstrating how frequently these attacks are happening. If you\u2019ve been paying attention at all the last few years, you\u2019re already keenly aware that cyberattacks are an ongoing problem, with attack attempts occurring every day. But new Akamai data analyzed by VPN vendor Atlas VPN shows there are nearly 17,000 cyberattacks against organizations around the globe every second. Considering Akamai processes somewhere between 15-30% of the world\u2019s Internet traffic, this new analysis speaks volumes representing much of the world. According to the data, the breakdown of the attacks is as follows: 72% of attacks involved malware 22% were command &amp; control (that is, the attacker takes over control of a system and then steals or deletes data) 5% of attacks were strictly phishing attacks According to the article, the delineation between when phishing is and is not used in the other types of attacks is not clear, stating that C&amp;C and malware attacks can be a part of phishing attacks. I\u2019m curious about this lack of clarity, as there are really only a few initial attack vectors possible today: Vulnerabilities in applications and operating systems Web-based attacks Remote desktop attacks (RDP) Phishing attacks Given that malware attacks rely on gaining access to an endpoint or server, it makes sense that phishing and\/or RDP attacks are likely used in a majority of the largest segment of the Atlas VPN analysis. Whether phishing attacks represent 5% of attacks on your organization or (in my opinion) the majority of them, it\u2019s necessary to stop phishing by empowering users to spot suspicious content immediately through Security Awareness Training so they won\u2019t interact with and engage the potentially malicious links, attachments, or email content. This blog originally appeared on the KnowBe4 website.<\/p>\n","protected":false},"author":178,"featured_media":48269,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[80,1650,82,1638],"tags":[3491],"_links":{"self":[{"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts\/48267"}],"collection":[{"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/comments?post=48267"}],"version-history":[{"count":2,"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts\/48267\/revisions"}],"predecessor-version":[{"id":48287,"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts\/48267\/revisions\/48287"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/media\/48269"}],"wp:attachment":[{"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/media?parent=48267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/categories?post=48267"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/tags?post=48267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}