One Costly Minute Of Cybercrime

RiskIQ, the global leader in attack surface management, has released its annual “Evil Internet Minute” report . The company tapped proprietary global intelligence and third-party research to analyze the volume of malicious activity on the internet, revealing that cybercriminals cost the global economy $2.9 million every minute last year, a total of $1.5 trillion. 
 
The data shows that in a single internet minute, $2,900,000 is lost to cybercrime. Top companies pay $25 per minute due to security breaches. Additional malicious activity includes:
 
● $1,930: the cost of hacks on cryptocurrency exchanges every minute
● $17,700: lost from phishing attacks per minute
● $22,184: the projected by-the-minute cost of global ransomware events in 2019
● 8,100: identifier records compromised every minute
● 7: malicious redirectors detected each minute
● 2.4: phish traversing the internet per minute
● 0.32: blacklisted apps by-the-minute 
● 0.21: Magecart attacks detected every minute 
 
"As the scale of the internet continues to proliferate, so does the threat landscape," said Lou Manousos, CEO of RiskIQ. "By compiling the vast numbers associated with cybercrime in the past year, we made the research more accessible by framing it in the context of an 'internet minute.' We are entering our third year defining the sheer scale of attacks that take place across the internet using the latest third-party research and our own global threat intelligence so that businesses can better understand what they're up against on the open web." 
 
Tactics range from malvertising to phishing to supply chain attacks that target e-commerce, like the Magecart hacks that have increased by 20% in the last year. The motives of cybercriminals include monetary gain, large-scale reputational damage, political motivations, and espionage. 
 
“Without greater awareness and an increased effort to implement necessary security controls, there will be more attacks using an ever-expanding range of technologies and strategies,” Manousos said. “With the recent explosion of web and browser-based threats, organizations should look to what can happen in a matter of minutes and evaluate their current security strategy. Businesses must realize that they are vulnerable beyond the firewall, all the way across the open internet." 
 
RiskIQ’s Evil Internet Minute infographic can be found here
 
You Might Also Read:
 
Cyber Criminals Are Catching Up  With Nation-state Hackers:
 
30% Of Business Leaders Would Pay Ransom:
 
 
« Russia Hacked All US State Election Systems
Malware Delivery Via LinkedIn »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

Volexity

Volexity

Volexity is a leading provider of threat intelligence and incident suppression services and solutions.

Vintegris

Vintegris

Vintegris are a Certification Authority and manufacturer of innovative systems and applications for the full cycle of digital identity.

BioConnect

BioConnect

BioConnect provide biometric access control solutions to verify a person’s identity across physical, IOT and digital applications.

LogicalTrust

LogicalTrust

LogicalTrust security testing specialists find the weakest points in your company and show you how to fix them step-by-step, as well as how to improve your security.

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

Otorio

Otorio

OTORIO delivers industrial cybersecurity and digital risk-management solutions and services. We help our customers to keep their revenue-generating operations resilient, efficient, and safe.

AdvIntel

AdvIntel

AdvIntel is a next-generation threat prevention and loss prevention company launched by a team of certified investigators, reverse engineers, and security experts.

StarLink

StarLink

StarLink is an acclaimed Value-Added Distributor across the Middle East, Turkey and Africa regions with on-the-ground presence in 20 countries including UK and USA.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.

American Binary

American Binary

American Binary is a Quantum Safe Networking (TM) and post-quantum encryption company.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.

Pvotal Technologies

Pvotal Technologies

Pvotal Technologies engineer complex, automated processes aligned with best AIOps, BizDevOps, DevSecOps, CloudOps, and ITOps practices.