One Costly Minute Of Cybercrime

RiskIQ, the global leader in attack surface management, has released its annual “Evil Internet Minute” report . The company tapped proprietary global intelligence and third-party research to analyze the volume of malicious activity on the internet, revealing that cybercriminals cost the global economy $2.9 million every minute last year, a total of $1.5 trillion. 
 
The data shows that in a single internet minute, $2,900,000 is lost to cybercrime. Top companies pay $25 per minute due to security breaches. Additional malicious activity includes:
 
● $1,930: the cost of hacks on cryptocurrency exchanges every minute
● $17,700: lost from phishing attacks per minute
● $22,184: the projected by-the-minute cost of global ransomware events in 2019
● 8,100: identifier records compromised every minute
● 7: malicious redirectors detected each minute
● 2.4: phish traversing the internet per minute
● 0.32: blacklisted apps by-the-minute 
● 0.21: Magecart attacks detected every minute 
 
"As the scale of the internet continues to proliferate, so does the threat landscape," said Lou Manousos, CEO of RiskIQ. "By compiling the vast numbers associated with cybercrime in the past year, we made the research more accessible by framing it in the context of an 'internet minute.' We are entering our third year defining the sheer scale of attacks that take place across the internet using the latest third-party research and our own global threat intelligence so that businesses can better understand what they're up against on the open web." 
 
Tactics range from malvertising to phishing to supply chain attacks that target e-commerce, like the Magecart hacks that have increased by 20% in the last year. The motives of cybercriminals include monetary gain, large-scale reputational damage, political motivations, and espionage. 
 
“Without greater awareness and an increased effort to implement necessary security controls, there will be more attacks using an ever-expanding range of technologies and strategies,” Manousos said. “With the recent explosion of web and browser-based threats, organizations should look to what can happen in a matter of minutes and evaluate their current security strategy. Businesses must realize that they are vulnerable beyond the firewall, all the way across the open internet." 
 
RiskIQ’s Evil Internet Minute infographic can be found here
 
You Might Also Read:
 
Cyber Criminals Are Catching Up  With Nation-state Hackers:
 
30% Of Business Leaders Would Pay Ransom:
 
 
« Russia Hacked All US State Election Systems
Malware Delivery Via LinkedIn »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

EuroISPA

EuroISPA

EuroISPA is a pan European association of European Internet Services Providers Associations and the world’s largest association of ISPs.

Openminded (OPMD)

Openminded (OPMD)

Openminded is a French security and network services company.

maCERT

maCERT

maCERT is the national Computer Emergency Response Team for Morocco.

AppViewX

AppViewX

AppViewX is a global leader in the management, automation and orchestration of network services in data centers.

Riverside Research

Riverside Research

Riverside Research is a not-for-profit organization chartered to advance scientific research in areas including Trusted & Resilient Systems.

LMG Security

LMG Security

LMG Security is a cybersecurity consulting, research and training firm.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Cybersecurity Professionals

Cybersecurity Professionals

Search vacancies from top cyber security jobs worldwide on CyberSecurity Professionals. View IT security jobs or upload your CV to be seen by recruiters from industry leading firms.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

SpyCloud

SpyCloud

SpyCloud is a leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts either directly or through product integrations.

Comcast Business

Comcast Business

Comcast Business keeps businesses ready for what’s next with powerful connectivity, advanced cybersecurity solutions, and the right people at your side.

Digital Silence

Digital Silence

Digital Silence is a world-class provider of information security research and consulting services.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

ThreatCaptain

ThreatCaptain

ThreatCaptain is a Cybersecurity Leadership Development Company driven to enhance and illuminate cybersecurity risk through strategic alignment and informed business decision-making.

NewsGuard Technologies

NewsGuard Technologies

NewsGuard provides transparent tools to counter misinformation for readers, brands, and democracies.