A Record Increase In 2024 Cyber Attacks

Following a surge in cyber crime in 2023, which saw the highest recorded volume of cyber attacks in two years, cyber security solutions provider Check Point Software Technologies has made its predictions on what cyber threats will look like for the rest of the year. In particular, the report identifies “an intriguing shift in the landscape of cyber attacks, both in frequency and in the nature of threats.”

In the first quarter of 2024, organisations suffered an average of 28% more cyber attacks compared to the previous quarter, and 5% more compared to the previous year. 

The most heavily targeted industries being research, government, military, and healthcare. The average weekly number of cyber attacks per single organisation stood at 1,308, the highest ever recorded.

The report also claims that the escalation is not just a number but “a stark reminder of the persistent and evolving threat landscape, and the substantial increase from Q4 2023 accentuates a worrying trend of rapid escalation in cyber threats.”

The industries that were most affected were education and research, which were targeted by 2454 attacks per organisation weekly on average.

The average weekly attacks on government and military organisations were 1692, and the number for healthcare was at 1605. The largest increase of attacks was seen with hardware vendors, who saw an increase of 37%, reaching 1185 attacks per organisation weekly.

Surge In Cyber Attacks In African & Latin American

Africa surged to the top with an average of 2373 attacks per week per organisation (a 20% jump from 2023), while Latin America actually showed a 20% decline, indicating a possible shift in focus or improved defensive measures in the region. Check Point also mentioned the reason for this change could be a temporary shift in focus by cyber criminals on other more vulnerable regions across the world.

When looking to the future, the Check Point researchers warned: “Businesses must adopt a multi-faceted approach to cyber security, encompassing robust data backups, frequent cyber awareness training, timely security patches, strong user authentication, and advanced anti-ransomware solutions.

“Proactive engagement with AI-powered defenses can significantly bolster an organisation’s resilience against these threats.”

Checkpoint     |     Checkpoint     |     Checkpoint     |     Security Journal UK     |     I-HIS   |   UK Government     |  IMF

Image:

You Might Also Read: 

The Global Corporate Digital Security Landscape:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Securing The Paris Olympic Games
The Risks Of NIST Non-Compliance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Exodus Intelligence

Exodus Intelligence

Exodus Intelligence are an industry leading provider of exclusive zero-day vulnerability intelligence, exploits, defensive guidance, and vulnerability research trends.

High-Tech Bridge

High-Tech Bridge

High-Tech Bridge SA is a Swiss MSSP provider offering security auditing, source code review and computer forensics.

CSA Events

CSA Events

Cloud Security Alliance conducts a series of conferences around the world. This listing provides a link to details of upcoming events.

itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, and cost reducing solutions for IT operations.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

Jerusalem Venture Partners (JVP)

Jerusalem Venture Partners (JVP)

JVP’s Center of Excellence in Be’er Sheva aims to identify, nurture and build the next wave of cyber security and big data companies to emerge out of Israel.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

Dell Technologies Capital

Dell Technologies Capital

At Dell Technologies Capital we lead investment in disruptive, early-stage startups in enterprise and cloud infrastructure.

Satori Cyber

Satori Cyber

The Satori Cyber Secure Data Access Cloud is the first solution on the market to offer continuous visibility and granular control for data flows across all cloud and hybrid data stores.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

Spike Reply

Spike Reply

Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection.

Venari Security

Venari Security

Venari is an award-winning cybersecurity SaaS provider that has developed an ETA (Encrypted Traffic Analysis) platform which fundamentally changes the way encrypted traffic is analysed.

Ciphertex Data Security

Ciphertex Data Security

Ciphertex is a leading data security company that specializes in portable data encryption and privacy protection storage systems.

Heyhack

Heyhack

Heyhack is a SOC 2 Type II certified automated penetration testing platform for web apps and APIs.

PriorityZero

PriorityZero

PriorityZero is a European company focused on remote security assessments and consulting services that operates on a global scale.