Download our in-depth report: The Ultimate Guide to IT Security Vendors
Internet managed security firm Riptech, Inc., has released volume II of its Internet Security Threat Report, showing that Internet attacks grew at an annualized rate of 64 percent in the period in the first six months of this year and provides what the Alexandria, Va.-based company calls the "first insight into U.S. designated terrorist states' cyber-attack volume and patterns."
Riptech notes in the report that attacks originating from these areas exhibit different scan patterns than those from other nations.
The report cuts through the massive volume of low-impact malicious activities to reveal a highly focused, small demographic of elite hackers. Comprising less than one percent of all cyber assailants, these hackers are marked by a high number of attack signatures, extended attack duration, and their focus on a small number of select targets.
Providing a new twist on the known Code Red worm, the report points to new evidence of smoke screen attacks. It notes a small percent of Code Red attacks originated from UNIX systems, which is technically impossible. This finding raises concern about known attack complacency and the potential vulnerability posed by emerging smoke screen attack strategies.https://o1.qnsr.com/log/p.gif?;n=203;c=204650394;s=9477;x=7936;f=201801171506010;u=j;z=TIMESTAMP;a=20392931;e=i
Derived from a sample set of more than 400 companies in over 30 countries throughout the world, the Riptech report is based on the world's largest repository of cyber-attack data. Based on the empirical analysis of actual cyber attacks detected against a global sample of security devices, the report provides a detailed analysis of attack trends that affect the entire Internet, specific industries, and individual corporations.
Key metrics from the report include:
Trends presented in the report are made possible by Riptech's security monitoring service. The company provides management, monitoring, analysis, and response against suspicious activities detected across firewalls, VPNs, and IDS. Volume II of the Internet Security Threat Report is available on Riptech's Web site at www.riptech.com.