Thursday, February 9, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Cyberattacks increased by 33% in a year

Cyberattacks increased by 33% in a year

Over the recent years, we hear about cyber attacks much more due to the constant increase in internet users and technology growth.


Julide Gamze Cecen Julide Gamze Cecen
June 13, 2021
2 min read
Cyberattacks increased by 33% in a year

The hackers continue to abuse vulnerabilities for their benefit, and it seems this issue will only proceed to grow if necessary measures are not taken. According to the data presented by the Atlas VPN team, cyberattacks have increased by 33% since last year. The total amount of malicious attacks in Q1 went up from 538 in 2020 to 713 in 2021.

3.4 billion personal records were leaked

In January 2020, there were a total of 160 cyberattacks. Meanwhile, January 2021 saw 183 malicious attacks — 14% more than the same month last year. In January, one of the most impactful attacks occurred to Facebook as 533 million data records of social media users were leaked online. Looking at February’s numbers, we can see a tremendous increase in cyberattacks in 2021 compared to 2020.

Malicious attacks jumped by 33% from 191 in 2020 to 254 in 2021. Even though February is the shortest month, it did not stop hackers from various threats. Throughout this month, a total of 3.4 billion personal records were leaked.

Number of cyber attacks

In March 2021, cyberattacks grew more than 50% compared to March 2020. The total number of attacks went up from 187 to 276. Throughout March, the ProxyLogon Microsoft Exchange Server vulnerability unleashed a massive wave of attacks by state-sponsored actors and cybercriminals.

Malware continues to be one of the most used techniques for cyberattacks. In Q1 2021 it was employed in 32% of all cyberattack cases. Hackers use malware to trick a victim into providing personal data for identity theft. Also, cybercriminals could attack organizations with such attacks to steal consumer credit card data or other financial information.

Unknown attacks are taking 2nd place

Unknown attacks were the second most-used in the first quarter of this year at 22%. The unknown threat is classified as such when a security product cannot recognize its code, which is why it is tough to stop such attacks. Next up is account takeover (ATO). This type of cyberattack technique was used in 14% of all cyberattacks in Q1 2021.

An ATO attack is a form of identity theft when a cybercriminal gains unauthorized access to victims’ online accounts using stolen usernames and passwords. A successful attack of this kind leads to fraudulent transactions or unapproved shopping.

Cyber attack techniques

Hackers abusing vulnerabilities are in fourth place at 13%, and targeted attacks rank fifth as 6% of threats are directed at specific organizations or governments. This significant increase in cyberattacks has shown that many companies or government administrations are not prepared to handle cybersecurity threats. With more and more people becoming victims of hackers, responsible institutions should step up their efforts in the cybersecurity field.

See more Cybersecurity News


Tags: Cyber Attack
Julide Gamze Cecen

Julide Gamze Cecen

Julide Gamze Cecen is the multimedia editor of the Cloud7 News. Julide is a solid Linux user, opensource and cybersecurity enthusiast and a front-end web application developer.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Outsourcing cloud management: The key to averting complexity

Outsourcing Cloud Management: The key to averting complexity

Related News

CISA publishes VMware ESXi ransomware recovery tool

CISA publishes VMware ESXi ransomware recovery tool

February 8, 2023 3:45 pm
New local privilege escalation vulnerability strikes X.Org server

New local privilege escalation vulnerability strikes X.Org server

February 7, 2023 9:45 pm
Red Hat brings new security capabilities to Red Hat OpenShift

Red Hat brings new security capabilities to Red Hat OpenShift

February 7, 2023 8:55 pm
Cisco fixes command injection vulnerability

Cisco fixes command injection vulnerability

February 6, 2023 5:00 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

What’s new in Linux kernel 6.2 rc6?

10 Best Web Hosting Services of 2023

Ubuntu 22.04 LTS is available for download. What is new?

CERN and Fermilab recommend AlmaLinux

7 best hosting control panels of 2023

How to update Linux Kernel without rebooting?

7 best Linux mail servers of 2023

7 best cPanel alternatives for 2023

7 best Linux web browsers for 2023

7 best CentOS alternatives

7 best Linux server distros of 2023

Interview with Igor Seletskiy on AlmaLinux

How to create a VM on VMware Workstation

Recent News

  • Linux 6.1 is a Long-Term Support (LTS) Kernel now
  • Digital Realty signs 10-year power purchase agreement with ENGIE
  • Zoom to lay off 15% of its employees
  • phpMyAdmin 4.9.11 and 5.2.1 released
  • CISA publishes VMware ESXi ransomware recovery tool

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.