Check Point Threat Map
threatmap.checkpoint.com
Live Cyber Threat Map | Check Point
You need to enable JavaScript to run this app
Kaspersky Cyberthreat Map
cybermap.kaspersky.com
MAP | Kaspersky Cyberthreat live map
MAP | Find out if you are under cyber-attack here
Videos
01:02:59
Cybercrime Set To Reach $10 Trillion: Experts Address AI, Global ...
02:28
Hospitals at risk for cyber attacks
02:38
Hospitals at risk for cyber attacks - YouTube
03:48
Major global cyber outage hits airlines, banks and media outlets, ...
15:02
Cyber Attack Trends: Global Identity Crisis - YouTube
A cyber-attack with COVID-like characteristics? | World Economic Forum
Center for Strategic and International Studies
csis.org › csis programs › strategic technologies program
Significant Cyber Incidents | Strategic Technologies Program | CSIS
This is the first time the Netherlands has publicly accused China of cyber espionage. January 2024: Hackers breached Global Affairs Canada’s secure VPN in December 2023, allowing hackers to access sensitive personal information of users and employees. It affected staff emails, calendars, and contacts. It’s unclear if classified information was compromised or lost. The hacker's identity is currently unknown. January 2024: Russian hackers launched a ransomware attack against Sweden’s only digital service provider for government services.
The Hacker News
thehackernews.com
The Hacker News | #1 Trusted Source for Cybersecurity News
This week's round-up shows how subtle shifts in behavior, from code tweaks to job scams, are rewriting what "cybercrime" looks like in practice. Across the landscape, big players are being tested, familiar threats are mutating, and smaller stories are quietly signaling bigger patterns ahead. The trend isn't about one big breach anymore; it's about many small openings that attackers exploit with precision.
BBC
bbc.com › news › topics › cp3mvpdp1r2t
Cyber-attacks - BBC News
The Russian ambassador is summoned over a cyber-attack on air traffic control and attempted electoral interference.
Radware Threat Map
livethreatmap.radware.com
Live Cyber Threat Map | Radware
Radware’s Live Threat Map presents near real-time information about cyberattacks as they occur, based on our global threat deception network and cloud systems event information.
Reddit
reddit.com › r › cybersecurity
cybersecurity
May 22, 2012 - The attack basically requires that someone can send stuff to your number at all – limiting that already kills a big chunk of the risk. My open-source implementation (research / educational use only): https://github.com/gommzystudio/device-activity-tracker ... Stumbled upon a discussion here from a couple of days ago titled "Do young adults overestimate their cybersecurity awareness?" and it got me thinking: why do we keep having these conversations about how different generations are vulnerable to cyber threats in different ways?
Digital Attack Map
digitalattackmap.com
Digital Attack Map
Digital Attack Map - DDoS attacks around the globe
BleepingComputer
bleepingcomputer.com
BleepingComputer | Cybersecurity, Technology News and Support
The European Space Agency (ESA) confirmed that attackers recently breached servers outside its corporate network, which contained what it described as "unclassified" information on collaborative engineering activities.
Global News
globalnews.ca › tag › cyber-attack
cyber attack | News, Videos & Articles
Individuals and organizations can take several steps to ensure they are less vulnerable to ransomware attacks, the Communications Security Establishment (CSE) said. ... First Nations Health Authority latest B.C. victim of cyberattack
ITU
itu.int › en › ITU-D › Cybersecurity › pages › global-cybersecurity-index.aspx
Global Cybersecurity Index
The Global Cybersecurity Index report is now live.
CISA
cisa.gov › stopransomware › official-alerts-statements-cisa
Official Alerts & Statements - CISA | CISA
Although cyber threats across critical infrastructure sectors are increasing, this advisory does not intend to indicate greater targeting of the WWS Sector versus others. ... CISA, FBI, and NSA published a joint advisory on Conti ransomware with technical details, adversary behavior mapped to MITRE ATT&CK and recommended mitigations. CISA and the FBI have observed the increased use of Conti ransomware in more than 400 attacks on U.S.
FortiGuard Labs
fortiguard.fortinet.com › threat-map
Outbreak Threat Map | FortiGuard Labs
ShadowV2, a new Mirai-based botnet ... its propagation, DDoS capabilities, and global footprint. ... Cybercriminal activity is surging ahead of the 2025 holiday season. Deceptive domains, stolen accounts, and e-commerce attacks are accelerating....