External Threat Management

RiskIQ’s 2019 Evil Internet Minute: All the Cyber Threats Jammed Into 60 Seconds

RiskIQ's 2019 Evil Internet Minute begins...now.

As the scale of the internet continues to increase, so does the cyber threat landscape. Today, dozens of attack surfaces are growing under increased pressure, as cyberattacks take place in the amount of time it takes to brush your teeth or respond to an email.

To illustrate just how prevalent and persistent modern external threats are, we compiled the numbers associated with cybercrime in the past year and calculated how many cyber attacks occur every 60 seconds. Our 2019 "Evil Internet Minute" defines the scale of cyber attacks happening across the internet using the latest third-party research and our own global threat data.

Cyber attacks are constant, but the news of massive regulatory fines against Equifax and British Airways shows that it just takes one to hurt a business. Equifax is slated to pay at least $575M as part of a settlement with the FTC, and the UK's Information Commissioner's Office proposes a fine of £183m against British Airways which is 1.5% of its 2017 total revenues.

The Evil Internet Minute shows that some of the most common cyberattacks include malvertising, phishing, and supply chain attacks that target e-commerce such as the Magecart breaches that have surged by 20% in the last year. The perpetrators are using an ever-expanding range of technologies and strategies, and their motives vary from monetary gain to large-scale reputational damage to state-sponsored espionage.

Every minute, $2,900,000 is lost to cybercrime, and top companies pay $25 per minute due to cyber security breaches. In RiskIQ's 2019 Evil Internet Minute, find out what else takes place in about the same amount of time as it takes to reply to an email, including:

  • The cost of hacks on cryptocurrency exchanges every minute
  • The amount lost from phishing attacks per minute
  • The projected by-the-minute cost of global ransomware events in 2019
  • Amount of identifier records compromised every minute
  • Malicious redirectors detected each minute
  • Phishing sites stood up per minute
  • Blacklisted apps by-the-minute
  • Magecart attacks detected every minute

However, with greater awareness and an increased effort to implement necessary cyber security controls, organizations can stem the tide of these cyber attacks. Businesses must realize that their attack surfaces are vulnerable beyond the firewall and look at what can happen in a matter of minutes when evaluating their current cyber security strategy.

Subscribe to Our Newsletter

Subscribe to the RiskIQ newsletter to stay up-to-date on our latest content, headlines, research, events, and more.

Base Editor