Infographics

The Evil Internet Minute 2019

As the scale of the internet continues to proliferate, so does the attack surface and threat landscape. With cybercriminals costing the global economy $1.5 trillion in 2018 al...

Read More
What’s in a Browser Threat?

The browser is becoming one of the most frequently used attack vectors for criminals, with browser attacks coming in many different forms: Magecart, Cryptocurrency Miners, Fin...

Read More
PHP Version 5 End of Life

PHP is one of the most common scripting languages, but versions 5.6 and 7.0 have begun to reach end-of-life and will no longer be supported. That means websites using these v...

Read More
Treat or Trick?

In this spooky infographic, we’ll show you six recent instances we’ve observed of threat actors using “treats” to lure victims to their ‘tricks,” malicious campaig...

Read More
The Evil Internet Minute 2018

Despite businesses’ best efforts to guard against external cyber threats, bad actors continue to proliferate online. To see what else goes down on the internet in less time ...

Read More
CryptoCoin Rush

To map the cryptocurrency mining landscape, RiskIQ’s deployed our web crawling infrastructure to highlight the influx of revenue-generating miners in domains in the Alexa to...

Read More
In Poor Form: RiskIQ Research Shows FTSE Companies Lack Secure Data Collection Methods

With EU GDPR one year away, there is still a lot of ground to cover for organizations that will be most affected, and the data shows it. For a first-hand look at how FTSE-30 o...

Read More
The Real Battlefield for Cybercrime Infographic

Digital assets may take the form of a traditional website or microsite, but they also may exist as a social media property or a portion of an existing third-party site. Additi...

Read More
Hundreds of Malicious Antivirus Apps Put Users at Risk

Download our latest infographic to find out how many ‘antivirus’ mobile apps are leveraging the threat of malware infections to drive app downloads.

Read More