Did you miss a session on the Information Summit? Watch On-Demand Right here.

On the identical time that file breaking DDoS assaults have been making headlines final yr, usually undetected micro floods have been making a exhibiting of their very own, based on a brand new report by Radware.

The brand new report evaluations the most important cybersecurity occasions in 2021. It additionally offers detailed insights into DDoS and internet software assaults in addition to unsolicited community scanning traits.

Radware’s report reveals that between 2020 and 2021, micro floods (lower than 1Gbps) and application-level assaults jumped almost 80% larger, adopted by midsized assault vectors, which rose 39%. In distinction, the variety of assault vectors bigger than 10Gbps dropped 5%.

Bar graph that shows the average amount of attack events below 1Gbps from 2020 to 2021. The article has all of the results listed from this graph.
Quarterly variety of micro flood assaults.

The report underscores that cybercriminals are shifting their assault patterns and beginning to leverage extra small and midsize assaults in addition to goal the appliance in denial-of-service assaults. It’s an indicator that malicious actors are getting smarter, extra organized and extra focused in pursuing their aims — whether or not that be for cash, fame or a political trigger. It’s additionally a warning for safety leaders.

By combining a lot of micro floods or including micro floods to a mixture of midsized and enormous assault vectors, dangerous actors can considerably enhance the complexity of their assault campaigns. They will make mitigation more durable by forcing organizations to continually adapt their insurance policies.

The highest attacked industries in 2021 have been gaming and retail, every accounting for 22% of the assault quantity on a normalized foundation. These two industries have been adopted by the federal government (13%), healthcare (12%), know-how (9%), and finance (6%).

The report leverages intelligence supplied by community and software assault exercise sourced from Radware’s Cloud and Managed Providers, World Deception Community, and menace analysis group.

Learn the full report by Radware.

Source link