

Probably the most well-known cyber attack map is the one produced by Norse, a security firm that's had its share of problems over the last few years. This is something the vendors that produce the maps know well, as the maps themselves are sales tools. Again, the value of these cyber attack maps isn't the data they're showing, it's how they can be used as a conversation starter. Some SOC operators do the same thing for clients, using the maps to visualize attack types and try to answer customer questions. The concept is smart, as the visuals and datatypes on display can create discussion points on attack types, methods and threat actors. Most are just a subset of recorded attacks or a playback of sanitized packet captures.īut don't discount how useful the eye candy factor can be: one security professional said he uses them to get high schoolers interested in the security industry. The common misconception with cyber attack maps is that the data is live, or real-time. Real-time threat intelligence landscape by FortiGuard."If I found one that'd add value, we'd use it," one security executive said on Twitter. You get to see the live attack details like the software is being used to attack with the source and destination details. Internet attack attribution map by Threatbutt is a cool simple one. Real-time web monitor by AKAMAI shows network & attack traffic overview, which you can filter by regions. It also gives an option to view the top target and source countries. Threat Cloud by Check Point shows the attack data for today and yesterday.

You can have data in table format under the stats page. KasperskyĬyberthreat real-time map by Kaspersky shows you the real-time attack detected by their various source systems. It’s not as detailed as one above but still useful if you are looking for data in industry and country wise.

FireEyeįireEye Cyber Threat Map gives you an excellent summary of total attacks today with the following data.

If you are a business owner or web administrator, then you may consider protecting your online assets from DDoS by using services like SUCURI or others, as mentioned here. You can filter the map with multiple options.ĭDoS is dangerous to your online business it can take down your online presence and hurt your reputation and finances. Watch daily DDoS attacks worldwide with Digital Attack Map. If you are a website owner or administrator, you can perform a security scan against your site to check vulnerabilities and malware.Ĭoming back to the article, if you are interested to watch attacks happening around the world, then following maps will mesmerize you. Thousands of websites get hacked every day due to vulnerable files, plugins, and misconfiguration on the servers. It’s interesting to watch who is initiating cyber-attacks against whom live, globally.
