When it comes to real-time cyber attack maps, some are funny, some seem ominous, and all of them tell a story that words alone cannot: cyber attacks never stop.
7 live cyber attack threat maps in 2019
1. Our favorite real-time worldwide
Kaspersky Lab cyber attack map: https://cybermap.kaspersky.com/
2. Next, how about a live botnet threat map? Put on some classical music to go with this one and you'll have your own synchronized "attack show" of real-time botnet attacks around the globe.
Deteque botnet threat map: https://www.deteque.com/live-threat-map/
3. Next is the Fortinet real-time attack map. It may not be the most exciting visually, but there are a couple of cool features that make it unique. The bottom left-hand corner has easy to understand (and dramatic) cyber attack statistics, and if you look at the map you'll see a day/night map is subtly overlayed onto the cyber attack map. So you can see where bad actors like to work after dark.
Fortinet live cyber attack map: https://threatmap.fortiguard.com/
4. There's a little more color in our next map from FireEye. Here's what sets this one apart: It is less dramatic with its attack graphics than some of the others, and it also shows the top attacked verticals for the past 30 days.
FireEye real-time cyber attack map: https://www.fireeye.com/cyber-map/threat-map.html
5. We also discovered Bitdefender's real-time cyber threat map, which claims to show infections and attacks. Plus, its rapid-fire list of attacks drives home the point for non-technical folks.
Bitdefender live cyber threat map: https://threatmap.bitdefender.com/
6. Another really good looking live cyber attack map is from SonicWall, which was pointed out by a SecureWorld reader. We really like the easy to scan analytics at the bottom of the map which shows which countries are top attack targets right now and the average number of cyber attacks per site for the day, among other things.
SonicWall live cyber attacks map:
7. The last one is what you might call an InfoSec classic. Not only does this cyber threat map include the "pew-pew" sound of video games from the '80s, but it flat out says its data comes from the cloud, including the cumulus cloud! And it translates the attacks it is supposedly tracking into phrases like "it's cyber Pompeii" or "we'll just call it a glitch."
With a name like
Did we miss a cyber threat map that you like? Let us know in the comments below. Or tell us in person at one of our 17 regional SecureWorld cybersecurity conferences!
New podcast is a resource for cybersecurity leaders and professionals
SecureWorld is proud to announce The SecureWorld Sessions, a new cybersecurity podcast that gives you access to thought leaders who share strategies for securing your organization and growing your cybersecurity career.
Listen to our trailer and search for it on your preferred podcast platform.