Security Companies Develop Real-time Maps of Cyberattacks

Security Companies Develop Real-time Maps of Cyberattacks

Everyone uses the internet. Right now, you’re not only using it to read this article, but also to store tons of personal information. Even things that you may not have put out there yourself are online, through agencies like the US Government Office of Personal Management, insurance companies, and even cheating sites like Ashley Madison. Feel like you’ve seen these companies in the news recently? That’s because they’ve all been recently hacked, exposing the personal information of millions of people.

Some security companies have developed real-time maps showing the origins and targets of hacks being attempted around the world, for anyone who wants to see how real the dangers of the internet actually are (or how necessary it is to buy security products from the companies who created the maps).

Kaspersky, known mainly for anti-virus software, generated a map displaying attempted invasions by malicious software, including common viruses. Of course, while the map is in real time and displays real locations, the information is stripped of all personal data.

Google and Arbor networks have also created a map, which shows DDoS attacks. These attacks normally involve someone taking over an entire network of computers, and then overloading a target by having all of the computers they’ve taken over simultaneously try to access a site, which causes a flood of requests. This can force the target to be taken offline.

Norse, an internet security company that deflects and prevents malign attacks, has developed a map of hackers hitting “honey pots,” or traps designed to catch invasions by hackers. Keep in mind, it is not difficult for a hacker to make the attack look as if it is coming from somewhere other than the hacker’s actual position, so the points on the map are comprised of fake origins, in addition to the fake targets.

FireEye also has a map to give potential customers an idea of how many threats they have to fear. Their map isn’t real-time, but instead tracks communication between networks being targeted by malware and the servers that control them, over the last 30 days.

Check out these maps and see for yourself how dangerous the internet can be (or maybe just how hard security companies are trying to convince you that you need to buy their products)!

About the Author

Alison May is a freelance editor for Security Today.

Featured

  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.