Cyberattack Maps & Threat Intelligence
Check out insights into security threats, risks, and cyberattacks across our global network
More than 3.4 billion of the 2020 credential stuffing attacks occurred in the financial sector
Explore real-time attack data
See the origins of the largest web attacks and the most common attack vector used.
This chart shows enterprise threats seen across the Akamai network for actual customers, aggregated and displayed by the three major categories for each type of threat: malware, phishing, and Command and control.
Web attack visualization
The Akamai Intelligent Edge Platform delivers more than 2 trillion internet interactions, protects web applications, and mitigates multiple DDoS attacks each day. We’re able to leverage this data to share an informed view of internet security metrics, including daily threat levels by industry and region, countries launching the web attacks, and the most common attack methods.
Akamai’s cloud security intelligence can detect and categorize web application attacks across industries. This is a look at the top industries that have been attacked in the past week.
Commerce most attacked
Commerce continues to be the most attacked industry as it holds its customers’ sensitive information, making it extremely vulnerable.
Akamai’s cloud security intelligence can detect and categorize web application attacks across regions. This map shows web application attacks by country and region over the past week.
Types of web application attacks include SQL injection, remote file inclusion, cross-site scripting, PHP injection, and command injection. These attacks can degrade web performance, cause a loss of revenue, and harm your reputation. Protect yourself against these types of attacks with a web application firewall and DDoS protection solution.
Akamai’s cloud security intelligence can detect and categorize web application attacks across industries. This chart shows web application attacks by type over the past week.
Industry attack breakdown
Types of web application attacks include SQL injection, remote file inclusion, cross-site scripting, PHP injection, and command injection. Generally speaking, SQL injection is the most common attack type — these attacks try to access an unsecured site’s database by “injecting” actual SQL into page URLs as part of the request.