Akamai Lines Background

Quarterly Security Reports

Learn about the origins, tactics, types, and targets of cyber- attacks and emerging threats and trends from post-attack analysis and intelligence by cybersecurity and DDoS mitigation experts. Each issue includes quarter-over-quarter and year-over-year trends, plus spotlights on recent DDoS and web application attacks and review of the past quarter’s hot-topic issues in cybersecurity.

Most Recent Security Report

  • Q1 2016 State of the Internet - Security Report

    • DDoS and web application attack activity by vector 
    • Analysis of repeat targets and DDoS as a diversion 
    • Bot traffic analysis over 24 defined bot categories 
    • DDoS spotlight: 100 Gbps+ mega attacks using increasingly simple attack vectors 
    • Web application attack spotlight: Account Takeover (ATO) attacks targeting finance and entertainment sectors

    Download now

Past Security Reports

  • Q4 2015 State of the Internet - Security Report

    • DDoS, Web Attacks surge; repeat attacks become the norm 
    • Reflection and multi-vector attacks make up the majority of attacks 
    • 40% increase in DDoS attacks and a 28% increase in web application attacks compared with Q3 
    • DDoS spotlight: A multi-vector 309 Gbps, 202 Mpps attack 
    • Example web application attacks and signatures from each of the top 10 attack source ASNs 
    • A look at web vulnerability scanning and probing activity, including top scanned ports

    Read more
  • Q3 2015 State of the Internet – Security Report 

    • Record number of DDoS attacks; smaller, shorter likely due to limits imposed by DDoS-for-hire sites 
    • Many web application attacks sourced from servers set up on US-based cloud services 
    • DDoS spotlight: 222 Mpps mega attack 
    • Global map of DDoS reflectors 
    • A look at web scrapers

    View now
  • Q2 2015 State of the Internet – Security Report 

    • DDoS attacks double in frequency, while the number of mega attacks rises 
    • Shellshock vulnerability leveraged in 49% of web application attacks 
    • Spotlight: Multi-vector mega attacks leveraging SYN and UDP floods 
    • Case study: WordPress and the danger of third-party plugins 
    • Analysis: The pros and cons of Tor

    View now
  • Q1 2015 State of the Internet – Security Report 

    • DDoS attacks get smaller, but double in frequency and increase duration > 40 percent in duration 
    • Millions of web application attack triggers analyzed with a breakdown of seven common vectors 
    • Spotlight: 100+ Gbps mega attacks 
    • Case study: Security implications for IPv6 
    • Analysis: Malicious intentions behind real-world SQL injection attacks 
    • Emerging threat: Website defacements and domain hijacking

    View now