• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

30+ #COVID19 Spam Emails Analyzed Each and every Minute

You are here: Home / General Cyber Security News / 30+ #COVID19 Spam Emails Analyzed Each and every Minute
August 28, 2020

A COVID-19 area is blacklisted each and every 15 minutes, even though 35 COVID-19 spam e-mail are analyzed for each moment. 

That is according to investigation by RiskIQ, which identified the prime threats in 2020 and discovered that cybercrime expenditures businesses all over $24.70 just about every moment, even though the average value of a malicious attack is $4.95 a minute. Hence, cybercrime will have a for each-minute international price tag of $11.4m (£8.7m) by 2021, a 100% boost considering the fact that 2015.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“These stats show danger action is widespread, but also show the electric power of risk intelligence in defending the business,” said RiskIQ CEO Lou Manousos. “More awareness, greater awareness and an elevated energy to carry out vital security controls make a massive variance in stopping these danger actors in their tracks.”

Stats confirmed there are 375 new threats every moment, a new vulnerability disclosed each 24 minutes and 16,172 data compromised per moment. There is also a new Magecart attack, the credit card skimming attack vector RiskIQ initially discovered in 2018, every 16 minutes,

Asked how lots of COVID-19 domains they usually see in a day, Steve Ginty, director of menace intelligence at RiskIQ, said: “We see thousands of new COVID-19 domains stood up every single day. Attackers always use present activities in their strategies, and a thing as ubiquitous and impactful has COVID-19 has demonstrated to be significantly valuable to them, which is why we see this kind of a significant-scale proliferation of danger infrastructure similar to COVID-19.”

With regards to the Magecart assaults, Ginty reported RiskIQ systems detect dozens of scenarios of Magecart activity each individual working day. “We are not able to convey to how numerous victims attackers claim in these assaults, but obtaining their code on to a site is their key target and a great indicator that malicious action has taken place,” he said.

Previous Post: «Cyber Security News Walmart Announces Surprise TikTok Bid
Next Post: Faux Login Website page Detections Major 50,000 in 2020 Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.