• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 

Nippon Steel Solutions suffered a data breach following a zero-day attack

 | 

Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

 | 

Hackers weaponize Shellter red teaming tool to spread infostealers

 | 

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

 | 

Italian police arrested a Chinese national suspected of cyberespionage on a U.S. warrant

 | 

U.S. CISA adds MRLG, PHPMailer, Rails Ruby on Rails, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog

 | 

IT Worker arrested for selling access in $100M PIX cyber heist

 | 

New Batavia spyware targets Russian industrial enterprises

 | 

Taiwan flags security risks in popular Chinese apps after official probe

 | 

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog

 | 

Hunters International ransomware gang shuts down and offers free decryption keys to all victims

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 52

 | 

Security Affairs newsletter Round 531 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

North Korea-linked threat actors spread macOS NimDoor malware via fake Zoom updates

 | 

Critical Sudo bugs expose major Linux distros to local Root exploits

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Security
  • 26 Cyber Security Stats Every User Should Be Aware Of in 2024

26 Cyber Security Stats Every User Should Be Aware Of in 2024

Pierluigi Paganini February 09, 2024

26 key cyber security stats for 2024 that every user should know, from rising cyber crime rates to the impact of AI technology.

  • Cyber Crime Surge: During COVID-19, cyber crimes shot up by 600%, showing how threats adapt to global changes.
  • Phishing Attacks: Phishing is the top cyber attack, causing 90% of data breaches. Shockingly, 96% of these attacks come through email.
  • Ransomware Attacks: In 2023, a whopping 72.7% of organizations faced ransomware. The cost of these attacks could hit $265 billion annually by 2031.
  • Data Breach Costs: The average global cost of a data breach in 2023 was $4.45 million, up 15% in three years. The US topped the list at $5.09 million per breach.
  • Cyber Insurance: US cyber insurance premiums soared by 50% in 2022, reaching $7.2 billion.
  • Cyber Skills Gap: By 2025, there could be 3.5 million unfilled cyber security jobs, showing a big need for skilled professionals.
  • Email Threats: More than 75% of targeted attacks start with an email, delivering 94% of malware.
  • Soaring Cyber Crime Costs: Cyber crime costs are expected to hit $10.5 trillion annually by 2025, rising by 15% each year.
  • Healthcare Spending: From 2020 to 2025, the healthcare sector plans to spend $125 billion on cyber security to tackle its vulnerability.
  • Telecom Adoption: 80% of telecom companies now use AI-powered cyber security tools to protect their networks, showing how AI is becoming more common in keeping complex systems safe.
  • Executive Opinion: Nearly 70% of top executives see AI as crucial for tackling cyber threats, indicating a growing trust in AI to strengthen online defenses.
  • Market Growth: AI cyber security technology is projected to grow by 23.6% every year until 2027, pointing to rapid progress and investment in AI-based security.
  • Privacy Compliance: By 2024, 40% of privacy tools will rely on AI, highlighting its expanding role in ensuring data privacy and meeting regulations.
  • Reducing Risky Behavior: AI adoption in security policies has led to a 68% drop in risky user actions, proving its effectiveness in promoting safer online habits.
  • Generative AI Impact: Generative AI will have a big role in cyber security, especially in areas like email protection and fighting social engineering attacks.
  • Market Size: The AI cyber security market was worth around $17.4 billion in 2022 and is expected to grow to about $102.78 billion by 2032, with a yearly growth rate of 19.43%.
  • Mobile Threats: Mobile devices are increasingly targeted by cyber criminals, with mobile malware attacks rising by 54%.
  • IoT Vulnerabilities: With the proliferation of Internet of Things (IoT) devices, the number of IoT-related cyber attacks is expected to increase by 25% in 2024.
  • Social Engineering Attacks: Social engineering attacks, such as phishing and pretexting, remain a top concern, with 65% of organizations experiencing phishing attempts and 47% falling victim to social engineering tactics.
  • Zero-Day Exploits: Zero-day vulnerabilities, which are flaws in software unknown to the vendor, continue to be exploited by attackers, with an average of 20 zero-day vulnerabilities discovered each month.
  • Cloud Security Concerns: As businesses increasingly migrate to the cloud, cloud security incidents are on the rise, with misconfigured cloud services accounting for 68% of reported incidents.
  • Insider Threats: Insider threats pose a significant risk to organizations, with 64% of cyber security incidents involving insiders, either through malicious intent or inadvertent actions.
  • Supply Chain Attacks: Supply chain attacks, where attackers target vulnerabilities in third-party vendors or suppliers to gain access to target organizations, have increased by 42% in 2023.
  • Ransomware-as-a-Service (RaaS): Ransomware attacks are becoming more accessible to cyber criminals through RaaS platforms, allowing them to launch attacks without advanced technical skills. RaaS usage is expected to increase by 25% in 2024.
  • Regulatory Compliance Challenges: Compliance with data protection regulations, such as GDPR and CPRA, remains a challenge for organizations, with non-compliance penalties averaging $5.5 million per incident.
  • Cyber Security Spending: Global cyber security spending is projected to reach $172 billion in 2024, reflecting the increasing prioritization of cyber security by businesses and governments worldwide.

Recent Security Events

Recent cyber security events have highlighted the persistent and evolving nature of online threats. Alongside these, it’s essential to consider VPN Chrome extension, which can add an extra layer of security to your online activities, especially when using public Wi-Fi or accessing sensitive information.

The emergence of new threat actors and tactics, including state-sponsored hacking groups and ransomware-as-a-service operations, underscores the need for proactive cyber security measures.

As cyber attacks become increasingly sophisticated and widespread, staying informed and implementing robust security practices are essential for mitigating risks and protecting against potential threats. Without any further ado, let’s have a look at the 7 most recent cyber security events.

  • AnyDesk Cyber Attack: AnyDesk, a remote desktop software provider, faced a cyber attack that compromised its systems. As a precaution, they revoked all security certificates and passwords for their web portal.
  • APT28 Targets: A state-sponsored group named APT28 has been attacking organizations globally, including in foreign affairs, energy, defense, and transportation, using NTLM Relay Attacks.
  • DirtyMoe Malware in Ukraine: Over 2,000 computers in Ukraine were infected by the DirtyMoe malware, capable of cryptojacking and launching DDoS attacks.
  • Cloudflare Breach: Cloudflare revealed a breach by likely state actors who accessed some documents and a bit of source code.
  • US Sanctions Iranian Officials: The US government sanctioned six Iranian officials in response to cyber attacks on an Israeli PLC vendor.
  • Layoffs at Security Companies: Okta and Proofpoint announced layoffs affecting around 1,000 employees in the US and Israel.
  • Clorox Cyberattack Costs: Clorox disclosed that a cyberattack has already cost them over $49 million, with more expected expenses in 2024.

Conclusion

The cyber security stats we’ve covered highlight how important it is to protect ourselves online. With cyber crimes on the rise and attacks like phishing and ransomware becoming more common, we need to stay alert.

Using technology like AI can help, but there’s also a shortage of skilled people in cyber security. Recent events, such as the AnyDesk cyber attack and DirtyMoe malware, show that threats are real and can affect anyone.

To stay safe, we should stay informed, use strong security measures, and be cautious online. By taking these steps, we can better protect ourselves from cyber threats and keep our digital world secure.

About Author: Anas Baig

With a passion for working on disruptive products, Anas Baig is currently working as a Product Manager at the Silicon Valley based company – Securiti.ai. He holds a degree of Computer Science from Iqra University and specializes in Information Security & Data Privacy.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Cyber Security)


facebook linkedin twitter

Hacking hacking news information security news IT Information Security Pierluigi Paganini Security Affairs Security News

you might also like

Pierluigi Paganini July 11, 2025
U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog
Read more
Pierluigi Paganini July 10, 2025
UK NCA arrested four people over M&S, Co-op cyberattacks
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

    Hacking / July 11, 2025

    UK NCA arrested four people over M&S, Co-op cyberattacks

    Cyber Crime / July 10, 2025

    PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

    Hacking / July 10, 2025

    Qantas data breach impacted 5.7 million individuals

    Data Breach / July 10, 2025

    DoNot APT is expanding scope targeting European foreign ministries

    APT / July 10, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT