Highest increase in global cyberattacks in two years

August 2024 Information Security, News & Events

Check Point Software Technologies released new data on Q2 2024 cyberattack trends, segmented by global volume, industry, and geography. The rise in cyberattacks is driven by increasing digital transformation and sophisticated cybercriminal techniques, including AI and machine learning.

Regionally, Africa experienced the highest average weekly cyberattacks per organisation in Q2 2024, with an average of 2960 attacks, marking a 37% increase compared to the same period in 2023. Latin America saw the most significant rise, with attacks increasing by 53% year-over-year to an average of 2667 per week. The Asia-Pacific (APAC) region followed with a 23% increase, highlighting the global spread of cyber threats.

Key Africa statistics

Highest average weekly cyberattacks: Africa experienced the highest average weekly cyberattacks per organisation in Q2 2024, with an average of 2960 attacks, marking a 37% increase compared to the same period in 2023.

Drop in ransomware attacks: Africa accounted for 1% of all reported ransomware attacks in Q2 2024, showing a 55% decrease from the previous year.

Top attacked countries: South Africa, Kenya, and Nigeria are among the top African countries facing significant cyber threats. South Africa experiences an average of 1450 weekly attacks per organisation, marking a 4% YoY increase.

Prevalent malware types: Qbot and FakeUpdates (SocGholish) are among the most prevalent malware types affecting African organisations, with significant impacts in South Africa.

Key global statistics

• Global increase: In Q2 2024, Check Point Research recorded a 30% year-over-year (YoY) increase in cyberattacks globally, with organisations facing an average of 1636 attacks per week.

• Most attacked industries: Education/research (3341 attacks per week), government/military (2084 attacks per week), and healthcare (1999 attacks per week) were the top three most attacked industries.

• Regional impact: Latin America (+53%), Africa (+37%), and Europe (+35%) experienced the largest YoY increases in cyberattacks. Africa had the highest volume of attacks, averaging 2960 weekly attacks per organisation.

Ransomware attacks

Ransomware attacks involving public extortion increased by 13% year over year, totalling approximately 1200 incidents globally in Q2 2024. North America was the hardest hit, accounting for 58% of all reported ransomware attacks. Although only comprising 1% of these attacks, Africa still shows a significant need for improved cybersecurity defences.

Industry impact

The manufacturing sector was the most affected, representing 29% of publicly extorted ransomware attack victims globally, with a 56% YoY increase. Healthcare followed, accounting for 11% of the attacks, with a 27% increase. The communications and utilities sectors experienced dramatic rises in ransomware incidents, with increases of 177% and 186%, respectively.

Prevention and mitigation strategies

To safeguard against these rising threats, organisations must adopt comprehensive cybersecurity strategies:

• Enhance security posture: Regularly update and patch systems and implement multi-layered security measures, including firewalls and endpoint protection.

• Employee training and awareness: Conduct regular training sessions to educate employees about the latest cyber threats and phishing tactics.

• Advanced threat prevention: Use technologies such as sandboxing and anti-ransomware tools to detect and block sophisticated attacks.

• Zero trust architecture: Implement strict identity verification for every person and device attempting to access network resources.

• Regular backups and incident response planning: Ensure regular backups of critical data and develop comprehensive incident response plans.

• Network segmentation: Isolate critical systems to limit the spread of attacks and protect sensitive information.

• Vulnerability management: Conduct regular vulnerability assessments and penetration testing, prioritising remediation efforts based on potential impact.

The dramatic rise in cyberattacks globally, particularly ransomware incidents, signals an urgent need for robust cybersecurity frameworks. Organisations must prioritise cybersecurity, adopting customised strategies to combat the evolving threat landscape effectively. By implementing advanced security measures, fostering a culture of awareness, and preparing for potential incidents, businesses can better defend against the relentless tide of cyber threats.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Africa’s largest Zero Trust platform
NEC XON Information Security Commercial (Industry)
Africa has reached a significant cybersecurity milestone with the successful deployment of the continent’s largest Palo Alto Networks Prisma Access and Prisma Access Browser Zero Trust environment, supporting secure remote access for more than 40 000 users for a large enterprise in Africa.

Read more...
Supply chain attacks top threat over 12 months
Information Security
Supply chain attacks have become the most prevalent cyberthreat confronting businesses over the past year, according to a new Kaspersky global study, with nearly one-third of companies worldwide experiencing a supply chain threat in the past year.

Read more...
From vibe hacking to flat-pack malware
Information Security AI & Data Analytics
HP issued its latest Threat Insights Report, with strong indications that attackers are using AI to scale and accelerate campaigns, and that many are prioritising cost, effort, and efficiency over quality.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Microsoft 365 security is a ticking time bomb
Information Security
Across boardrooms and IT departments, a dangerous assumption persists that because data is stored in Microsoft 365 and Azure, it is automatically secure. This belief is fundamentally flawed and fosters a false sense of protection.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.