8 top cyber-attack maps and how to use them

Most of the cyber-attack maps online today are just eye candy, but there are some creative ways they can be used.


The FireEye cyber-attack map lacks the detail presented by the others, and keeps things simple. It tracks historical data and splits it into industry segments and top country of origin for attackers. The data displayed is "based on a subset of real attack data, which is optimized for better visual presentation."

fireeye cyber attack maps FireEye

Arbor Networks

The cyber-attack map from Arbor Networks is a hybrid map that was created in part with Google Ideas. The Digital Attack Map tracks DDoS attacks with data from Arbor's ATLAS threat intelligence system. The raw data is sourced from more than 300 ISP customers, and 130Tbps of global traffic. The map will visualize DDoS attacks and allow filtering by size and type.

arbor networks cyber attack maps Arbor Networks

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Follow our new CSO Australia LinkedIn
Follow our new social and we'll keep you in the loop for exclusive events and all things security!
Have an opinion on security? Want to have your articles published on CSO? Please contact CSO Content Manager for our guidelines.

More about AppleArbor NetworksCheck PointCSOFireEyeFortinetGoogleIDGKasperskyTrend MicroTwitter

Show Comments

Featured Whitepapers

Editor's Recommendations

Brand Page

Stories by Steve Ragan

Latest Videos

More videos

Blog Posts