2022 expert insights News-EN Newsroom




In the previous article we explored how our cyber attacks analysis works.


Companies, institutions, research centers, insurance companies that offer policies against cyber risks, professionals dealing with threat modeling, cyber risk management and cyber strategy: the cyber attacks analysis can be useful to various entities.

In particular, we can identify 4 main objectives.

a)  Check the Cyber ​​Security strategy

From the analysis of the threats depicted in the scenario that we present each year, it is possible to understand where cyber security strategies have failed and how to improve them.

In fact, it is important that companies, as well as institutions and even more critical infrastructures, frequently check their defenses, as cyber problems are constantly evolving.

Getting insight into the latest threats that have proven successful is certainly the best way to gauge how effective your defenses might be or where to make changes to your overall strategy.

b) Identify threats specific to your industry

Still with regard to the refinement of one’s cyber defenses, evaluating which problems of the digital world particularly afflict one’s own product sector is a priority.

Cyber ​​attacks, in fact, include different types and do not affect all business areas in the same way.

It is reasonable to assume that institutions, critical infrastructures and multinationals or large companies are more exposed to cyber risks than small or medium-sized companies, but it is also true that they have fewer resources to manage emergencies.

Obtaining information on specific threats for your area and analyzing their trends over the years is therefore absolutely strategic to assess the situation and understand how to best defend yourself.

c) Optimize the budgets dedicated to Cyber ​​Security

The world of Cyber ​​Security is complex, we know, and unfortunately there is no single solution capable of remedying all related risks like a “magic bullet“.

On the contrary, the threats are different, so the defensive strategies will have to foresee a mix of technical, training, organizational and management solutions.

The cyber attacks analysis is very important to understand which components must not be missing in your specific mix and how to spend the corporate Cyber ​​Security budget more effectively and efficiently.

Only by understanding which threats concern your own sector you can be certain that you are reasonably evaluating the most correct purchases and actions.

d) Obtain data on cyber incidents

Our sample includes over 7,000 successful cyber attacks in the last 4 years, including more than 2,500 against Critical Infrastructures.

A number of notable events from which it is possible to deduce a lot of information, from the reasons for the attack, the product sector targeted, the type of technique used, the geographical area, the criticality of the attack and related impacts.

These information can be very relevant in particular for insurance companies that provide policies against cyber risks and that need data useful for assessing the frequency and severity of threats and to be able to correctly calculate the premium for the mitigation of the residual risk.

Although the aim of raising awareness on IT Security issues remains our main objective, the criticality of the situation that has arisen following the extraordinary growth of cyber threats has convinced us that this analysis must continue to evolve, transforming itself into a real work and decision support tool.

Contact us for more details and see a sample of our data on our Dashboard.

Latest news

2022 expert insights News-EN Newsroom




When we started this research in 2011, our aim was to raise awareness and improve understanding of cyber threats.

At the time, “cyber” risks were not even considered in the World Economic Forum’s Global Risk Report, in which they were only introduced in 2015, and communicating the urgency of dealing with IT security was complex in the absence of quantitative data able to illustrate the problem and its evolution over time.

If 11 years ago, however, the situation could have seemed worrying to us, at this point it is no longer a mystery that we are in full emergency and that no one can consider themselves safe from cyber attacks.

So let’s see how our classification of cyber attacks works.


In over 10 years, the analysis and classification of cyber attacks has greatly evolved.

The methodology used has been refined and updated over time, both from the point of view of the number and quality of the sources, and the quantity of variables to describe the different phenomena and the taxonomies used to classify the data, completely revised to comply with what as much as possible to internationally recognized standards.

The classification system of the product sectors adopted to map the victims of cyber attacks is derived from the ISIC (International Standard Industrial Classification of All Economic Activities) of the United Nations and from the NACE (Nomenclature statistique des activités économiques dans la Communauté Européenne) of the European Commission. , from which also the Italian ATECO Codes derive.

Our classification of victims has obviously been adapted to also include the types of cyber attack targets excluded by the previous standards and includes a total of 20 product categories and 141 sub-categories.

The classification of attack techniques is derived from the MITRE ATT&CK®, the Threat Taxonomy of ENISA (European Union Agency for Cybersecurity), the Open Threat Taxonomy and several other frameworks.

It includes 8 macro-categories and 59 sub-categories.

The classification of the attackers derives from our experience in the field and represents a mapping between the main families of “bad actors” and the reasons for the attacks observed in over 10 years of investigations.

It includes 4 macro-categories and 13 sub-categories.

Since 2017 we have introduced an index of the severity of the analyzed attacks, classifying them on the basis of increasing levels, which allows us to carry out an analysis of the different impacts caused by the various IT incidents and to offer interesting information to both companies and institutions.


In 11 years, we have identified, classified and evaluated over 14,000 cyber attacks (on average more than 100 per month).

Of these, 7,144 occurred in the last 4 years, from 2018 to 2021 (of which 2,049 in the last year alone), demonstrating an impressive acceleration in the frequency and severity of cyber threats.

The sample includes successful cyber attacks that have become public.

This allows us to photograph the situation of the threats that have managed to overcome the defenses in the field and that have also had reputational repercussions, in addition to further economic, technological and often even legal damage.

On the other hand, our sample is necessarily partial in that some attacks never become public domain, or the victims manage not to advertise them (unless forced by circumstances or by regulatory obligations), or due to their nature they emerge more difficult (this is the case of cyber espionage and information warfare activities, certainly underrepresented compared to cybercrime and hacktivism).

It is therefore plausible to assume that the scenario depicted by the analysis of cyber attacks is even less critical than the situation on the ground.

Another reason to continue to evolve this analysis and use this data strategically.

Contact us for more details and see a sample of our data on our Dashboard!

Latest news

2022 expert insights News-EN Newsroom




Cyber ​​risk is something that can no longer be ignored.

Cyber attacks are always lurking and, as we described in the Clusit Report, they increase both in frequency and in criticality, maximizing the impacts of cybercrime.

On the other hand, the average time it takes for a company to identify a violation is 200 days, an exorbitant duration, during which criminals are free to carry out their maneuvers undisturbed.

Malware, data and identity theft, frauds, criminal activity by insiders, human errors, damage to computer hardware and software systems (accidental or not): the list of digital dangers to which business and assets are exposed corporate are infinite.

In addition to damage to IT systems and loss of data (company and customers’ data), it is also important to consider:

  • damage due to the interruption of activities;
  • loss of customers and suppliers;
  • legal issues and any claims for compensation from third parties;
  • reputational damage.

Cyber risk is certainly complex to assess: since it cannot be totally eliminated, it is a priority to find a way to mitigate it as much as possible.

Cyber ​​risk insurance is a useful tool for this purpose.

What is a Cyber ​​Risk Policy?

The insurances that allow you to manage cyber risk are policies useful for protecting commercial activities and business from criminal operations and related threats.

As we have seen, the components to be evaluated in cyber risk are many.

It is very important that the policy you choose offers 360 ° protection.

In addition, like car insurance, it is useful for the policy to allow you to evaluate which protections are worth adding based on the specifics of the client company, such as the sector, the size, the regulatory compliance to which it is subject.

This is in order to cover various potential needs in the event of a malicious or accidental event, such as:

  • economic losses
  • civil liability
  • legal protection
  • event management costs (for professionals to hire, for hardware and software purchases, for the protection of reputation)
Who needs a Cyber ​​Risk policy?

All companies, large and small, are exposed to cyber risks.

Large companies and multinationals can have very complex networks and IT systems and therefore a large attack surface.

Or, being often well known, they may be subject to more targeted attacks.

Small companies and professionals, on the other hand, despite being equally exposed to the risks of the cyber world, do not always have the budget sufficient to manage the consequences of malicious events.

Institutions and companies that offer critical services, such as those in the health sector, must finally protect the sensitive data they deal with and, at the same time, ensure operational continuity since they cannot allow cyber attacks or incidents of various kinds. (accidental or not) impact on the activities.

It is therefore evident that Cyber ​​Risk Policies can be useful to different realities, offering targeted and flexible protection.

Why subscribe to a Cyber ​​Risk policy?

In cyber security, preventive activities, such as the verification of computer systems, hardware and software (Vulnerability Assessment, Penetration Test, Code Review, …), or Awareness courses for staff, as well as defensive solutions (anti-malware, firewall , etc ..), are now essential to reduce exposure to digital threats.

But, however effective these may be, it will always remain a component of cyber risk that is difficult to assess and manage, as it is dependent on unforeseen events and complications.

Cyber ​​risk policies can be useful in mitigating these residual risks that could damage the business.
Cyber ​​risk insurance is useful for companies of all sizes, organizations and institutions.

Certainly not being able to replace the preventive operations or the defensive solutions of cyber security, they must, if anything, be considered as complementary to be sure of implementing a truly effective cyber security strategy.

Good job!

Latest news

					-----BEGIN PGP PUBLIC KEY BLOCK----- xsFNBFyONI0BEAC3wJRo5qhtr1KsqVdMz7b5JqHmt7H0ZZr14oJ9TV/hD9LMfrKpnQ94dFGnpfGa BKC1wSoJN4Yfs5lg5YmN4hmHmm6PkjgQdenVgL4YDfLDodwn5DgXKuywRBqIFbbnTDvFAb03DX2A FPnc+4g2QHsfiFycz+ISg/Z+8i21gY3j5oZlrdMKVWrNczrNc/lDJqJ36RSYDn1QzAW1ZGY/pUXk imPRvLew5Idr3462sZVVhuUFMD3Uf/W1SaS3bSEQM89pSYKZfo8AFpAs659Mn7gqKru6ndxilRdF wJGQuepqR8kz+vVPLyxJj68ii2ZBIY50RQvSBgJRnNF/Htp30cuk3v8jfSGZit9XYTTGQThVbfGR ZcKWze/iF+es110+mNXA/8s7jKs95PI+z1Foc9o74Ujs8dvjEGHTaESIEzX3JtEZUCZUiPt/P8pU Jw0ewbj1XCacYxYVsR7ODlf6GEsjt868WcjiqsuuZo2rzO4og9hFU5DlBzuePklfhw8dO5CiMN2H vtSkAn4DkgHqC+JiciHc9h5Cvvfjp52oQPj1eYmU3LkOvGFmPXVIts3VfxsQT3gk+DmrQ4J//fAl tNRSbMBnGu5F/qnLLkJmKRKPKNNcpjptFznKxLZbxW5QbAeDok3ho8YQACfADKcrmaIRkoPr8/mn PxZgMSMB87W7sQARAQABzSRTb2ZpYSBTY296emFyaSA8c29maWFAaGFja21hbmFjLmNvbT7CwZQE EwEIAD4WIQTNwEbcXbH0vegGlHCd6fr0nsTifwUCXI40jQIbIwUJEswDAAULCQgHAgYVCgkICwIE FgIDAQIeAQIXgAAKCRCd6fr0nsTifwKuD/4+3MaN+9eFiltI06fFBjr1Csh0OLFw89jFnpuYl9Sm ImVqmBwrnm+APxxLK4M+FMuNm4fW08X249t09Nsf0ba6UJ0HR/7/fRTipjzRLqHSr0+ZjVUGHhon fuuFZgNzPA5RmQZZCyiwyqZJs7pLn1QI/CtlDP6MsQhadywbkO/5LlDoBoYh/2DYNA/mtEfJbvc/ cOvfk47thj5OzcXJEWFxz7h2P5C2ELwxdhNPC+uqcOQkTScnuIBJooheJPhdmqOtOwrbUUIfaryM IESrol3Jg3/MUOe7FLXhwCSQGY1iefzl4py2jTeK936GMBHifLSUCA88lpE7ALkbf3+qJ9ABra9G e9e0dirIlPvFgBkEBBXsoIReQLrhHKFBtvKdrrE9Rb7kAwon+sW+3Uf6Ie3M8nTisGy2AmlI/tQ5 V0MHU2UJUNcc59hk7ADIlXN64eeqELgsMtlR4wEHd6nwcEpoPCTWfrVSwzsPtXUGNAGbgGxISv/F ltcFJ6Qw6Zy4f+YBEyCx/7GA3kjLllkcHv4kwHpP+WQCzbjh2JdkGEp5AY7puil1AtOFcbirbHbR 83KVeqx4Vvlyh2jhIDQYB/9qpTDC1xDKpndn40gnNd5hvjK0I0Xvbhb0PLhCpJQ5tsvPiQHjhOMF Wye3ZigaX1gTZxE29MLtwBbOYdGCYG0MrM7BTQRcjjSNARAAupAKTZXLRktriUVqhkZpU8zUVwrW ik6siStg7BppSJuKVW+Ic8QIagW0I48d2jZIIXrQRvqVBixn8eeBTE8Cujum1mZyhTw2sri3gE9i 81gisF17T/uewzRyYwx8obMfSEBnwJa44td7VjtbfLMRtfneK9R40+kELhhvXZa3DBbcG86zHVPU f1YkLX4RNSyjz4vOCX3WlcIAOr6MJA8DT+F5mUCVEhnkeUbflXtxRSeTUTfOw/3MYLs+mc6hWwLq gqTMcIQhDrYEY5wUgb5Mj86NR/uvsThL6MtWCJWVbfxHxM575woyTdD9E6HGO6loHYdky/7I+XFZ twgxsGn6HJYT+Gwn9BI5/DiwT1Qb/AyADktN1jGmZGTlniS+hly7rm0EHb2CTTM5zT1fh/sCOtQb nYIUf2in2cIfcFvzeFrUbDk2HfJMp5FmY6tBEV5xyNCww/mBkW2nuZy9CvAheJEOGoO8lyonPU2u ARq345LdbS6l+VdivPmZoLNpIMRw9MSTYmzm08h7C+/6hxzpjw1/nWZ+W2k9VpLutEs7KMtsbZR4 WhVFVS1uhqxrnjoeBHznh360Ou8SR+PFO0HIrYz4W7ayfcBhqcsGrM9u1E892gjUVTbPv8UoXQ8S Zm9ra2jqbfZGbyOpMIlyMzHTak7r0IZvCedEUDCimitbw98AEQEAAcLBfAQYAQgAJhYhBM3ARtxd sfS96AaUcJ3p+vSexOJ/BQJcjjSNAhsMBQkSzAMAAAoJEJ3p+vSexOJ/C+wP/iGvKG1NldCT2gR7 oWhmvgBnsD7qjC57RX0Go7WD1lmrWP4xWpvM6Tj0V4ZsXnyB8zUR38p49PPymjwy51FAss5PYh8S bVC1/sKC5Sae3kiAoMGH29MBAwL1IkJ8PNw6uOJHhUIJgKT5RWk2f7q3+Tha19slXwD/FC1IcBJK baxyVkG3cG5AnNvvKZyFAUNZ9FiBycaNHO4o6bCcCzSsaRLL2azudJLrF8UYPfTNBQ6Cr4QLqaRb t+ZqL2nqmcadO1AtxLtq5lQjxbhJ3jSYIcQJRq0ztbIBcPrdR2B/dfVED9cU5leSmNXxrh09gJ7N tmUpVo5fBcbf6fP7h2HIFBpH+G/8UUlcbm9pQ5Jcb8FEom0JrfaIAuv1gEIJAk1mkqLNzWUs8KuL nCBBVT2+2hfEZjtjUYbCLVB4LRCsLs9CY1wS3yKca90S8m0tfKcSj3K3k8qlKodkE2raX2GW2dm9 b200ENbb41B1uZlPts4Yh/AMfLqoNv8wyw0GlUQ2DqgDqviLANYbg4/GHwTLwO2b9UMHuTVU3woS 1LRKt0iPPsd+ir+9YRAVt5LB5XTS5C5cdIW9JSXQ+0cnbr3LPZCBulOew/M72liBINKWKGoUyueF 73ckNO9S7pzTOCpjn3+gAuzN/itwgwrMLoqUqqBuxzd7cKNJHTFdTIfTm53f =KIMs -----END PGP PUBLIC KEY BLOCK-----