<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cyber attacks in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Cyber-attacks/m-p/35949#M4555</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/68959571"&gt;@Marwan_TH&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can also look up this one which is released quarterly:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.ibm.com/security/data-breach/threat-intelligence" target="_blank"&gt;https://www.ibm.com/security/data-breach/threat-intelligence&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think you will find this one quite useful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 27 May 2020 22:16:07 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2020-05-27T22:16:07Z</dc:date>
    <item>
      <title>Cyber attacks</title>
      <link>https://community.isc2.org/t5/Industry-News/Cyber-attacks/m-p/35944#M4552</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm looking for a legitimate site that shows Cyber attack statistics for the past years with their loses/attack duration/discover time and their industries .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Marwan&lt;/P&gt;</description>
      <pubDate>Wed, 27 May 2020 17:17:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Cyber-attacks/m-p/35944#M4552</guid>
      <dc:creator>Marwan_TH</dc:creator>
      <dc:date>2020-05-27T17:17:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cyber attacks</title>
      <link>https://community.isc2.org/t5/Industry-News/Cyber-attacks/m-p/35946#M4553</link>
      <description>&lt;P&gt;Google for&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Verizon Data Breach Investigation Reports&lt;/P&gt;&lt;P&gt;Symantec Internet Security Reports&lt;/P&gt;&lt;P&gt;Microsoft Security Intelligence Reports&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most of them are updated annually&lt;/P&gt;</description>
      <pubDate>Wed, 27 May 2020 17:25:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Cyber-attacks/m-p/35946#M4553</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2020-05-27T17:25:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cyber attacks</title>
      <link>https://community.isc2.org/t5/Industry-News/Cyber-attacks/m-p/35948#M4554</link>
      <description>&lt;P&gt;Always good not to ask for kinetic network attacks as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- b/eads&lt;/P&gt;</description>
      <pubDate>Wed, 27 May 2020 21:06:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Cyber-attacks/m-p/35948#M4554</guid>
      <dc:creator>Beads</dc:creator>
      <dc:date>2020-05-27T21:06:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cyber attacks</title>
      <link>https://community.isc2.org/t5/Industry-News/Cyber-attacks/m-p/35949#M4555</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/68959571"&gt;@Marwan_TH&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can also look up this one which is released quarterly:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.ibm.com/security/data-breach/threat-intelligence" target="_blank"&gt;https://www.ibm.com/security/data-breach/threat-intelligence&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think you will find this one quite useful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 May 2020 22:16:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Cyber-attacks/m-p/35949#M4555</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-05-27T22:16:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cyber attacks</title>
      <link>https://community.isc2.org/t5/Industry-News/Cyber-attacks/m-p/35962#M4559</link>
      <description>&lt;P&gt;I got really useful information from the reports you provided.&lt;/P&gt;</description>
      <pubDate>Thu, 28 May 2020 11:54:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Cyber-attacks/m-p/35962#M4559</guid>
      <dc:creator>Marwan_TH</dc:creator>
      <dc:date>2020-05-28T11:54:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cyber attacks</title>
      <link>https://community.isc2.org/t5/Industry-News/Cyber-attacks/m-p/35963#M4560</link>
      <description>definitely that's what happening now, i checked that on Youtube</description>
      <pubDate>Thu, 28 May 2020 11:55:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Cyber-attacks/m-p/35963#M4560</guid>
      <dc:creator>Marwan_TH</dc:creator>
      <dc:date>2020-05-28T11:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cyber attacks</title>
      <link>https://community.isc2.org/t5/Industry-News/Cyber-attacks/m-p/35964#M4561</link>
      <description>Thanks, really good information on IBM report</description>
      <pubDate>Thu, 28 May 2020 11:55:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Cyber-attacks/m-p/35964#M4561</guid>
      <dc:creator>Marwan_TH</dc:creator>
      <dc:date>2020-05-28T11:55:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cyber attacks</title>
      <link>https://community.isc2.org/t5/Industry-News/Cyber-attacks/m-p/88696#M7800</link>
      <description>&lt;P&gt;A reliable source is the &lt;STRONG&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Verizon Data Breach Investigations Report&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;, which provides detailed statistics on cyber-attacks, including industries affected, attack methods, detection time, and breach trends.&lt;A title="d3c" href="https://d3cconsulting.com/wp-content/uploads/2024/09/CIAM-Strategy-Builder-1.pdf" target="_blank" rel="noopener"&gt;https://d3cconsulting.com/wp-content/uploads/2024/09/CIAM-Strategy-Builder-1.pdf&lt;/A&gt;&amp;nbsp; You can also check the &lt;STRONG&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;IBM Cost of a Data Breach Report&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt; for data on breach costs, response time, and recovery insights.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2026 20:35:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Cyber-attacks/m-p/88696#M7800</guid>
      <dc:creator>Mayaanis</dc:creator>
      <dc:date>2026-03-25T20:35:19Z</dc:date>
    </item>
  </channel>
</rss>

