Threat Intelligence from Threat Protection by Mastercard

Helpful information and reports from the Threat Intelligence team at Baffin Bay Networks to help keep your organization safe.

New Report

2024 Retrospect: Observations from the Past Year’s DDoS and Web Application Attack Landscape

2024-Retrospective-250
Our latest report, 2024 Retrospect: Observations from the Past Year’s DDoS and Web Application Attack Landscape, dives deep into these emerging trends, providing exclusive insights from our Threat Protection team’s real-world data.

Threat Intel Reports

rrfavicon
Report

Technical Threat Report: Q1 2024

This threat report provides an in-depth analysis of global cyberattack trends from January to March 2024. It highlights the most active threat actors, top attacking networks, and regions with the highest malicious activity. Key insights include Distributed Denial of Service (DDoS) attack trends, credential stuffing attempts, and the most frequently targeted network ports.

rrfavicon
Report

2023 Israel-Hamas Conflict: A Cyber Perspective

This report examines the cyber dimension of the 2023 Israel-Hamas conflict, highlighting the surge in cyberattacks accompanying the physical war. It explores the role of state-sponsored threat actors, hacktivist groups, and cyber criminals, detailing their motivations, attack methods, and geopolitical affiliations.

rrfavicon
White Paper

Technical Threat Report: Q4 2023

Covering October to December 2023, this technical threat report provides an overview of cyber threats observed worldwide. It details the most common attack vectors, including port scanning, malware campaigns, and credential stuffing.

CheckMark
Report

Technical Threat Report: Q3 2023

This report analyzes global attack traffic over a 90-day period from July 1, 2023, to September 30, 2023. During this timeframe, Baffin Bay Networks' global sensory network recorded approximately 430 million malicious events. The majority of these events were attributed to port scanning (54%) and credential stuffing (46%), with additional activities including malware uploads, spam, and HTTP attacks.
threatprotection_by_mc_cmyk_pos

Are you interested in looking up suspicious a IP address? Check out our IP Lookup tool to verify the information you are seeing. 

Threat Protection Demo

Interested in seeing our comprehensive solution in action? Sign-up for a custom, live demonstration of Threat Protection today.