Global Threat Intelligence Report 2019

Learn why security isn’t optional in the digital world

Can You Survive the Next Attack?

The 2019 GTIR highlights key challenges observed over the past year, including an escalation in coin mining, web-based attacks and credential theft. Here’s what you need to know.


Cybersecurity Insights for Protecting Your Digital Business

Digital transformation is driving changes in the way organisations operate. Challenges associated with these changes are not always easy to identify but keeping a keen eye on historical challenges can assist in predicting and avoiding negative circumstances. Understanding the evolution of attack techniques and the threats they pose is key to evolving your business and security practices and mitigating the attacks your organisation faces daily. The 2019 Global Threat Intelligence Report is a deep dive into these threats and provides at a robust methodology to tackle these threats.

The key findings in this year’s report are based on log, event, attack, incident and vulnerability data from clients and leverages the indicator, campaign and adversary analysis from our Global Threat Intelligence Platform. Finance and technology companies face the most attacks, while business and professional services, education and government make up the rest of the top five attacked sectors. And three of the most prevalent activities are coin mining, credential theft and web application attacks. Read the report for the in-depth findings.

2019 Global Threat Intelligence Report Highlights

Get the security policies and processes best suited for your business environment and the confidence that your IT environment is always secure.


Comprising of 17% of total, finance and technology companies face the most attacks


The three most prevalent threat activities are coin mining, credential theft and web application attacks


The largest number of attacks come from the United States (22%), followed by China (13%)

Key Takeaways

Global Key Findings

The study found 35 percent of all attacks originated from IP addresses within the United States and China, with application-specific and web-application attacks accounting for over 32 percent of all hostile traffic. Some 73 percent of all hostile activity falls into four categories: web attacks, reconnaissance, service-specific attacks and brute-force attacks.

Governance, Risk Management & Compliance

Organisations are improving at keeping up with changing compliance and regulatory requirements. However, the incident response capabilities remain behind the curve or are satisfying requirements by only a thin margin.

Security Challenge: Coin Mining

The threat of illicit cryptocurrency mining represents an increasingly common cybersecurity risk for enterprises and individuals, with mining detections increasing by 459 percent between 2017 to 2018. Technology and education sectors account for over 86 percent of all coin mining detections