About IPew
Attack maps are the
<blink> tag of information security. They are pure eye candy, meant to scare the general public and
WOW unsuspecting executives visiting Security Operations Centers. Yet, security vendors keep cranking them out. We didn't want organizations without "real" data or l33t animation skills to to feel left out, so we built this map for anyone to use [CC BY-SA]. Plus, they're all missing sound effects! And, most (all, really) use mind-numbingly dumb map projections, begging the question:
"Does Greenland make my map look big?".
The default map uses a statistical model (infrequently updated) for source "attack" node country of origin & frequency while destinations are fully randomized. The default sound is a Star Wars "blaster" (guess which one!). Sounds can be customized and an organization name can be specified, plus there are a few other
interesting options.
Check out the
github repository for more information and instructions on how to customize the map options for maximum effect.
Brought to you by
@alexcpsec,
@hrbrmstr &
Data-Driven Security
The "Transgol Cyber Protection Threat Map" is based on a subset of real attack data, which is optimized for better visual presentation. Customer information removed for privacy.
This screen size is not supported
Please resize the browser window
or
View Full Screen
SkyNet Corporation
Local Time
00:00:00
Threads
0
Active Threads
0
Attacks Today
0
Cpu
0
RAM
0
Temperature
0c
Attackers
Top Countries
(Past 30 days)
Targets
Top Countries
(Past 30 days)
TOP REPORTED PROCESSES[0]
TOP SUCCESS INCIDENTS[past 24 HRS]
TOP REPORTED ATTACKS[Real Time]