SHARE
Facebook X Pinterest WhatsApp

The Evolution of Cyber Attacks

It used to be that programmers created and launched annoying but mild virus and spam malware to show the world just how brilliant they were and to gain notoriety. Today, we live in a very different world where cyber threats and attacks are recognized as significant global, political and commercial challenges with serious financial and […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Aug 27, 2013

It used to be that programmers created and launched annoying but mild virus and spam malware to show the world just how brilliant they were and to gain notoriety. Today, we live in a very different world where cyber threats and attacks are recognized as significant global, political and commercial challenges with serious financial and reputational consequences.

The cyber criminal community has evolved from pranksters, lone wolves, and organized gangs to nation-states and hacktivist groups whose primary results have been increased costs and lost productivity. As enterprises and governments connect literally everything to the Internet, the size of their attack surface has grown, opening more opportunities for cyber criminals. Many of their current exploits are going unnoticed.

Here’s a closer look at the evolution of cyber attacks, identified by Venafi.

The Evolution of Cyber Attacks - slide 1

Click through for a look back at the last 16 years and the rise of cyber attacks, as identified by Venafi.

The Evolution of Cyber Attacks - slide 2

Sixteen years: from viruses, worms, DDoS, advanced persistent threats, to key and certificate-based attacks.

The Evolution of Cyber Attacks - slide 3

Viruses, Worms & DDoS – Damage Level: Disruption

The Evolution of Cyber Attacks - slide 4

Viruses, Worms & DDoS – Damage Level: Disruption

The Evolution of Cyber Attacks - slide 5

Viruses, Worms & DDoS – Damage Level: Disruption

The Evolution of Cyber Attacks - slide 6

For-Profit Malware – Damage Level: Cybercrime

The Evolution of Cyber Attacks - slide 7

For-Profit Malware – Damage Level: Cybercrime

The Evolution of Cyber Attacks - slide 8

APTs – Damage Level: Cyber Espionage

The Evolution of Cyber Attacks - slide 9

APTs – Damage Level: Cyber Espionage

The Evolution of Cyber Attacks - slide 10

Code Signing Certificates, SSH Key Theft, Server Key Theft & Weak Crypto Exploits – Damage Level: World Without Trust

The Evolution of Cyber Attacks - slide 11

Code Signing Certificates, SSH Key Theft, Server Key Theft & Weak Crypto Exploits – Damage Level: World Without Trust

The Evolution of Cyber Attacks - slide 12

Code Signing Certificates, SSH Key Theft, Server Key Theft & Weak Crypto Exploits – Damage Level: World Without Trust

The Evolution of Cyber Attacks - slide 13

Code Signing Certificates, SSH Key Theft, Server Key Theft & Weak Crypto Exploits – Damage Level: World Without Trust

The Evolution of Cyber Attacks - slide 14

Code Signing Certificates, SSH Key Theft, Server Key Theft & Weak Crypto Exploits – Damage Level: World Without Trust

The Evolution of Cyber Attacks - slide 15

Code Signing Certificates, SSH Key Theft, Server Key Theft & Weak Crypto Exploits – Damage Level: World Without Trust

The Evolution of Cyber Attacks - slide 16

Code Signing Certificates, SSH Key Theft, Server Key Theft & Weak Crypto Exploits – Damage Level: World Without Trust

The Evolution of Cyber Attacks - slide 17

Code Signing Certificates, SSH Key Theft, Server Key Theft & Weak Crypto Exploits – Damage Level: World Without Trust

The Evolution of Cyber Attacks - slide 18

Code Signing Certificates, SSH Key Theft, Server Key Theft & Weak Crypto Exploits – Damage Level: World Without Trust

The Evolution of Cyber Attacks - slide 19

Code Signing Certificates, SSH Key Theft, Server Key Theft & Weak Crypto Exploits – Damage Level: World Without Trust

The Evolution of Cyber Attacks - slide 20

100 percent of over 2,300 global 2000 organizations surveyed acknowledged having attacks on keys and certificates in the last two years.

The Evolution of Cyber Attacks - slide 21

Today’s cyber criminal attack vector of choice.

Recommended for you...

How DeFi is Reshaping the Future of Finance
Kihara Kimachia
Aug 25, 2022
Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.