Visit us at it-sa 2024!

GetyourfreeticketGetyourfreeticket

Whitepapers & Co

Cybersecurity Report H1 2024

The new Cybersecurity Report H1 2024 from Myra provides IT decision-makers with a comprehensive overview of the current trends and challenges in the field of cybersecurity. Learn more about:

 
✔   Cyberattacks on critical infrastructure (KRITIS)

✔   Threats for web applications

✔   DDoS Threat Insights

✔   The challenge of NIS-2

✔   AI: opportunities & risks
 

To the Download

Trends & Key Insights

Download the Cybersecurity Report for free

All information on data processing can be found in our privacy policy.

Massive growth in harmful requests

As a specialist protection service provider for organizations in highly regulated sectors, Myra can provide a detailed picture of traffic developments in the financial, insurance, healthcare, public sector and KRITIS sectors.
 

  • In the first quarter of 2024, there was a 29.8% increase in malicious requests on websites, online portals and web APIs compared to 2023.

  • In the second quarter, the increase is even more significant at 80%.

  • Over the entire first half of 2024, the increase in malicious requests amounted to 53.2% compared to the previous year.

Expert interview with zeroBS CTO Markus Manzke on the DDoS threat (excerpt)

Markus Manzke is Chief Technology Officer (CTO) of zeroBS, a Germany-based pentesting company. zeroBS helps its customers understand and address the risks of operating Internet-based infrastructures.

(For the full interview and more information from zeroBS on the new HTTP/2 Continuation Flood attack technique, download the report now).

DNS attacks seem to be becoming more prominent, which methods are leading the way?

Since 2023, an increase in DNS flood attacks has been observed by various manufacturers. DNS servers are put under so much strain that they cease to operate and the attacked target is virtually digitally erased.

Which attack vectors cause companies the most difficulties in defending themselves?

The most successful attacks currently take place via the application layer, as this has an extremely high degree of complexity due to a combination of the attack surface (number and distribution of targets) and the technology used (classic web applications, APIs, API-generated websites).

How the Threat Report can help you

Use the data, analyses and forecasts in the report

Recognize risks

Find out which dangers threaten your business.

Derive measures

Recognize the potential of holistic protection solutions.

Close gaps

Implement tailor-made solutions to protect your digital assets.

Build resilience

Use the business continuity you gain as a competitive advantage.

Get in touch

Protect yourself effectively against cyber attacks

We will be happy to show you in a free demo how Myra can improve your security and answer all your questions.

Request a free demo