Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesLogical Security

Curbing cybersecurity risks at the core with public online data collection

By Omri Orgad
Data security data privacy public data
August 10, 2021

Cyberattacks are getting more and more sophisticated by the minute. There has been a staggering 102% increase in the number of organizations affected by ransomware attacks this year compared to the beginning of 2020, and there are no signs of this trend slowing down, according to Check Point Research (CPR).

CPR found that the American healthcare and utilities sectors have been the most targeted sectors since the beginning of April 2021 – as the recent Colonial Pipeline cyberattack has demonstrated. According to the FBI, the professional cybercriminal group DarkSide was responsible for the ransomware attack on the pipeline network. Working in a Ransomware-as-a-Service (RaaS) model, DarkSide leverages a partner program to execute cyberattacks. 

While accelerated cross-industry digitalization has brought about myriad economic benefits, it has also revealed more vulnerable entry points into multiple sectors’ IT systems and data networks.

Cybersecurity experts predict that this year, there will be a cyberattack every 11 seconds, with financial damages from cybercrime expected to reach $6 trillion. That’s nearly double what it was in 2019 (every 19 seconds) - and quadruple the rate in 2016 (every 40 seconds).

Consequently, cybersecurity and protecting against cybercriminals are high on the agenda for both private sector businesses and public sector organizations. It is more critical than ever to prioritize fixing vulnerabilities to combat such attacks and preserving valuable data by using advanced comprehensive technologies and solutions.

Recognizing evolving risks

Despite increased awareness and technical innovations, malicious attacks are still proving successful. In the past, the biggest cyber threat was the theft of credit card information; now, the risk has evolved, thanks to increasingly sophisticated methods used by attackers.

Take phishing emails as an example. As of February 2021, there have been more than 2.168 million websites marked as phishing sites, according to Google Safe Browsing. Furthermore, ESET’s Threat Report reveals that there has been a 9% rise in malicious email detections between the Q2/Q3 periods  compared to Q1/Q2 in 2020.

It's easy to see why organizations have become focused on avoiding damaging attacks. Although security teams can offer some protection, when it comes to emails sent to a corporate inbox, cybercriminals continue to find new ways around IT defenses and protocols. Highly specialized attacks can be planned through spear phishing and social engineering, which focus on targeted individuals and enable emails containing malicious links to look as legitimate as possible.

So, amid this constant game of cat and mouse between security teams and cybercriminals, what can be done to fight back against attacks that involve malicious links?

Analyzing security threats and vulnerabilities – enter online data collection platforms

Collecting publicly available online data enables security teams to build multiple layers of data when checking for malware being distributed via links within emails or by other fraudulent means. More importantly, online data collection allows for the creation of what’s known as a “secure sandbox environment,” which catches the fraudster deploying the malware and detonating the link within it. As such, if there is cause for concern, it is contained and dealt with, posing no threat to the wider IT environment. However, data doesn’t just help to expose malicious links – it also allows teams to test their infrastructure when going through "red teaming" or user emulation procedures. Red teaming allows organizations to perform comprehensive tests that help expose potential vulnerabilities on every attack level. It also offers a better understanding of how to respond to potential cyberattacks, levelling the playing field against attackers.

Data collection can be deployed to reveal potential vulnerabilities and risks within hardware and software-based systems such as networks, applications, routers, switches, and appliances. By collecting publicly available data, red teams have a better picture of the current delivery networks and cybersecurity landscape. As a result, they’re better informed and can perform focused and realistic exercises and updates that wouldn’t be possible without the added benefit of data. This further allows them to review and analyze log data and to utilize security information and event management (SIEM) platforms for visibility and detection of live intrusions. They are also able to triage alarms in real time. In short, the extra level of intelligence-led security assessment that data enables allows teams to thoroughly test organizations’ cyber resilience, as well as threat detection and incident response capabilities.

Exposing malicious sites at the core

One non-profit organization focused on exposing malicious sites and sharing the information globally is  abuse.ch. They believe that there are millions of fraudulent sites emerging and the only verified way to detect them is by using an online data collection platform. Without data collection, these sites can easily conceal their tracks and appear legitimate. Onceabuse.ch identifies a website that is causing harm, they immediately publish the information on the project website where security researchers, security solutions vendors, or law enforcement teams can take action. This data is universally available for free and used broadly by open-source tools. For example, many Domain Name System (DNS) service/software providers like regularly access this list of sites  – using these datasets protects millions from cybersecurity threats.

Data collection platforms to the rescue

Regardless of size or sector, all organizations are prime targets when it comes to cyberattacks. It’s therefore important that they remain one step ahead of those looking to break into their systems. To achieve this, they need to access the latest technologies available – this is where online data collection can provide the upper hand. Being well-informed and tested is the only way to comprehensively secure an organization’s systems. Knowing your threat landscape as well as verifying it means taking full control of your safety, always.

KEYWORDS: cyber security cyberattack data privacy data protection

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Omri Orgad is North America Managing Director at Bright Data (formerly Luminati Networks). Orgad explores the many benefits that collecting publicly available data online brings to security teams looking to test and solidify their security infrastructure against increasingly sophisticated cyber threats.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • data privacy

    The California Consumer Privacy Act Has Data Security at its Core

    See More
  • covid-19 vaccine

    Data privacy risks of employee vaccine status collection

    See More
  • Security newswire default

    Big Data Collection Needs Transparency for Public Acceptance

    See More

Events

View AllSubmit An Event
  • September 3, 2024

    From DDoS Protection to WAAP: How Layered Protection Enhances Your Cybersecurity Strategy

    ON DEMAND: By participating in the webinar, attendees will gain enhanced knowledge of cyber threats and understand the current spectrum of cyber threats facing businesses.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!