About these ads

About Me

PPI was born 42 (sigh!) years ago in Senigallia, a charming town on the Adriatic coast (County of Le Marche) known for its Velvet Beach. After graduating in (astro)physics from the University of Milan, I moved to Rome and began to cut my teeth on networks and security in Matisse SPA and later in Telindus.

I have been working steadily on computer security industry for more than 10 years. After Telindus, in 2004 I moved to Business-e SPA, a leading Italian System Integrator belonging to the Itway Group galaxy with the role of Technical Manager and (since October 2011) Chief Technological Officer. I held this role until June 2012.

On July 1, 2012 I joined Lastline, Inc. with the role of Senior System Engineer.

After a youth spent fiddling with a ZX Spectrum (16K), the real attraction for networking (and later for security) would break out after many years, in a completely random manner, when I was studying black holes (we were talking about attraction, weren’t we?) at CNR (National Research Council) of Milan. With great surprise I discovered to be more attracted by the animated S of the Mosaic browser, used without any knowledge to browse the catalogs of the Hubble telescope, rather than by black holes and neutron stars that I should have studied.

Shortly after graduation, this attraction would have become my work …

For those interested in more information about my professional activities:


View Paolo  Passeri's profile on LinkedIn

Follow Me on Twitter

About these ads
  1. Micha
    August 12, 2011 at 5:59 am

    Hello,

    Thanks for the nice work (one-year-of-android-malware-full-list)!
    By the way, the ZX Spectrum was part of my beginnings with such devices as well.
    Greetings from Japan.

  2. April 4, 2012 at 11:08 pm

    Nice to know about you.. I am the one whos running hackread.com. Good to know you :)

    • April 4, 2012 at 11:10 pm

      Nice to meet you, you have become one of my preferred sources for the timelines! :)

  3. Alme
    May 2, 2012 at 3:34 pm

    Hello Paolo
    Thank you very much for your posts, ideas and contribution with the timeline.
    Im enjoying this site more and more day after day :).Keep up the great work.

  4. Bob Loblaw
    July 5, 2012 at 5:50 pm

    I appreciate your aggregation of infosec information; informative and interesting. Thanks!

  5. Hugo
    July 13, 2012 at 4:55 am

    Hi Paolo.
    Thank your posts.
    Geetings from Ecuador

  6. John Smith
    August 26, 2012 at 9:11 am

    add flattr buttons to ur articles pls, also nice monthly statistics. love it!

  7. JOSHA
    November 28, 2012 at 10:29 am

    Man you are doing a great work, amazing work you know….

  8. February 5, 2013 at 11:02 pm

    Hi Paolo

    Just to let you know that I now officially use your blog as my primary source of information for my monthly rapport. If you want to know more email me as I can’t openly disclose much

    • February 6, 2013 at 10:12 am

      Thanks! I am happy to know you are using my resource and find it useful!

  9. March 21, 2013 at 3:19 pm

    I still have my ZX, and Amiga and commodore 64

  10. Aruthur
    April 4, 2013 at 6:44 pm

    I’d like to useone of your charts in a paper that I’m writing. How can i request permission to use it? it’s the infographic on notable cyber attacks against aviation industry.

    • April 4, 2013 at 8:44 pm

      Of course you can use what you want. Please only quote the source!

  11. Aruthur
    April 5, 2013 at 2:56 pm

    Thanks!!!

    • Precilla
      April 16, 2013 at 5:48 pm

      Hi Paolo,i am doing a masters project in digital forensic,how can i get the da ta that was used to derive the daily trend of attacks graph, i need for my research.

      Thank you

  12. Fabrizio
    May 9, 2013 at 6:00 pm

    Hi Paolo,
    I just realized who is the author of this blog, and not only want to thank you for this bright idea you’ve built and grown. I am also surprised to see how close you are! Have been working with Business-E for a while as I have been in a major Telco SOC managing SIEM and Trendmicro solutions for which Business-E was reseller and trainer.

    Nice to see how a simple but focused project can be so effective!

    Really awesome work!

    Cheers,
    regards,
    Fabrizio

  13. August 22, 2013 at 12:06 am

    Hi
    I’m a student of university of Liverpool and I’m now working on my dissertation about hacktivism. I’m really like your work. it’s very helpful.Is there any possible you can tell me how you get those data? And is these data accurate and complete?and can I use these data in my work?

    • August 22, 2013 at 10:35 am

      Hi Leon,
      the source of the data of the timelines are reported at the bottom of each timeline. The source of the stats are the corresponding timelines. I guess the data is accurate since I rigorously quote the source. Of course it cannot be complete since (I clearly state this), however hopefully indicative of the Cyber Landscape. You can do whatever you want provided you quote the source :) If you also want I will be glad to share the raw data.

      • August 22, 2013 at 11:01 pm

        Hi,
        I‘’m glad that you replied so quickly, thank you for share the raw data with me it would be very helpful. here is my e-mail address :Leon1988cr@gmail.com
        thank you again.

  14. August 23, 2013 at 10:07 pm

    Paola, Wonderful blog and a fantastic source of information. I am working on a college paper for my information security class and wanted to do a deep dive analysis on some of the data you have collected. Based on the conversations above and in your blog you are very generous in sharing your data. I wanted to request a copy of the raw data if possible. I will be sure to properly quote you as the source and reference the blog for all instances the data is used. my e-mail is cyb3r_dav3@hushmail.com. Thanks!

  15. Smallies
    September 5, 2013 at 11:29 am

    Awesome stuff thank you

  16. Bill
    September 20, 2013 at 4:33 pm

    Hi Paolo,
    Great site – it came recommended in a presentation I attended recently. By any chance is the timeline available in clear text (as opposed to an image) anywhere? I ask because I’d love to setup a Google alert for whenever my industry ever shows up in the timeline.

  17. October 3, 2013 at 7:22 pm

    Love your site and appreciate the metrics!!! Keep movn’!

  18. Joseph Yacura
    October 19, 2013 at 9:56 pm

    Thank you for compiling this critical data regarding cyber attacks. Is there anywhere I can get access to this data in a spreadsheet format to attempt to perform some statistical analysis?

    Thank you,

    Joe Yacura

  19. January 16, 2014 at 2:27 pm

    Thanks for your excellent information on Infosec and cyber attack time line, I am your regular reader and use your data in many of my cyber security conference presentations and always acknowledge you in my presentation slides. .. Regards .. Abbas Kudrati.. from Kuwait and Melbourne

  20. Louis
    February 4, 2014 at 4:56 pm

    Thanks for great Info. I would like to establish contact and talk about our work at ENISA (ENISA Threat Landscape). Would be great if you could contact me per mail. Thanks, Louis

  21. Jirina
    February 7, 2014 at 2:02 pm

    Hello Paolo, I would like to join those who very much appreciate your work. I have the same wish like many others – is it possible to get data in a spredsheet ? And the rest of the last year Sep – Dec 2013 ? I would like to make analyses of attacks to special business sector. Looking forward to your answer to my email.

  22. marinejohngalt
    February 10, 2014 at 6:05 am

    Great site. As a researcher, I found your timeline fantastic. If I could offer one suggestion, would it be possible to make searches based upon suspected country of origin/country attacked, victim/suspected attacker? I tried to use the search bar, but, alas, I must not be that clever.

    Keep up the outstanding work.

    • February 15, 2014 at 1:37 am

      Thanks! If you want I can give the raw data from where you can easily query the countries.

  23. Bud
    February 11, 2014 at 1:18 pm

    Paolo:

    We are publishing a report on defense and security trends and would like to cite you as a source on cyber attacks. I was hoping to get the source data for 2012 and 2013 in whatever format you have available. Basically our report breaks down countries into four categories so I would like to do the same with your data. Please see my email in the details of this post. I am happy to provide you with a copy of last year’s report. Of course, your data would be properly sourced to you and this website.

    Please let me know if I can get a copy. Feel free to email me with any questions!

    Regards,

    Bud Roth

    • February 15, 2014 at 1:38 am

      Apologies for my delay. I just sent you the link of the repository with the raw data.

      Paolo.

  24. Alessandro
    February 17, 2014 at 12:28 pm

    First of all many many thanks for your work.
    Then a request ;)
    Have you got or can you point me to statistical data about cybercrime in Italy (es Polizia Postale data on ransomware, identity theft and so on)?
    I’ve searched on italian law enforcement sites with no success :(

    • April 9, 2014 at 10:30 pm

      Try to have a look the yearly report of Clusit. You can request a copy from Clusit website (www.clusit.it).

  25. Emilio
    April 9, 2014 at 10:18 pm

    Hi Paolo,

    I am putting an internal slide deck with a slide on web attacks and I really like your monthly graphics. I would like to use your data for the last few years to show the trend. I will add you as source for people to come to your site. Can you give me access to the raw data?

    Thanks!
    Emilio.

  26. mahesh
    April 17, 2014 at 9:15 am

    Nice work man!

  27. Marissa
    June 3, 2014 at 9:01 pm

    Hi! I am working on an undergraduate thesis and am having an incredibly hard time finding statistics that show cyberattack trends over the last couple of years. Your site is very helpful however i was wondering how you acquire your statistics? Would love to use you as a source but i am not sure i can. Also do you think there is a lack of information released regarding state sponsored cyber attacks? Or lack of information regarding successful breaches in government systems? If you could maybe point me to some useful sources that would be awesome. My thesis is due tomorrow so i am really trying to beef up my statistics as that is the part i am noticeably lacking in

    • June 3, 2014 at 10:19 pm

      Dear Marissa, the stats are taken from the timelines that I publish (almost) on a bi-weekly basis. On the bottom of each timelines the source are reported. I collect each month the most remarkable attacks according to me. However you could try to have a look to datalossdb.org and hacksufer.com.

      Good Luck!

  28. August 8, 2014 at 11:27 am

    Dear Paolo,
    Excellent work!
    I am interested in analyzing the raw data.
    Would it be possible to get a link to the raw data?
    Thanks!
    –Theodoor

  29. Ali Zavarahi
    August 17, 2014 at 3:46 pm

    Dear Paolo
    Thank you so much for sharing those impressive information.
    Ali

  30. BertAl
    October 14, 2014 at 10:13 am

    Hello Paolo,
    Your work is really really interesting! Would it be possible to have a look at your raw data for my theses please? I sent you an email at ppasseri@gmail.com.

    • October 15, 2014 at 8:39 am

      Apologies for the Delay, I sent you the raw data

  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

Join 3,091 other followers