14 datasets found
  1. Most common data exfiltration behaviors during insider threats in the U.S....

    • statista.com
    Updated Jul 9, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Most common data exfiltration behaviors during insider threats in the U.S. 2020 [Dataset]. https://www.statista.com/statistics/1155846/most-common-data-exfiltration-insider-threat-types-usa/
    Explore at:
    Dataset updated
    Jul 9, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2020
    Area covered
    United States
    Description

    A 2020 study revealed that e-mail forwarding to a personal e-mail account was the most common method of sensitive data exfiltration during insider incidents. Misuse of cloud collaboration privileges was ranked second with a ***** percent occurrence rate.

  2. Increases in cyber attacks according to IT professionals in 2021, by type

    • statista.com
    Updated Jun 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Increases in cyber attacks according to IT professionals in 2021, by type [Dataset]. https://www.statista.com/statistics/1258261/covid-19-increase-in-cyber-attacks/
    Explore at:
    Dataset updated
    Jun 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2021
    Area covered
    Worldwide
    Description

    According to a survey conducted among IT security professionals worldwide, an increase in cyber attacks since the COVID-19 pandemic has been mostly seen in the area of data exfiltration and leakage. This includes unauthorized removal or transfer of data from a device, either by a perpetrator or malware. Phishing emails were also increasingly encountered by **** of the respondents.

  3. I

    Global Data Exfiltration Protection Market Historical Impact Review...

    • statsndata.org
    excel, pdf
    Updated Jun 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Stats N Data (2025). Global Data Exfiltration Protection Market Historical Impact Review 2025-2032 [Dataset]. https://www.statsndata.org/report/data-exfiltration-protection-market-128851
    Explore at:
    pdf, excelAvailable download formats
    Dataset updated
    Jun 2025
    Dataset authored and provided by
    Stats N Data
    License

    https://www.statsndata.org/how-to-orderhttps://www.statsndata.org/how-to-order

    Area covered
    Global
    Description

    In today's digital economy, the Data Exfiltration Protection market has emerged as a critical component in safeguarding sensitive information across various sectors. As organizations increasingly rely on digital platforms to drive growth and efficiency, the risk of unauthorized data access and potential breaches has

  4. Global cyberattacks with data exfiltrated within a day 2023

    • statista.com
    Updated Jan 21, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Global cyberattacks with data exfiltrated within a day 2023 [Dataset]. https://www.statista.com/statistics/1537925/global-data-exfiltrated-within-a-day/
    Explore at:
    Dataset updated
    Jan 21, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2023
    Area covered
    Worldwide
    Description

    In 2023, in over 45 percent of cyberattacks, threat actors exfiltrated the compromised data in less than a day. The remaining 54.4 percent of breaches involved longer timeframes for data exfiltration.

  5. I

    Global Data Exfiltration Market Investment Landscape 2025-2032

    • statsndata.org
    excel, pdf
    Updated Jun 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Stats N Data (2025). Global Data Exfiltration Market Investment Landscape 2025-2032 [Dataset]. https://www.statsndata.org/report/data-exfiltration-market-88526
    Explore at:
    excel, pdfAvailable download formats
    Dataset updated
    Jun 2025
    Authors
    Stats N Data
    License

    https://www.statsndata.org/how-to-orderhttps://www.statsndata.org/how-to-order

    Area covered
    Global
    Description

    The Data Exfiltration market has emerged as a critical sector in today's digital landscape, driven by the increasing volume of sensitive data generated across industries and the escalating risk of cyber threats. Data exfiltration refers to the unauthorized transfer of data from within an organization to an external

  6. U.S. share of DXF attacks involving ransom payment Q1 2022- Q3 2024

    • statista.com
    • ai-chatbox.pro
    Updated Jul 10, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). U.S. share of DXF attacks involving ransom payment Q1 2022- Q3 2024 [Dataset]. https://www.statista.com/statistics/1409598/data-exfiltration-only-attacks-ransom-payment-rates-usorganizations/
    Explore at:
    Dataset updated
    Jul 10, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    In the third quarter of 2024, ** percent of data exfiltration-only (DXF) attacks encountered at organizations in the United States resulted in a ransom payment. This figure decreased compared to the previous year, with ** percent of the data exfiltration-only (DXF) attacks involving ransom payments in the third quarter of 2023.

  7. Most common insider threats in the U.S. 2020

    • statista.com
    Updated Dec 10, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Most common insider threats in the U.S. 2020 [Dataset]. https://www.statista.com/statistics/1155585/most-common-insider-threat-types-united-states/
    Explore at:
    Dataset updated
    Dec 10, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2020
    Area covered
    United States
    Description

    A 2020 study found that data exfiltration was the most common type of insider threat, followed by privilege misuse. Data exfiltration accounted for 62 percent of insider threats caused by employees and contractors. The loss of sensitive data can cost a business millions of dollars and severely damage its reputations.

  8. Global cyberattack distribution 2023, by type

    • statista.com
    Updated Nov 14, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Global cyberattack distribution 2023, by type [Dataset]. https://www.statista.com/statistics/1382266/cyber-attacks-worldwide-by-type/
    Explore at:
    Dataset updated
    Nov 14, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2023
    Area covered
    Worldwide
    Description

    In 2023, ransomware was the most frequently detected cyberattack worldwide, with around 70 percent of all detected cyberattacks. Network breaches ranked second, with almost 19 percent of the detections. Although less frequently, data exfiltration was also among the detected cyberattacks.

  9. Concerns relative to application interface programming (API) security...

    • statista.com
    Updated Jul 18, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Concerns relative to application interface programming (API) security worldwide 2022 [Dataset]. https://www.statista.com/statistics/1331683/concerns-api-security-worldwide/
    Explore at:
    Dataset updated
    Jul 18, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2022
    Area covered
    Worldwide
    Description

    When asked about their top concern relative to application interface programming (API) security in 2022, over ** percent of respondents indicated data exfiltration.

  10. Challenging Assumptions of Normality in AES s-Box Configurations Under...

    • figshare.com
    xz
    Updated Nov 28, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Clay Carper (2023). Challenging Assumptions of Normality in AES s-Box Configurations Under Side-Channel Analysis -- Experimental Data [Dataset]. http://doi.org/10.6084/m9.figshare.24650373.v1
    Explore at:
    xzAvailable download formats
    Dataset updated
    Nov 28, 2023
    Dataset provided by
    Figsharehttp://figshare.com/
    Authors
    Clay Carper
    License

    https://www.gnu.org/licenses/gpl-3.0.htmlhttps://www.gnu.org/licenses/gpl-3.0.html

    Description

    Article Abstract:Power-based Side-Channel Analysis (SCA) began with visual-based examinations and has progressed to utilize data-driven statistical analysis. Two distinct classifications of these methods have emerged over the years; those focused on leakage exploitation and those dedicated to leakage detection. This work primarily focuses on a leakage detection-based schema that utilizes Welch's t-test, known as Test Vector Leakage Assessment (TVLA). Both classes of methods process collected data using statistical frameworks that result in the successful exfiltration of information via SCA. Often, statistical testing used during analysis requires the assumption that collected power consumption data originate from a normal distribution. To date, this assumption has remained largely uncontested. This work seeks to demonstrate that while past studies have assumed the normality of collected power traces, this assumption should be properly evaluated. In order to evaluate this assumption, an implementation of Tiny-AES-c with nine unique substitution-box (s-box) configurations is conducted using TVLA to guide experimental design. By leveraging the complexity of the AES algorithm, a sufficiently diverse and complex dataset was developed. Under this dataset, statistical tests for normality such as the Shapiro-Wilk test and the Kolmogorov-Smirnov test provide significant evidence to reject the null hypothesis that the power consumption data are normally distributed. To address this observation, existing non-parametric equivalents such as the Wilcoxon Signed-Rank Test and the Kruskal-Wallis Test are discussed in relation to currently used parametric tests such as Welch's t-test.

  11. Main security threats in public clouds 2023

    • statista.com
    Updated Jul 9, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Main security threats in public clouds 2023 [Dataset]. https://www.statista.com/statistics/1423855/top-security-threats-in-public-clouds/
    Explore at:
    Dataset updated
    Jul 9, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Aug 2023
    Area covered
    Worldwide
    Description

    According to a 2023 survey of cybersecurity professionals, ** percent of respondents worldwide considered misconfiguration of the cloud platform as the biggest security threat in public clouds. Exfiltration of sensitive data ranked second, according to ** percent of respondents. Foreign state-sponsored cyber attacks constituted the main security threat in public clouds for ** percent of respondents.

  12. Main monitoring activities for a strong data security posture worldwide 2024...

    • statista.com
    Updated Jan 16, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Main monitoring activities for a strong data security posture worldwide 2024 [Dataset]. https://www.statista.com/statistics/1548536/main-activities-to-be-monitored-for-strong-data-security-posture-worldwide/
    Explore at:
    Dataset updated
    Jan 16, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Sep 2024
    Area covered
    Worldwide
    Description

    As organizations strive to fortify their data security posture in 2024, monitoring unauthorized access attempts emerges as the top priority for 58 percent of companies worldwide. This focus on detecting potential breaches underscores the growing awareness of cyber threats and the critical need for robust cybersecurity measures. Data exfiltration attempts and overprivileged access for humans also rank high on the list of key activities to monitor, highlighting the multifaceted approach required for comprehensive data protection. Evolving security technologies To address these security concerns, companies are implementing various application and data-centric security technologies. Database firewalls lead the pack as the most widely adopted solution, with web application firewalls (WAF) close behind, utilized by over 60 percent of organizations. Looking ahead, many firms plan to acquire bot management tools in the next 12 months, signaling a shift towards more advanced threat detection and prevention mechanisms. Investing in cybersecurity following data breaches The importance of data security is further emphasized by organizations' responses to breaches. A significant 63 percent of companies plan to increase their cybersecurity investment following a data breach, marking a 12 percent rise from the previous year. This proactive approach extends to specific areas such as Incident Response (IR) planning and testing, with 55 percent of firms intending to boost investment in this crucial aspect of cybersecurity. Additionally, over half of the surveyed companies aim to enhance their threat detection and response capabilities in the wake of a breach, demonstrating a commitment to learning from security incidents and strengthening defenses.

  13. UK and U.S. top cyber threats businesses anticipate in 2023

    • statista.com
    Updated Jul 31, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). UK and U.S. top cyber threats businesses anticipate in 2023 [Dataset]. https://www.statista.com/statistics/1481634/cyber-threats-for-companies-in-the-us-and-uk/
    Explore at:
    Dataset updated
    Jul 31, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2023
    Area covered
    United Kingdom, United States
    Description

    In 2023, 36 percent of businesses in the United States and the United Kingdom (UK) reported that ransomware attacks were the most significant cyber threat they faced. Additionally, 22 percent of respondents indicated that phishing attacks pose a major threat to their operations. Bot attacks were highlighted by 11 percent of respondents, while nine percent of companies said that data exfiltration attacks were also significant.

  14. Biggest security threats in public clouds worldwide 2020-2022

    • statista.com
    Updated Jun 19, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2023). Biggest security threats in public clouds worldwide 2020-2022 [Dataset]. https://www.statista.com/statistics/1172307/biggest-security-threats-in-public-clouds/
    Explore at:
    Dataset updated
    Jun 19, 2023
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    From 2019 to 2022, over 60 percent of respondents named misconfiguration of the cloud platform/wrong setup as the biggest security threat in public clouds. Other significant cloud threats were insecure interfaces, exfiltration of sensitive data, as well as unauthorized access.

  15. Not seeing a result you expected?
    Learn how you can add new datasets to our index.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2025). Most common data exfiltration behaviors during insider threats in the U.S. 2020 [Dataset]. https://www.statista.com/statistics/1155846/most-common-data-exfiltration-insider-threat-types-usa/
Organization logo

Most common data exfiltration behaviors during insider threats in the U.S. 2020

Explore at:
Dataset updated
Jul 9, 2025
Dataset authored and provided by
Statistahttp://statista.com/
Time period covered
2020
Area covered
United States
Description

A 2020 study revealed that e-mail forwarding to a personal e-mail account was the most common method of sensitive data exfiltration during insider incidents. Misuse of cloud collaboration privileges was ranked second with a ***** percent occurrence rate.

Search
Clear search
Close search
Google apps
Main menu