18 datasets found
  1. UNB CIC IOT Dataset 2023 (Updated 2024-10-08)

    • kaggle.com
    zip
    Updated May 24, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Md. Abdul Al Emon (2025). UNB CIC IOT Dataset 2023 (Updated 2024-10-08) [Dataset]. https://www.kaggle.com/datasets/mdabdulalemo/cic-iot-dataset2023-updated-2024-10-08
    Explore at:
    zip(3264262523 bytes)Available download formats
    Dataset updated
    May 24, 2025
    Authors
    Md. Abdul Al Emon
    License

    Attribution-ShareAlike 4.0 (CC BY-SA 4.0)https://creativecommons.org/licenses/by-sa/4.0/
    License information was derived automatically

    Description

    The CIC IoT Dataset 2023 is a comprehensive benchmark developed by the Canadian Institute for Cybersecurity (CIC) to advance intrusion detection research in real-world Internet of Things (IoT) environments. This dataset was created using a network of 105 actual IoT devices, encompassing smart home gadgets, sensors, and cameras, to simulate authentic IoT traffic and attack scenarios.

    Key Features:

    • Diverse Attack Scenarios: The dataset includes 33 distinct attacks categorized into seven classes: DDoS, DoS, Reconnaissance, Web-based, Brute Force, Spoofing, and Mirai. These attacks were executed by compromised IoT devices targeting other IoT devices, reflecting realistic threat vectors.(University of New Brunswick)

    • Extensive Data Collection: Network traffic was captured in real-time, resulting in over 46 million records. The data is available in various formats, including raw PCAP files and pre-extracted CSV features, facilitating different research needs.

    • Realistic IoT Topology: Unlike many datasets that rely on simulations, this dataset was generated using a large-scale IoT testbed with devices from multiple vendors, providing a heterogeneous and realistic network environment.

    • Benchmarking and Evaluation: The dataset has been utilized to evaluate the performance of machine learning and deep learning algorithms in classifying and detecting malicious versus benign IoT network traffic.(University of New Brunswick)

    This dataset serves as a valuable resource for researchers and practitioners aiming to develop and test security analytics applications, intrusion detection systems, and other cybersecurity solutions tailored for IoT ecosystems.(University of New Brunswick)

  2. Number of data compromises and impacted individuals in U.S. 2005-2024

    • statista.com
    • ai-chatbox.pro
    Updated Jul 14, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of data compromises and impacted individuals in U.S. 2005-2024 [Dataset]. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
    Explore at:
    Dataset updated
    Jul 14, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    In 2024, the number of data compromises in the United States stood at 3,158 cases. Meanwhile, over 1.35 billion individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure. While these are three different events, they have one thing in common. As a result of all three incidents, the sensitive data is accessed by an unauthorized threat actor. Industries most vulnerable to data breaches Some industry sectors usually see more significant cases of private data violations than others. This is determined by the type and volume of the personal information organizations of these sectors store. In 2024 the financial services, healthcare, and professional services were the three industry sectors that recorded most data breaches. Overall, the number of healthcare data breaches in some industry sectors in the United States has gradually increased within the past few years. However, some sectors saw decrease. Largest data exposures worldwide In 2020, an adult streaming website, CAM4, experienced a leakage of nearly 11 billion records. This, by far, is the most extensive reported data leakage. This case, though, is unique because cyber security researchers found the vulnerability before the cyber criminals. The second-largest data breach is the Yahoo data breach, dating back to 2013. The company first reported about one billion exposed records, then later, in 2017, came up with an updated number of leaked records, which was three billion. In March 2018, the third biggest data breach happened, involving India’s national identification database Aadhaar. As a result of this incident, over 1.1 billion records were exposed.

  3. Global cyberattack distribution 2023, by type

    • statista.com
    Updated Nov 14, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Global cyberattack distribution 2023, by type [Dataset]. https://www.statista.com/statistics/1382266/cyber-attacks-worldwide-by-type/
    Explore at:
    Dataset updated
    Nov 14, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2023
    Area covered
    Worldwide
    Description

    In 2023, ransomware was the most frequently detected cyberattack worldwide, with around 70 percent of all detected cyberattacks. Network breaches ranked second, with almost 19 percent of the detections. Although less frequently, data exfiltration was also among the detected cyberattacks.

  4. z

    Global Dataset of Cyber Incidents

    • zenodo.org
    • data.niaid.nih.gov
    bin, csv, pdf, txt
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Kerstin Zettl-Schabath; Kerstin Zettl-Schabath; Jakob Bund; Jakob Bund; Martin Müller; Martin Müller; Camille Borrett; Jonas Hemmelskamp; Jonas Hemmelskamp; Asaf Alibegovic; Enis Bajra; Alisa Jazxhi; Erik Kellenter; Annika Sachs; Callahan Shelley; Camille Borrett; Asaf Alibegovic; Enis Bajra; Alisa Jazxhi; Erik Kellenter; Annika Sachs; Callahan Shelley (2025). Global Dataset of Cyber Incidents [Dataset]. http://doi.org/10.5281/zenodo.14965395
    Explore at:
    pdf, bin, txt, csvAvailable download formats
    Dataset updated
    Apr 1, 2025
    Dataset provided by
    European Repository of Cyber Incidents
    Authors
    Kerstin Zettl-Schabath; Kerstin Zettl-Schabath; Jakob Bund; Jakob Bund; Martin Müller; Martin Müller; Camille Borrett; Jonas Hemmelskamp; Jonas Hemmelskamp; Asaf Alibegovic; Enis Bajra; Alisa Jazxhi; Erik Kellenter; Annika Sachs; Callahan Shelley; Camille Borrett; Asaf Alibegovic; Enis Bajra; Alisa Jazxhi; Erik Kellenter; Annika Sachs; Callahan Shelley
    License

    Attribution-NonCommercial 4.0 (CC BY-NC 4.0)https://creativecommons.org/licenses/by-nc/4.0/
    License information was derived automatically

    Description

    The European Repository of Cyber Incidents (EuRepoC) is releasing the Global Dataset of Cyber Incidents in Version 1.3 as an extract of our backend database. This official release contains fully consolidated cyber incident data reviewed by our interdisciplinary experts in the fields of politics, law and technology across all 60 variables covered by the European Repository. Version 1.3 covers the years 2000 – 2024 entirely. The Global Dataset is meant for reliable, evidence-based analysis. If you require real-time data, please refer to the download option in our TableView or contact us for special requirements (including API access).

    The dataset now contains data on 3416 cyber incidents which started between 01.01.2000 and 31.12.2024. The European Repository of Cyber Incidents (EuRepoC) gathers, codes, and analyses publicly available information from over 220 sources and 600 Twitter accounts daily to report on dynamic trends in the global, and particularly the European, cyber threat environment.

    For more information on the scope and data collection methodology see: https://eurepoc.eu/methodology

    Full Codebook available here

    Information about each file

    please scroll down this page entirely to see all files available. Zenodo only displays the attribution dataset by default.

    Global Database (csv or xlsx):
    This file includes all variables coded for each incident, organised such that one row corresponds to one incident - our main unit of investigation. Where multiple codes are present for a single variable for a single incident, these are separated with semi-colons within the same cell.

    Receiver Dataset (csv or xlsx):
    In this file, the data of affected entities and individuals (receivers) is restructured to facilitate analysis. Each cell contains only a single code, with the data "unpacked" across multiple rows. Thus, a single incident can span several rows, identifiable through the unique identifier assigned to each incident (incident_id).

    Attribution Dataset (csv or xlsx):
    This file follows a similar approach to the receiver dataset. The attribution data is "unpacked" over several rows, allowing each cell to contain only one code. Here too, a single incident may occupy several rows, with the unique identifier enabling easy tracking of each incident (incident_id). In addition, some attributions may also have multiple possible codes for one variable, these are also "unpacked" over several rows, with the attribution_id enabling to track each attribution.

    Dyadic Dataset (csv or xlsx):
    The dyadic dataset puts state dyads in the focus. Each row in the dataset represents one cyber incident in a specific dyad. Because incidents may affect multiple receivers, single incidents can be duplicated in this format, when they affected multiple countries.

  5. Share of cyberattacks in Italy 2024, by reason

    • statista.com
    • ai-chatbox.pro
    Updated Jul 11, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Share of cyberattacks in Italy 2024, by reason [Dataset]. https://www.statista.com/statistics/649358/share-cyber-attacks-in-italy-by-reason/
    Explore at:
    Dataset updated
    Jul 11, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Italy
    Description

    During the first half of 2024, around ** percent of cyberattacks carried out in Italy had cybercrime as a purpose. Cyber espionage was another motivation, representing the main reason behind roughly **** percent of attacks. By contrast, information warfare only accounted for *** percent of the cyberattacks in the country in the last examined period. Data breaches in Italy In 2023, over half of the Italian digital population was alerted that their personal data had been breached, and **** percent of the alerted users had the misfortune of being affected by data compromise on the dark web. Despite a decrease in the number of data sets affected in data breaches between 2020 and 2023, Italy recorded almost *** million exposed data sets at the beginning of 2023.Meanwhile, the average cost of data breaches for both Italian companies and targeted users kept growing, reaching **** million U.S. dollars in 2024, up from the **** million U.S. dollars recorded in the previous year. The Italian privacy landscape: GDPR effects As a state member of the European Union, Italy is covered by the General Data Protection Regulation (GDPR). Since 2018, the GDPR has regulated online data privacy and has the responsibility to represent consumers’ interests within the digital and tech landscape of the Union. As of 2023, approximately *** fines were issued in Italy due to violations of the GDPR – making Italy the second country in Europe with the highest number of violations dispensed to tech companies. The highest GDPR fine ever issued in Italy was at the expense of Telecom Italia (TIM), one of the largest Italian telecommunications companies. TIM was fined approximately **** million euros in January 2020. GDPR is enforced and helped by the country's Garante della Privacy, the national institution overseeing Italian users’ online rights, cybersecurity, and digital privacy.

  6. z

    Global Dataset of Cyber Incidents V.1.2

    • zenodo.org
    bin, csv, json
    Updated May 3, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    European Repository of Cyber Incidents (EuRepoC); European Repository of Cyber Incidents (EuRepoC) (2024). Global Dataset of Cyber Incidents V.1.2 [Dataset]. http://doi.org/10.5281/zenodo.11108195
    Explore at:
    csv, bin, jsonAvailable download formats
    Dataset updated
    May 3, 2024
    Dataset provided by
    European Repository of Cyber Incidents (EuRepoC)
    Authors
    European Repository of Cyber Incidents (EuRepoC); European Repository of Cyber Incidents (EuRepoC)
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Time period covered
    May 2, 2024
    Description

    The dataset contains data on 2889 cyber incidents between 01.01.2000 and 02.05.2024 using 60 variables, including the start date, names and categories of receivers along with names and categories of initiators. The database was compiled as part of the European Repository of Cyber Incidents (EuRepoC) project.


    EuRepoC gathers, codes, and analyses publicly available information from over 200 sources and 600 Twitter accounts daily to report on dynamic trends in the global, and particularly the European, cyber threat environment.

    For more information on the scope and data collection methodology see: https://eurepoc.eu/methodology

    Codebook available here

    Information about each file:

    Global Database (csv or xlsx):
    This file includes all variables coded for each incident, organised such that one row corresponds to one incident - our main unit of investigation. Where multiple codes are present for a single variable for a single incident, these are separated with semi-colons within the same cell.

    Receiver Dataset (csv):
    In this file, the data of affected entities and individuals (receivers) is restructured to facilitate analysis. Each cell contains only a single code, with the data "unpacked" across multiple rows. Thus, a single incident can span several rows, identifiable through the unique identifier assigned to each incident (incident_id).

    Attribution Dataset (csv):
    This file follows a similar approach to the receiver dataset. The attribution data is "unpacked" over several rows, allowing each cell to contain only one code. Here too, a single incident may occupy several rows, with the unique identifier enabling easy tracking of each incident (incident_id). In addition, some attributions may also have multiple possible codes for one variable, these are also "unpacked" over several rows, with the attribution_id enabling to track each attribution.

    eurepoc_global_database_1.2 (json):
    This file contains the whole database in JSON format.

  7. i

    Cyber-Physical Dataset for UAVs Under Normal Operations and Cyber-Attacks

    • ieee-dataport.org
    Updated Dec 4, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Muhammad Ismail (2023). Cyber-Physical Dataset for UAVs Under Normal Operations and Cyber-Attacks [Dataset]. https://ieee-dataport.org/documents/cyber-physical-dataset-uavs-under-normal-operations-and-cyber-attacks
    Explore at:
    Dataset updated
    Dec 4, 2023
    Authors
    Muhammad Ismail
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    which hinders further research in this field.

  8. Global number of breached user accounts Q1 2020-Q3 2024

    • statista.com
    • ai-chatbox.pro
    Updated Jun 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Global number of breached user accounts Q1 2020-Q3 2024 [Dataset]. https://www.statista.com/statistics/1307426/number-of-data-breaches-worldwide/
    Explore at:
    Dataset updated
    Jun 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    During the third quarter of 2024, data breaches exposed more than *** million records worldwide. Since the first quarter of 2020, the highest number of data records were exposed in the first quarter of ***, more than *** million data sets. Data breaches remain among the biggest concerns of company leaders worldwide. The most common causes of sensitive information loss were operating system vulnerabilities on endpoint devices. Which industries see the most data breaches? Meanwhile, certain conditions make some industry sectors more prone to data breaches than others. According to the latest observations, the public administration experienced the highest number of data breaches between 2021 and 2022. The industry saw *** reported data breach incidents with confirmed data loss. The second were financial institutions, with *** data breach cases, followed by healthcare providers. Data breach cost Data breach incidents have various consequences, the most common impact being financial losses and business disruptions. As of 2023, the average data breach cost across businesses worldwide was **** million U.S. dollars. Meanwhile, a leaked data record cost about *** U.S. dollars. The United States saw the highest average breach cost globally, at **** million U.S. dollars.

  9. Cyber-attack scenarios for super-heaters system

    • zenodo.org
    • data.niaid.nih.gov
    txt
    Updated Jul 12, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Michał Syfert; Michał Syfert (2024). Cyber-attack scenarios for super-heaters system [Dataset]. http://doi.org/10.5281/zenodo.7612269
    Explore at:
    txtAvailable download formats
    Dataset updated
    Jul 12, 2024
    Dataset provided by
    Zenodohttp://zenodo.org/
    Authors
    Michał Syfert; Michał Syfert
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Simulated cyber-attacks for super-heaters system. For detailed description refer to pdf file. Dataset is in the form of tab separated txt files.

    In case of any questions please contact michal.syfert@pw.edu.pl or anna.sztyber@pw.edu.pl.

    Please cite: Sztyber-Betley, A.; Syfert, M.; Kościelny, J.M.; Górecka, Z. Controller Cyber-Attack Detection and Isolation. Sensors 2023, 23, 2778. https://doi.org/10.3390/s23052778

  10. Cyber security breaches survey 2023

    • gov.uk
    • beta.ukdataservice.ac.uk
    Updated Apr 19, 2023
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Department for Science, Innovation and Technology (2023). Cyber security breaches survey 2023 [Dataset]. https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2023
    Explore at:
    Dataset updated
    Apr 19, 2023
    Dataset provided by
    GOV.UKhttp://gov.uk/
    Authors
    Department for Science, Innovation and Technology
    Description

    The government has surveyed UK businesses, charities and educational institutions to find out how they approach cyber security and gain insight into the cyber security issues they face. The research informs government policy on cyber security and how government works with industry to build a prosperous and resilient digital UK.

    Published

    19 April 2023

    Period covered

    Respondents were asked about their approach to cyber security and any breaches or attacks over the 12 months before the interview. Main survey interviews took place between October 2022 and January 2023. Qualitative follow up interviews took place in December 2022 and January 2023.

    Geographic coverage

    UK

    Further Information

    The survey is part of the government’s National Cyber Strategy 2002.

    There is a wide range of free government cyber security guidance and information for businesses, including details of free online training and support.

    The survey was carried out by Ipsos UK. The report has been produced by Ipsos on behalf of the Department for Science, Innovation and Technology.

    The UK Statistics Authority

    This release is published in accordance with the Code of Practice for Statistics (2018), as produced by the UK Statistics Authority. The UKSA has the overall objective of promoting and safeguarding the production and publication of official statistics that serve the public good. It monitors and reports on all official statistics, and promotes good practice in this area.

    Pre-release access

    The document above contains a list of ministers and officials who have received privileged early access to this release. In line with best practice, the list has been kept to a minimum and those given access for briefing purposes had a maximum of 24 hours.

    Contact information

    The Lead Analyst for this release is Emma Johns. For any queries please contact cybersurveys@dsit.gov.uk.

    For media enquiries only, please contact the press office on 020 7215 1000.

  11. D

    Database Security Market Report | Global Forecast From 2025 To 2033

    • dataintelo.com
    csv, pdf, pptx
    Updated Oct 16, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dataintelo (2024). Database Security Market Report | Global Forecast From 2025 To 2033 [Dataset]. https://dataintelo.com/report/database-security-market
    Explore at:
    pptx, pdf, csvAvailable download formats
    Dataset updated
    Oct 16, 2024
    Dataset authored and provided by
    Dataintelo
    License

    https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy

    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    Database Security Market Outlook



    The global database security market size was estimated at USD 5.1 billion in 2023 and is projected to grow at a compound annual growth rate (CAGR) of 14.3% from 2024 to 2032, reaching a market size of approximately USD 15.2 billion by 2032. The robust growth rate underscores the increasing need for enhanced database security solutions driven by the proliferation of data breaches and cyber-attacks, regulatory requirements, and the expanding digital footprint of enterprises worldwide.



    One of the primary growth factors for the database security market is the rising incidence of data breaches and cyber-attacks. In an era where data is considered the new oil, protecting it has become paramount. High-profile breaches and leaks have not only caused financial losses but also damaged the reputation of companies, leading to a surge in demand for advanced security solutions. The sophistication of cyber threats continues to evolve, prompting organizations to invest significantly in robust security infrastructures to safeguard their sensitive information.



    Another significant growth factor is the stringent regulatory landscape governing data protection. Regulations such as the General Data Protection Regulation (GDPR) in Europe, the California Consumer Privacy Act (CCPA) in the United States, and various other regional data protection laws mandate strict compliance regarding data privacy and security. Non-compliance with these regulations can result in hefty fines and legal repercussions, compelling organizations to adopt comprehensive database security measures to ensure adherence and avoid penalties.



    The accelerating adoption of cloud services and the ensuing data migration to cloud platforms also contribute to the growth of the database security market. As businesses increasingly move their operations to the cloud to leverage its scalability, flexibility, and cost-efficiency, they encounter new security challenges. Protecting data in transit and at rest on cloud platforms necessitates specialized security solutions. This shift has fueled demand for cloud-specific database security tools, thereby driving market expansion.



    From a regional perspective, North America holds the largest share of the database security market, attributed to the presence of a large number of key players and early adopters of technology. However, the Asia Pacific region is expected to exhibit the highest CAGR during the forecast period, driven by rapid digital transformation, increasing investments in IT infrastructure, and a growing awareness of data security concerns. The market in Europe also shows substantial growth potential due to stringent data protection regulations and the increasing frequency of cyber threats.



    Component Analysis



    The database security market can be segmented by component into software, hardware, and services. The software segment is anticipated to dominate the market due to the increasing need for advanced security solutions that can tackle sophisticated cyber threats. Database security software includes encryption, data masking, activity monitoring, and other solutions. These tools are essential for ensuring data integrity and confidentiality, making them a critical component of any comprehensive database security strategy.



    Hardware-based security solutions, while not as prevalent as software, play a crucial role in certain high-security environments. Hardware security modules (HSMs) and other dedicated security appliances offer robust protection by isolating and securing cryptographic keys and other sensitive data. These solutions are particularly valuable for industries like finance and government where data breaches can have severe repercussions.



    The services segment encompasses a range of offerings, from consulting and implementation to ongoing maintenance and support. As database security becomes increasingly complex, organizations often lack the in-house expertise to design and manage effective security systems. Consequently, they turn to specialized service providers for guidance and support. Managed security services, in particular, are gaining traction as they offer continuous monitoring and management, allowing organizations to focus on their core operations while ensuring their databases remain secure.



    Overall, the integration of advanced technologies such as artificial intelligence (AI) and machine learning (ML) into database security solutions represents a significant trend. These technologies enhance the capabilities of database security software

  12. US Electric Grid Outages

    • kaggle.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    willian oliveira (2025). US Electric Grid Outages [Dataset]. http://doi.org/10.34740/kaggle/dsv/11245146
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Apr 1, 2025
    Dataset provided by
    Kaggle
    Authors
    willian oliveira
    License

    https://creativecommons.org/publicdomain/zero/1.0/https://creativecommons.org/publicdomain/zero/1.0/

    Description

    The United States electric grid, a vast and complex infrastructure, has experienced numerous outages from 2002 to 2023, with causes ranging from extreme weather events to cyberattacks and aging infrastructure. The resilience of the grid has been tested repeatedly as demand for electricity continues to grow while climate change exacerbates the frequency and intensity of storms, wildfires, and other natural disasters.

    Between 2002 and 2023, the U.S. Department of Energy recorded thousands of power outages, varying in scale from localized blackouts to large-scale regional failures affecting millions. The Northeast blackout of 2003 was one of the most significant, impacting 50 million people across the United States and Canada. A software bug in an alarm system prevented operators from recognizing and responding to transmission line failures, leading to a cascading effect that took hours to contain and days to restore completely.

    Weather-related disruptions have been among the most common causes of outages, particularly hurricanes, ice storms, and heatwaves. In 2005, Hurricane Katrina devastated the Gulf Coast, knocking out power for over 1.7 million customers. Similarly, in 2012, Hurricane Sandy caused widespread destruction in the Northeast, leaving over 8 million customers in the dark. More recently, the Texas winter storm of February 2021 resulted in one of the most catastrophic power failures in state history. Unusually cold temperatures overwhelmed the state’s independent power grid, leading to equipment failures, frozen natural gas pipelines, and rolling blackouts that lasted days. The event highlighted vulnerabilities in grid preparedness for extreme weather, particularly in regions unaccustomed to such conditions.

    Wildfires in California have also played a significant role in grid outages. The state's largest utility companies, such as Pacific Gas and Electric (PG&E), have implemented preemptive power shutoffs to reduce wildfire risks during high-wind events. These Public Safety Power Shutoffs (PSPS) have affected millions of residents, causing disruptions to businesses, emergency services, and daily life. The 2018 Camp Fire, the deadliest and most destructive wildfire in California history, was ignited by faulty PG&E transmission lines, leading to increased scrutiny over utility maintenance and fire mitigation efforts.

    In addition to natural disasters, cyber threats have emerged as a growing concern for the U.S. electric grid. In 2015 and 2016, Russian-linked cyberattacks targeted Ukraine’s power grid, serving as a stark warning of the potential vulnerabilities in American infrastructure. In 2021, the Colonial Pipeline ransomware attack, while not directly targeting the electric grid, demonstrated how critical energy infrastructure could be compromised, leading to widespread fuel shortages and economic disruptions. Federal agencies and utility companies have since ramped up investments in cybersecurity measures to protect against potential attacks.

    Aging infrastructure remains another pressing issue. Many parts of the U.S. grid were built decades ago and have not kept pace with modern energy demands or technological advancements. The shift towards renewable energy sources, such as solar and wind, presents new challenges for grid stability, requiring updated transmission systems and improved energy storage solutions. Federal and state governments have initiated grid modernization efforts, including investments in smart grids, microgrids, and battery storage to enhance resilience and reliability.

    Looking forward, the future of the U.S. electric grid depends on continued investments in infrastructure, cybersecurity, and climate resilience. With the increasing electrification of transportation and industry, demand for reliable and clean energy will only grow. Policymakers, utility companies, and regulators must collaborate to address vulnerabilities, adapt to emerging threats, and ensure a more robust, efficient, and sustainable electric grid for the decades to come.

  13. C

    Cloud Security Industry Report

    • marketreportanalytics.com
    doc, pdf, ppt
    Updated Apr 25, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Market Report Analytics (2025). Cloud Security Industry Report [Dataset]. https://www.marketreportanalytics.com/reports/cloud-security-industry-91515
    Explore at:
    ppt, doc, pdfAvailable download formats
    Dataset updated
    Apr 25, 2025
    Dataset authored and provided by
    Market Report Analytics
    License

    https://www.marketreportanalytics.com/privacy-policyhttps://www.marketreportanalytics.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The cloud security market is experiencing robust growth, projected to reach $15.21 billion in 2025 and maintain a Compound Annual Growth Rate (CAGR) of 18.07% from 2025 to 2033. This expansion is driven by several factors. The increasing adoption of cloud computing across various industries, coupled with heightened concerns about data breaches and cyberattacks, fuels significant demand for robust cloud security solutions. Organizations are prioritizing the protection of sensitive data and applications residing in cloud environments, leading to increased investments in Identity and Access Management (IAM), Data Loss Prevention (DLP), and Intrusion Detection/Prevention Systems (IDS/IPS). The rising complexity of cloud infrastructures and the emergence of new attack vectors further contribute to market growth. Further fueling this growth is the shift towards hybrid and multi-cloud deployments, demanding sophisticated security solutions capable of managing security across diverse environments. This diverse landscape creates opportunities for various vendors specializing in application, database, endpoint, network, and web/email security. While specific regional breakdowns are unavailable, North America is expected to maintain a substantial market share, given its advanced adoption of cloud technologies and stringent data privacy regulations. Asia Pacific is poised for significant growth, driven by increasing digitalization and cloud adoption across developing economies. The competitive landscape is highly dynamic, with major players like Trend Micro, Imperva, Broadcom, IBM, Cisco, Fortinet, Sophos, McAfee, Qualys, Check Point, and CSC vying for market share through continuous innovation and strategic acquisitions. The market is segmented by solution (IAM, DLP, IDS/IPS, SIEM, Encryption), security type (application, database, endpoint, network, web/email), and deployment mode (public, private, hybrid). Future growth will likely be shaped by advancements in Artificial Intelligence (AI) and Machine Learning (ML) for threat detection, the expansion of cloud-native security solutions, and the increasing demand for secure access service edge (SASE) architectures. Market restraints may include complexities in integrating cloud security solutions with existing on-premise systems and the skilled cybersecurity workforce shortage. However, the overall trajectory indicates continued substantial growth for the foreseeable future. Recent developments include: May 2023 - Fujitsu Limited and Microsoft Corporation announced a five-year partnership to significantly expand their existing collaboration. The agreement, which involved investment by companies to drive the expansion of Fujitsu's Uvance business, leverages the Microsoft Cloud and industry-leading technologies to digitally transform organizations around the globe, develop more sustainable practices and solutions that address societal needs, and unlock new streams of business growth., June 2022 - Cisco, the leader in corporate networking and security, announced its plan for a global, cloud-delivered, integrated platform that can secure and connect organizations of any size and shape. The Cisco Security Cloud is designed to be the most open platform in the industry, ensuring the integrity of the entire IT ecosystem without public cloud lock-in.. Key drivers for this market are: Growing Threats of Cyber Attacks is Expanding the Market. Potential restraints include: Growing Threats of Cyber Attacks is Expanding the Market. Notable trends are: Intrusion Detection and Prevention is the Fastest Growing Segment.

  14. D

    Database Development and Management Tools Software Market Report | Global...

    • dataintelo.com
    csv, pdf, pptx
    Updated Jan 7, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dataintelo (2025). Database Development and Management Tools Software Market Report | Global Forecast From 2025 To 2033 [Dataset]. https://dataintelo.com/report/global-database-development-and-management-tools-software-market
    Explore at:
    pptx, csv, pdfAvailable download formats
    Dataset updated
    Jan 7, 2025
    Dataset authored and provided by
    Dataintelo
    License

    https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy

    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    Database Development and Management Tools Software Market Outlook



    In 2023, the global market size for Database Development and Management Tools Software was valued at approximately $XX billion. With a projected CAGR of X.XX% during the forecast period, this market is expected to reach around $XX billion by 2032. The growth of the market can be attributed to the increasing volume of data generated across various industries, the rising importance of data-driven decision-making, and the need for efficient data management solutions.



    One of the primary growth factors for the Database Development and Management Tools Software market is the exponential increase in data generated by various industries. In today's digital age, organizations produce vast amounts of data through various channels including social media, e-commerce, and IoT devices. This surge in data necessitates the use of advanced database management tools that can efficiently store, process, and analyze data to derive meaningful insights. Furthermore, the need for real-time data processing and analytics has driven the demand for sophisticated database tools that can handle large volumes of data with high speed and accuracy.



    Another significant growth factor is the increasing adoption of cloud-based solutions. Cloud computing has revolutionized the way data is stored and managed, offering numerous advantages such as scalability, cost-effectiveness, and flexibility. Many organizations are migrating their database management systems to cloud platforms to leverage these benefits. Cloud-based database tools allow businesses to scale their operations without the need for significant capital investment in IT infrastructure. Additionally, the cloud provides a more secure environment for data storage and management, which is crucial in an era where data breaches and cyber threats are prevalent.



    Moreover, the growing emphasis on regulatory compliance and data security is driving the demand for advanced database security tools. With stringent regulations such as GDPR, HIPAA, and CCPA in place, organizations are compelled to adopt robust database security measures to protect sensitive information and avoid hefty fines. Database security tools offer features such as data encryption, access control, and activity monitoring, which help organizations safeguard their data and comply with regulatory requirements. The increasing number of cyber-attacks and data breaches further underscores the importance of database security, thereby fueling the market growth.



    The role of Enterprise Database Software in this evolving landscape cannot be overstated. As businesses continue to expand and generate vast amounts of data, the need for robust and scalable database solutions becomes increasingly critical. Enterprise Database Software provides organizations with the tools necessary to manage complex data environments efficiently. These solutions offer advanced features such as data integration, real-time analytics, and automated management, which are essential for handling large datasets and ensuring data accuracy. Furthermore, Enterprise Database Software enables businesses to maintain high levels of data security and compliance, which is crucial in today's regulatory environment. By leveraging these tools, organizations can optimize their data management processes, improve operational efficiency, and drive strategic decision-making.



    Regionally, North America is expected to dominate the Database Development and Management Tools Software market during the forecast period. The presence of major technology companies, high adoption of advanced technologies, and a strong focus on research and development contribute to the market growth in this region. Additionally, the Asia Pacific region is anticipated to witness significant growth due to the increasing digitalization, rapid economic development, and the growing number of small and medium enterprises (SMEs) that require efficient database management solutions.



    Type Analysis



    The Database Development and Management Tools Software market can be segmented by type into Database Design Tools, Database Management Tools, Database Monitoring Tools, Database Security Tools, and others. Database Design Tools are essential for creating and structuring databases that meet the specific needs of an organization. These tools help in designing the architecture, schema, and relationships between various data entities. The demand for database design tools is drive

  15. Number of accounts affected in data breaches Thailand Q2 2022-Q3 2024

    • statista.com
    Updated Jul 7, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of accounts affected in data breaches Thailand Q2 2022-Q3 2024 [Dataset]. https://www.statista.com/statistics/1404553/thailand-number-of-account-breaches-exposed/
    Explore at:
    Dataset updated
    Jul 7, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Thailand
    Description

    Between the second quarter of 2022 and the third quarter of 2024, the number of records exposed to account breaches in Thailand fluctuated significantly. Over ******* datasets were reported as having been leaked in the third quarter of 2024, compared to around ******* during the same quarter of the previous year.

  16. Financial losses in cybercrime in the U.S. 2024, by state

    • statista.com
    Updated Jul 7, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Financial losses in cybercrime in the U.S. 2024, by state [Dataset]. https://www.statista.com/statistics/234993/us-states-with-the-largest-losses-through-cybercrime/
    Explore at:
    Dataset updated
    Jul 7, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2024
    Area covered
    United States
    Description

    In 2024, California ranked first by the amount of monetary losses through cybercrime in the United States. Overall, the state had over two billion U.S. dollars of reported losses. Texas was the second by cybercrime losses, reporting around 1.3 billion U.S. dollars in losses, while Florida followed with over one billion U.S. dollars.

  17. Number of cyber threat incidents reported to CyberSecurity Malaysia 2024, by...

    • statista.com
    Updated Jun 27, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of cyber threat incidents reported to CyberSecurity Malaysia 2024, by type [Dataset]. https://www.statista.com/statistics/1043272/malaysia-cyber-crime-incidents/
    Explore at:
    Dataset updated
    Jun 27, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2024
    Area covered
    Malaysia
    Description

    In 2024, online frauds were the most reported cyber threat incidents announced by Cybersecurity Malaysia with more than ***** reports. This was followed by content related cyber crime with *** cases. CyberSecurity Malaysia is a government agency that deals with internet safety and operates under the Malaysian Ministry of Science, Technology and Innovation. Risks of scams in e-commerce leading internet activities. Meanwhile, the Malaysian internet users have experienced cybercrime, only **** percent

  18. Number of cyber crimes reported in India 2012-2022

    • statista.com
    Updated Jun 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of cyber crimes reported in India 2012-2022 [Dataset]. https://www.statista.com/statistics/309435/india-cyber-crime-it-act/
    Explore at:
    Dataset updated
    Jun 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    India
    Description

    India saw a significant jump in cyber crimes reported in 2022 from the previous year. That year, over ****** cyber crime incidents were registered. Karnataka and Telangana accounted for the highest share during the measured period. Uttar Pradesh leads the wayThe northern state of Uttar Pradesh had the highest number of cyber crimes compared to the rest of the country, with over * thousand cases registered with the authorities in 2018 alone. India’s tech state, Karnataka, followed suite that year. A majority of these cases were registered under the IT Act with the motive to defraud, or sexually exploit victims. It's a numbers game It was estimated that in 2017, consumers in India collectively lost over 18 billion U.S. dollars due to cyber crimes. However, these were estimates based only on reported numbers. In a country like India, it is highly likely that the actual figures could be under-reported due to a lack of cyber crime awareness or the mechanisms to classify them. Recent government initiatives such as a dedicated online portal to report cyber crimes could very well be the main factor behind a sudden spike in online crimes from 2017 onwards.

  19. Not seeing a result you expected?
    Learn how you can add new datasets to our index.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Md. Abdul Al Emon (2025). UNB CIC IOT Dataset 2023 (Updated 2024-10-08) [Dataset]. https://www.kaggle.com/datasets/mdabdulalemo/cic-iot-dataset2023-updated-2024-10-08
Organization logo

UNB CIC IOT Dataset 2023 (Updated 2024-10-08)

Real-world IoT traffic with diverse cyberattacks for intrusion detection

Explore at:
zip(3264262523 bytes)Available download formats
Dataset updated
May 24, 2025
Authors
Md. Abdul Al Emon
License

Attribution-ShareAlike 4.0 (CC BY-SA 4.0)https://creativecommons.org/licenses/by-sa/4.0/
License information was derived automatically

Description

The CIC IoT Dataset 2023 is a comprehensive benchmark developed by the Canadian Institute for Cybersecurity (CIC) to advance intrusion detection research in real-world Internet of Things (IoT) environments. This dataset was created using a network of 105 actual IoT devices, encompassing smart home gadgets, sensors, and cameras, to simulate authentic IoT traffic and attack scenarios.

Key Features:

  • Diverse Attack Scenarios: The dataset includes 33 distinct attacks categorized into seven classes: DDoS, DoS, Reconnaissance, Web-based, Brute Force, Spoofing, and Mirai. These attacks were executed by compromised IoT devices targeting other IoT devices, reflecting realistic threat vectors.(University of New Brunswick)

  • Extensive Data Collection: Network traffic was captured in real-time, resulting in over 46 million records. The data is available in various formats, including raw PCAP files and pre-extracted CSV features, facilitating different research needs.

  • Realistic IoT Topology: Unlike many datasets that rely on simulations, this dataset was generated using a large-scale IoT testbed with devices from multiple vendors, providing a heterogeneous and realistic network environment.

  • Benchmarking and Evaluation: The dataset has been utilized to evaluate the performance of machine learning and deep learning algorithms in classifying and detecting malicious versus benign IoT network traffic.(University of New Brunswick)

This dataset serves as a valuable resource for researchers and practitioners aiming to develop and test security analytics applications, intrusion detection systems, and other cybersecurity solutions tailored for IoT ecosystems.(University of New Brunswick)

Search
Clear search
Close search
Google apps
Main menu