{"id":43010,"date":"2021-09-22T00:00:00","date_gmt":"2021-09-22T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/ciso\/21\/i\/cyberattacks-from-all-angles-2021-midyear-report.html"},"modified":"2021-09-22T00:00:00","modified_gmt":"2021-09-22T00:00:00","slug":"cyberattacks-from-all-angles-2021-midyear-report","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/","title":{"rendered":"Cyberattacks from all Angles: 2021 Midyear Report"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/21\/i\/cyberattacks-from-all-angles-2021-midyear-report\/2021-midyear-cybersecurity-report.jpg\"><!-- Begin mPulse library --><!-- END mPulse library --> <head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width\"> <meta name=\"description\" content=\"Learn the latest cyberattacks via Trend Micro's midyear 2021 cybersecurity report.\"> <meta name=\"robots\" content=\"index,follow\"> <meta name=\"keywords\" content=\"article,cloud,expert perspective,compliance,risk management\"> <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge,chrome=1\"> <meta name=\"template\" content=\"defaultArticleWithHero\"> <meta property=\"article:published_time\" content=\"2021-09-22\"> <meta property=\"article:tag\" content=\"risk management\"> <meta property=\"article:section\" content=\"article\"> <link rel=\"icon\" type=\"image\/ico\" href=\"\/content\/dam\/trendmicro\/favicon.ico\"> <link rel=\"canonical\" href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/21\/i\/cyberattacks-from-all-angles-2021-midyear-report.html\"> <title>Cyberattacks from all Angles: 2021 Midyear Report<\/title> <link href=\"https:\/\/fonts.googleapis.com\/css?family=Open+Sans:300,300i,400,400i,600\" rel=\"stylesheet\">\n<link href=\"\/\/customer.cludo.com\/css\/296\/1798\/cludo-search.min.css\" type=\"text\/css\" rel=\"stylesheet\"> <link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch.min.css\" type=\"text\/css\"> <meta property=\"og:url\" content=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/21\/i\/cyberattacks-from-all-angles-2021-midyear-report.html\"><br \/>\n<meta property=\"og:title\" content=\"Cyberattacks from all Angles: 2021 Midyear Report\"><br \/>\n<meta property=\"og:description\" content=\"Learn the latest cyberattacks via Trend Micro's midyear 2021 cybersecurity report.\"><br \/>\n<meta property=\"og:site_name\" content=\"Trend Micro\"><br \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/21\/i\/cyberattacks-from-all-angles-2021-midyear-report\/2021-midyear-cybersecurity-report.jpg\"><br \/>\n<meta property=\"og:locale\" content=\"en_US\"> <meta name=\"twitter:card\" content=\"summary_large_image\"><br \/>\n<meta name=\"twitter:site\" content=\"@TrendMicro\"><br \/>\n<meta name=\"twitter:title\" content=\"Cyberattacks from all Angles: 2021 Midyear Report\"><br \/>\n<meta name=\"twitter:description\" content=\"Learn the latest cyberattacks via Trend Micro's midyear 2021 cybersecurity report.\"><br \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/21\/i\/cyberattacks-from-all-angles-2021-midyear-report\/2021-midyear-cybersecurity-report.jpg\"> <\/head> <body class=\"articlepage page basicpage context-business context-ciso\" id=\"readabilityBody\" readability=\"47.237268061587\"> <!-- Page Scroll: Back to Top --> <a id=\"page-scroll\" title=\"VerticalPageScroll\" href=\"javascript:jumpScroll($(this).scrollTop());\"> <span class=\"icon-chevron-up\"><\/span> <\/a> <!-- \/* Data Layer *\/ --> <\/p>\n<div class=\"root responsivegrid\">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"articleBodyHero aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"research-layout article hero container\" role=\"contentinfo\">\n<article class=\"research-layout--wrapper row\" data-article-pageid=\"1193928416\">\n<div class=\"col-xs-12 col-md-12 research-layout--columns\">\n<div class=\"col-xs-12 col-md-6 research-layout--inner\" readability=\"7.7241379310345\">\n<div class=\"article-details\" role=\"heading\" readability=\"34.758620689655\"> <span class=\"article-details__bar\" role=\"img\"><\/span> <\/p>\n<p class=\"article-details__display-tag\">Risk Management<\/p>\n<p class=\"article-details__description\">We look at the most pertinent cybersecurity issues organizations across the globe faced in the first half of 2021.<\/p>\n<p class=\"article-details__author-by\">By: Trend Micro <time class=\"article-details__date\">September 22, 2021<\/time> <span>Read time:&nbsp;<\/span><span class=\"eta\"><\/span> (<span class=\"words\"><\/span> words) <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-xs-12 col-md-6 research-layout--inner\">\n<figure class=\"research-layout--figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/21\/i\/cyberattacks-from-all-angles-2021-midyear-report\/2021-midyear-cybersecurity-report.jpg\" alt=\"Midyear cybersecurity report\"> <\/figure>\n<\/p><\/div>\n<\/p><\/div>\n<hr class=\"research-layout-divider\"> <main class=\"main--content col-xs-12 col-md-8 col-md-push-2\"> <\/p>\n<div>\n<div class=\"richText\" readability=\"33.242596810934\">\n<div readability=\"13.489749430524\">\n<p><span class=\"body-subhead-title\">Ransomware continues to attack prominent targets<\/span><\/p>\n<p>With the impact of ransomware <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/jbs-paid-11-million-to-revil-ransomware-225m-first-demanded\/\" target=\"_blank\" rel=\"noopener\">still being felt<\/a> in significant ways around the world, we have seen some positive signs across our customers that advanced new technologies like machine learning and behavioral analysis are stopping the threat sooner. We have also observed that banking and government continue to be major targets, with banking getting the majority of attention from attackers.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/21\/i\/cyberattacks-from-all-angles-2021-midyear-report\/ransomware-attack-prominent-targets.png\" alt=\"prominent targets\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"39\">\n<div readability=\"23\">\n<p><span class=\"body-subhead-title\">New year, new threat tactics and groups<\/span><\/p>\n<p>Well-known cybercriminal groups switched up their attack strategies to keep enterprises on their toes. For example, TeamTNT targeted Amazon Web Services (AWS) credentials and Kubernetes clusters, while Iron Tiger updated its toolkit with a malware variant. New threat actors also emerged\u2014Earth Wendigo established itself by targeting government organizations, research institutions, and universities in Taiwan.<\/p>\n<p><span class=\"body-subhead-title\">COVID-19 related scams and issues remain relevant<\/span><\/p>\n<p>Threat groups continued to use COVID-19 as the base of their campaigns. They used pandemic-related topics in phishing schemes and other threats. Vaccine-related scams also continued to spread in-line with the vaccine rollout across the globe.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/21\/i\/cyberattacks-from-all-angles-2021-midyear-report\/top-3-countries-affected-covid-19.png\" alt=\"top countries affected covid 19\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"36.228177641654\">\n<div readability=\"23.857580398162\">\n<p>As companies continued to work remotely, vulnerabilities associated with Microsoft SharePoint, VPN, and Microsoft Exchange Server remained a pressing issue for enterprises using these platforms.<\/p>\n<p><span class=\"body-subhead-title\">Defending against attacks from all angles<\/span><\/p>\n<p>How can you design a security strategy that addresses all angles of attack? It\u2019s ideal to deploy a multilayered approach that protects your entire ecosystem and different environments, including endpoints, web, email, servers, clouds, and networks.<\/p>\n<p>For more insights into the most prominent attacks in the first half of 2021, check out <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/attacks-from-all-angles-2021-midyear-security-roundup\">\u201cAttack From All Angles: Trend Micro 2021 Midyear Cybersecurity Report.\u201d<\/a>&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<section class=\"tag--list\">\n<p>Tags<\/p>\n<\/section>\n<p> <\/main> <\/article>\n<\/div>\n<\/div><\/div>\n<\/div>\n<p> <!-- \/* Core functionality javascripts, absolute URL to leverage Akamai CDN *\/ --> <!--For Modal-start--> <\/p>\n<p> <span>sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk<\/span> <\/p>\n<p> <!--For Modal-end--> <!-- Go to www.addthis.com\/dashboard to customize your tools --> <\/body> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/21\/i\/cyberattacks-from-all-angles-2021-midyear-report.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We look at the most pertinent cybersecurity issues organizations across the globe faced in the first half of 2021. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":43011,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9528,9549,9559,9527,9529],"class_list":["post-43010","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-ciso-article","tag-trend-micro-ciso-cloud","tag-trend-micro-ciso-compliance","tag-trend-micro-ciso-expert-perspective","tag-trend-micro-ciso-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberattacks from all Angles: 2021 Midyear Report 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattacks from all Angles: 2021 Midyear Report 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-22T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/cyberattacks-from-all-angles-2021-midyear-report.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1282\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cyberattacks from all Angles: 2021 Midyear Report\",\"datePublished\":\"2021-09-22T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/\"},\"wordCount\":315,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/cyberattacks-from-all-angles-2021-midyear-report.jpg\",\"keywords\":[\"Trend Micro CISO : Article\",\"Trend Micro CISO : Cloud\",\"Trend Micro CISO : Compliance\",\"Trend Micro CISO : Expert Perspective\",\"Trend Micro CISO : Risk Management\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/\",\"name\":\"Cyberattacks from all Angles: 2021 Midyear Report 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/cyberattacks-from-all-angles-2021-midyear-report.jpg\",\"datePublished\":\"2021-09-22T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/cyberattacks-from-all-angles-2021-midyear-report.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/cyberattacks-from-all-angles-2021-midyear-report.jpg\",\"width\":1282,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro CISO : Article\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-article\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyberattacks from all Angles: 2021 Midyear Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattacks from all Angles: 2021 Midyear Report 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/","og_locale":"en_US","og_type":"article","og_title":"Cyberattacks from all Angles: 2021 Midyear Report 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-09-22T00:00:00+00:00","og_image":[{"width":1282,"height":700,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/cyberattacks-from-all-angles-2021-midyear-report.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cyberattacks from all Angles: 2021 Midyear Report","datePublished":"2021-09-22T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/"},"wordCount":315,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/cyberattacks-from-all-angles-2021-midyear-report.jpg","keywords":["Trend Micro CISO : Article","Trend Micro CISO : Cloud","Trend Micro CISO : Compliance","Trend Micro CISO : Expert Perspective","Trend Micro CISO : Risk Management"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/","url":"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/","name":"Cyberattacks from all Angles: 2021 Midyear Report 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/cyberattacks-from-all-angles-2021-midyear-report.jpg","datePublished":"2021-09-22T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/cyberattacks-from-all-angles-2021-midyear-report.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/cyberattacks-from-all-angles-2021-midyear-report.jpg","width":1282,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-from-all-angles-2021-midyear-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro CISO : Article","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-article\/"},{"@type":"ListItem","position":3,"name":"Cyberattacks from all Angles: 2021 Midyear Report"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43010"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43010\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/43011"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}