Data sourced from CISA, IBM, Mandiant, Coveware, and open research. Updated regularly.
Median durations across each stage of a typical breach lifecycle
How long each class of attack persists before detection or resolution
Consumer router infrastructure — an active and growing attack surface
AttackClock aggregates open-source threat intelligence to show the full lifecycle of cyber risk — from vulnerability disclosure through exploitation, dwell time, detection, and recovery.
Data from: CISA KEV, IBM Cost of Data Breach, Mandiant M-Trends, Coveware, Zero Day Clock, NVD, and other open sources.
Built by Cairn. A project of the Value Chain Risk Institute.