On March 5, 2026, Check Point Research highlighted findings from a new threat report indicating that Latin America (LATAM) has become the global epicenter for cyberattacks. The research shows that organizations in the region are experiencing an average of 3,100 cyber threats per week. This attack volume is more than double the average of just under 1,500 weekly attacks targeting organizations in the United States. This data, which follows a previous report noting a 53% year-over-year increase in attacks in LATAM, signals a significant and sustained escalation of malicious activity targeting the region.
The report's key finding is the sheer volume of attacks directed at Latin America, making it the most besieged region globally. This trend is driven by several factors:
The attacks are varied and span all major categories, including ransomware, banking trojans, information stealers, and mobile malware.
The disproportionately high volume of attacks places immense pressure on businesses and government agencies across Latin America. This can lead to increased financial losses from fraud and ransomware, disruption of critical services, and theft of sensitive government and corporate data. The trend indicates a strategic pivot by global cybercriminal groups to focus on regions where they perceive a higher chance of success. This necessitates a corresponding pivot from regional governments and businesses to prioritize cybersecurity investment, capacity building, and international cooperation to build a more resilient defensive posture.
While the report is informational, the implications for organizations in Latin America are clear:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats