Have an account?

  •   Personalized content
  •   Your products and support

Need an account?

Create an account

Cisco 2017 Midyear Cybersecurity Report Graphics

Click the image or its link. Then use the Save As function to download it.

You can use the PNG images in a presentation, social media post, or any other way you like.

Figure 1 : Exploit kit activity

Download

Figure 2 : Number of days required to patch 80% of flash vulnerabilities

Download

Figure 3 : Most commonly observed malware (top malicious blocks), November 2016-May 2017

Download


Figure 4 : Web block ratios (global)

Download

Figure 5 : Spyware families

Download

Figure 6 : Screenshot of Hola VPN's homepage

Download


Figure 7 : Screenshot of RelevantKnowledge's homepage

Download

Figure 8 : DNS Unlocker homepage

Download

Figure 9 : Comparisons of affected users per spyware family

Download


Figure 10 : Spyware distribution

Download

Figure 11 : IP blocks by country

Download

Figure 12 : Necurs "Pump-and-Dump" spam activity (over 24 hours)

Download


Figure 13 : Most commonly detected malware families (by count)

Download

Figure 14 : Patterns of top malware families, 2017

Download

Figure 15 : Most commonly detected malicious file extensions

Download


Figure 16 : Patterns of top malicious file extensions, 2017

Download

Figure 17 : File extension (.arj, .doc, .jar, .zip) and malware family relationships

Download

Figure 18 : Amount of loss due to BEC

Download


Figure 19 : Median TTD by month

Download

Figure 20 : TTD medians of top 20 malware families

Download

Figure 21 : Number of unique vectors seen per month in web events

Download


Figure 22 : Number of unique vectors seen per month in email events

Download

Figure 23 : TTD and hash ages for Kryptik

Download

Figure 24 : TTD and hash ages for Nemucod

Download


Figure 25 : TTD and hash ages for Ramnit

Download

Figure 26 : TTD and hash ages for Fareit

Download

Figure 27 : DGA life spans

Download


Figure 28 : Colocation methodology

Download

Figure 29 : Links among infrastructure used by APT group

Download

Figure 30 : Kingslayer compromise infection chain

Download


Figure 31 : Schoolbell malware infection worldwide

Download

Figure 32 : Menu of Mirai attack vectors

Download

Figure 33 : Command sequence of BrickerBot.1

Download


Figure 34 : Message from Hajime's author

Download

Figure 35 : Distribution of cyber ransom attacks by country, 2016

Download

Figure 36 : Examples of cyber attack tools and panels

Download


Figure 37 : Oncology system exploit

Download

Figure 38 : MRI system exploit

Download

Figure 39 : Critical advisories, November 2016-May 2017

Download


Figure 40 : Client-server vulnerabilities

Download

Figure 41 : Top threat categories, November-May 2017

Download

Figure 42 : CouchDB status distribution

Download


Figure 43 : Elasticsearch status distribution

Download

Figure 44 : MongoDB status distribution

Download

Figure 45 : MongoDB versions

Download


Figure 46 : MongoDB database size distribution by number of exposed tables, January-April 2017

Download

Figure 47 : Distribution of docker instances by country, January-April 2017

Download

Figure 48 : Docker use

Download


Figure 49 : Docker instance

Download

Figure 50 : Vulnerabilities_Memcached

Download

Figure 51 : Memcached servers by country

Download


Figure 52 : Cloud apps

Download

Figure 53 : Inflation privileged user accounts

Download

Figure 54 : Privileged user activity

Download


Figure 55 : 60% privileged users never log out of active sessions

Download

Figure 56 : Perceived risk of threats by size of organization

Download

Figure 57 : Likelihood of using key threat defenses

Download


Figure 58 : Percent of SMBs and enterprises outsourcing services by country

Download

Figure 59 : Alert averages by country

Download

Figure 60 : Percentage of service providers that use solutions from 6 or more vendors and products

Download


Figure 61 : Revenue losses from attacks

Download

Figure 62 : Public sector

Download

Figure 63 : Outsourcing adds much-needed services

Download


Figure 64 : Targeted attacks and insider exfiltration

Download

Figure 65 : Consequences of data breaches

Download

Figure 66 : Percentage of manufacturers

Download


Figure 67 : Number of trained security personnel

Download

Figure 68 : Targeted attacks and APTs are most critical concerns

Download

Figure 69 : Breaches drove improvements

Download


Figure 70 : Targeted attacks are high security risk

Download

Figure 71 : Fewer than half of alerts are remediated

Download

Figure 72 : Cloud infrastructure and mobile

Download


Figure 73 : Transportation security

Download

Figure 74 : Percentage of financial services organizations

Download

Figure 75 : Impact of digital business

Download