Guest

Cisco 2017 Midyear Cybersecurity Report Graphics

Click the image or its link. Then use the Save As function to download it.

You can use the PNG images in a presentation, social media post, or any other way you like.

Figure 1 : Exploit kit activity

Download

Figure 2 : Number of days required to patch 80% of flash vulnerabilities

Download

Figure 3 : Most commonly observed malware (top malicious blocks), November 2016-May 2017

Download


Figure 4 : Web block ratios (global)

Download

Figure 5 : Spyware families

Download

Figure 6 : Screenshot of Hola VPN's homepage

Download


Figure 7 : Screenshot of RelevantKnowledge's homepage

Download

Figure 8 : DNS Unlocker homepage

Download

Figure 9 : Comparisons of affected users per spyware family

Download


Figure 10 : Spyware distribution

Download

Figure 11 : IP blocks by country

Download

Figure 12 : Necurs "Pump-and-Dump" spam activity (over 24 hours)

Download


Figure 13 : Most commonly detected malware families (by count)

Download

Figure 14 : Patterns of top malware families, 2017

Download

Figure 15 : Most commonly detected malicious file extensions

Download


Figure 16 : Patterns of top malicious file extensions, 2017

Download

Figure 17 : File extension (.arj, .doc, .jar, .zip) and malware family relationships

Download

Figure 18 : Amount of loss due to BEC

Download


Figure 19 : Median TTD by month

Download

Figure 20 : TTD medians of top 20 malware families

Download

Figure 21 : Number of unique vectors seen per month in web events

Download


Figure 22 : Number of unique vectors seen per month in email events

Download

Figure 23 : TTD and hash ages for Kryptik

Download

Figure 24 : TTD and hash ages for Nemucod

Download


Figure 25 : TTD and hash ages for Ramnit

Download

Figure 26 : TTD and hash ages for Fareit

Download

Figure 27 : DGA life spans

Download


Figure 28 : Colocation methodology

Download

Figure 29 : Links among infrastructure used by APT group

Download

Figure 30 : Kingslayer compromise infection chain

Download


Figure 31 : Schoolbell malware infection worldwide

Download

Figure 32 : Menu of Mirai attack vectors

Download

Figure 33 : Command sequence of BrickerBot.1

Download


Figure 34 : Message from Hajime's author

Download

Figure 35 : Distribution of cyber ransom attacks by country, 2016

Download

Figure 36 : Examples of cyber attack tools and panels

Download


Figure 37 : Oncology system exploit

Download

Figure 38 : MRI system exploit

Download

Figure 39 : Critical advisories, November 2016-May 2017

Download


Figure 40 : Client-server vulnerabilities

Download

Figure 41 : Top threat categories, November-May 2017

Download

Figure 42 : CouchDB status distribution

Download


Figure 43 : Elasticsearch status distribution

Download

Figure 44 : MongoDB status distribution

Download

Figure 45 : MongoDB versions

Download


Figure 46 : MongoDB database size distribution by number of exposed tables, January-April 2017

Download

Figure 47 : Distribution of docker instances by country, January-April 2017

Download

Figure 48 : Docker use

Download


Figure 49 : Docker instance

Download

Figure 50 : Vulnerabilities_Memcached

Download

Figure 51 : Memcached servers by country

Download


Figure 52 : Cloud apps

Download

Figure 53 : Inflation privileged user accounts

Download

Figure 54 : Privileged user activity

Download


Figure 55 : 60% privileged users never log out of active sessions

Download

Figure 56 : Perceived risk of threats by size of organization

Download

Figure 57 : Likelihood of using key threat defenses

Download


Figure 58 : Percent of SMBs and enterprises outsourcing services by country

Download

Figure 59 : Alert averages by country

Download

Figure 60 : Percentage of service providers that use solutions from 6 or more vendors and products

Download


Figure 61 : Revenue losses from attacks

Download

Figure 62 : Public sector

Download

Figure 63 : Outsourcing adds much-needed services

Download


Figure 64 : Targeted attacks and insider exfiltration

Download

Figure 65 : Consequences of data breaches

Download

Figure 66 : Percentage of manufacturers

Download


Figure 67 : Number of trained security personnel

Download

Figure 68 : Targeted attacks and APTs are most critical concerns

Download

Figure 69 : Breaches drove improvements

Download


Figure 70 : Targeted attacks are high security risk

Download

Figure 71 : Fewer than half of alerts are remediated

Download

Figure 72 : Cloud infrastructure and mobile

Download


Figure 73 : Transportation security

Download

Figure 74 : Percentage of financial services organizations

Download

Figure 75 : Impact of digital business

Download