Guest

Cisco 2016 Midyear Cybersecurity Report Graphics

Click the image or its link. Then use the Save As function to download it.

You can use the PNG images in a presentation, social media post, or any other way you like.

Figure 1: Cumulative Annual Alert Tools

Download

Figure 2: Rise of Authentication Cryptographic Issues

Download

Figure 3: Vulnerabilities Used by Exploit Kits

Download

Figure 4: Vulnerabilities by Infrastructure Vendor

Download

Figure 5: Presence of Webshells Indicates JBOSS Compromises

Download

Figure 6: Spam Volume by Country December 2015 - May 2016

Download

Figure 7: Popular Social Engineering Topics Used in Spam

Download

Figure 8: Ad Injectors are Major Source of HTTPS Increase

Download

Figure 9: HTTPS Traffic Increase April 2015 April 2016

Download

Figure 10: Ad Injectors a Main Component Observed in Adware Infections

Download

Figure 11: How Malvertising as a Service Works

Download

Figure 12: Most Commonly Observed Malware

Download

Figure 13: Sample of Observed Lower Volume Malware

Download

Figure 14:Chrome Installations by Version

Download

Figure 15: Java Installations by Version

Download

Figure 16: Microsoft Office Installations by Version

Download

Figure 17: Percentage of Devices Running Known Vulnerabilities by Age

Download

Figure 18: Number of Vulnerable Cisco Devices

Download

Figure 19: Number of Vulnerable Software Installations by Product

Download

Figure 20: Vulnerable Software Installations by Region

Download

Figure 21: Software Hygiene Overview

Download

Figure 22: Mean Years Cisco Devices Have Been Vulnerable

Download

Figure 23: Mean Years Various Types of Server Software Have Been Vulnerable by Region

Download

Figure 24: Encrypted HTTPS Traffic Relatively Stable in 2016 to Date

Download

Figure 25: HTTPS Malware Traffic Increase January 2015 April-2016

Download

Figure 26: Top Applications Using HTTPS

Download

Figure 27: Percentage of Malware Samples Using TLS

Download

Figure 28: Similarity of Malware Families in Comparing TLS Parameters

Download

Figure 29: Confusion Matrix

Download

Figure 30: Median TTD by Month December 2014-March 2016

Download

Figure 31: Convicted Hashes by Hour of Day

Download

Figure 32: TTD Medians of Top Malware Families Top 20 Families by Detection Count

Download

Figure 33: Top 10 Malware Families Detected by Month

Download

Figure 34: Examples of Early and Late Detection of Malware Families Based on Median TTD of 13 Hours

Download

Figure 35: Web Blocks by Country

Download

Figure 36: Monthly Vertical Block Rates January April 2016

Download