Have an account?
  •   Personalized content
  •   Your products and support

Need an account?

Create an account

Cisco 2016 Midyear Cybersecurity Report Graphics

Click the image or its link. Then use the Save As function to download it.

You can use the PNG images in a presentation, social media post, or any other way you like.

Figure 1: Cumulative Annual Alert Tools

Download

Figure 2: Rise of Authentication Cryptographic Issues

Download

Figure 3: Vulnerabilities Used by Exploit Kits

Download

Figure 4: Vulnerabilities by Infrastructure Vendor

Download

Figure 5: Presence of Webshells Indicates JBOSS Compromises

Download

Figure 6: Spam Volume by Country December 2015 - May 2016

Download

Figure 7: Popular Social Engineering Topics Used in Spam

Download

Figure 8: Ad Injectors are Major Source of HTTPS Increase

Download

Figure 9: HTTPS Traffic Increase April 2015 April 2016

Download

Figure 10: Ad Injectors a Main Component Observed in Adware Infections

Download

Figure 11: How Malvertising as a Service Works

Download

Figure 12: Most Commonly Observed Malware

Download

Figure 13: Sample of Observed Lower Volume Malware

Download

Figure 14:Chrome Installations by Version

Download

Figure 15: Java Installations by Version

Download

Figure 16: Microsoft Office Installations by Version

Download

Figure 17: Percentage of Devices Running Known Vulnerabilities by Age

Download

Figure 18: Number of Vulnerable Cisco Devices

Download

Figure 19: Number of Vulnerable Software Installations by Product

Download

Figure 20: Vulnerable Software Installations by Region

Download

Figure 21: Software Hygiene Overview

Download

Figure 22: Mean Years Cisco Devices Have Been Vulnerable

Download

Figure 23: Mean Years Various Types of Server Software Have Been Vulnerable by Region

Download

Figure 24: Encrypted HTTPS Traffic Relatively Stable in 2016 to Date

Download

Figure 25: HTTPS Malware Traffic Increase January 2015 April-2016

Download

Figure 26: Top Applications Using HTTPS

Download

Figure 27: Percentage of Malware Samples Using TLS

Download

Figure 28: Similarity of Malware Families in Comparing TLS Parameters

Download

Figure 29: Confusion Matrix

Download

Figure 30: Median TTD by Month December 2014-March 2016

Download

Figure 31: Convicted Hashes by Hour of Day

Download

Figure 32: TTD Medians of Top Malware Families Top 20 Families by Detection Count

Download

Figure 33: Top 10 Malware Families Detected by Month

Download

Figure 34: Examples of Early and Late Detection of Malware Families Based on Median TTD of 13 Hours

Download

Figure 35: Web Blocks by Country

Download

Figure 36: Monthly Vertical Block Rates January April 2016

Download