Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security NewswireCybersecurity NewsBanking/Finance/InsuranceConstruction, Real Estate, Property ManagementInfrastructure:Electric,Gas & WaterGovernment: Federal, State and LocalHospitals & Medical CentersPorts: Sea, Land, & AirRetail/Restaurants/ConvenienceTransportation/Logistics/Supply Chain/Distribution/ Warehousing

Cisco Security Report Shows Unprecedented Growth of Advanced Attacks and Malicious Traffic

New Newswire Feature Image 3/8/2012
January 16, 2014

The Cisco 2014 Annual Security Report reveals that threats designed to take advantage of users’ trust in systems, applications and personal networks have reached startling levels.

According to the report, a worldwide shortage of nearly a million skilled security professionals is impacting organizations’ abilities to monitor and secure networks, while overall vulnerabilities and threats reached their highest levels since 2000.

The report reveals an increased sophistication and proliferation of the threat landscape. Simple attacks that caused containable damage have given way to organized cybercrime operations that are sophisticated, well-funded, and capable of significant economic and reputational damage to public and private sector victims.

In addition, there is an increased complexity of threats and solutions due to rapid growth in intelligent mobile device adoption and cloud computing that provide a greater attack surface than ever before. New classes of devices and new infrastructure architectures offer attackers opportunities to exploit unanticipated weaknesses and inadequately defended assets.

The report also reveals that cybercriminals have learned that harnessing the power of Internet infrastructure yields far more benefits than simply gaining access to individual computers or devices. These infrastructure-scale attacks seek to gain access to strategically positioned web hosting servers, nameservers and data centers—with the goal of proliferating attacks across legions of individual assets served by these resources. By targeting Internet infrastructure, attackers undermine trust in everything connected to or enabled by it.

Other report findings include:  

Overall vulnerabilities and threatsreached the highest level since initial tracking began in May 2000. As of Oct. 2013, cumulative annual alert totals increased 14 percent year-over-year from 2012.

 

  • The report indicates a shortage of more than a million security professionalsacross the globe in 2014. The sophistication of the technology and tactics used by online criminals—and their nonstop attempts to breach networks and steal data—have outpaced the ability of IT and security professionals to address these threats. Most organizations do not have the people or the systems to continuously monitor extended networks and detect infiltrations, and then apply protections, in a timely and effective manner.
  •  

  • One-hundred percent of a sample of 30 of the world’s largest multinational company networks generated visitor traffic to Web sites that host malware. Ninety-six percent of networks reviewed communicated traffic to hijacked servers. Similarly, 92 percent transmitted traffic to Web pages without content, which typically host malicious activity.
  •  

  • Distributed Denial of Service (DDoS) attacks—which disrupt traffic to and from targeted websites and can paralyze ISPs—have increased in both volume and severity. Some DDoS attacks seek to conceal other nefarious activity, such as wire fraud before, during or after a noisy and distracting DDoS campaign.
  •  

  • Multipurpose Trojans counted as the most frequently encounteredweb-delivered malware, at 27 percent of total encounters in 2013. Malicious scripts, such as exploits and iframes, formed the second most frequently encountered category at 23 percent. Data theft Trojans such as password stealers and backdoors made up 22 percent of total web malware encounters. The steady decline in unique malware hosts and IP addresses—down 30 percent between Jan. 2013 and Sept. 2013—suggests that malware is being concentrated in fewer hosts and fewer IP addresses.
  •  
  • Java continues to be the most frequently exploitedprogramming language targeted by online criminals.Data from Sourcefire, now a part of Cisco, shows that Java exploits make up the vast majority (91 percent) of Indicators of Compromise (IOCs).
  •  
  • Ninety-nine percent of all mobile malwaretargeted Android devices. At 43.8 percent, Andr/Qdplugin-A was the most frequently encountered mobile malware, typically via repackaged copies of legitimate apps distributed via non-official marketplaces.
  • KEYWORDS: cyber security cybercrime security threats

    Share This Story

    Looking for a reprint of this article?
    From high-res PDFs to custom plaques, order your copy today!

    Recommended Content

    JOIN TODAY
    To unlock your recommendations.

    Already have an account? Sign In

    • Security's Top Cybersecurity Leaders 2024

      Security's Top Cybersecurity Leaders 2024

      Security magazine's Top Cybersecurity Leaders 2024 award...
      Top Cybersecurity Leaders
      By: Security Staff
    • cyber brain

      The intersection of cybersecurity and artificial intelligence

      Artificial intelligence (AI) is a valuable cybersecurity...
      Columns
      By: Pam Nigro
    • artificial intelligence AI graphic

      Assessing the pros and cons of AI for cybersecurity

      Artificial intelligence (AI) has significant implications...
      Technologies & Solutions
      By: Charles Denyer
    Manage My Account
    • Security eNewsletter & Other eNews Alerts
    • eMagazine Subscriptions
    • Manage My Preferences
    • Online Registration
    • Mobile App
    • Subscription Customer Service

    Security’s Top 5 – 2024 Year in Review

    Security’s Top 5 – 2024 Year in Review

    Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

    Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

    The Money Laundering Machine: Inside the global crime epidemic - Episode 24

    The Money Laundering Machine: Inside the global crime epidemic - Episode 24

    More Videos

    Sponsored Content

    Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

    close
    • Sureview screen
      Sponsored bySureView Systems

      The Evolution of Automation in the Command Center

    • Crisis Response Team
      Sponsored byEverbridge

      Automate or Fall Behind – Crisis Response at the Speed of Risk

    • Perimeter security
      Sponsored byAMAROK

      Why Property Security is the New Competitive Advantage

    Popular Stories

    Rendered computer with keyboard

    16B Login Credentials Exposed in World’s Largest Data Breach

    Verizon on phone screen

    61M Records Listed for Sale Online, Allegedly Belong to Verizon

    Security camera

    40,000 IoT Security Cameras Are Exposed Online

    Fountain pen

    Trump Administration Executive Order Changes Cybersecurity Policy

    Red spiderweb

    From Retail to Insurance, Scattered Spider Changes Targets

    2025 Security Benchmark banner

    Events

    July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

    August 7, 2025

    Threats to the Energy Sector: Implications for Corporate and National Security

    The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

    View All Submit An Event

    Products

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

    See More Products

    Related Articles

    • cyber 3 responsive default

      Cisco 2017 Midyear Cybersecurity Report predicts New “Destruction of Service” Attacks

      See More
    • New Newswire Feature Image 3/8/2012

      Internet Security Threat Report Reveals 81 Percent Increase in Malicious Attacks

      See More
    • cybersecurity-mask.jpg

      Report shows nearly 600% annual growth in vulnerable cloud attack surface

      See More

    Related Products

    See More Products
    • CASP.jpg.jpg

      CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

    • 9780367259044.jpg

      Understanding Homeland Security: Foundations of Security Policy

    • Security of Information and Communication Networks

    See More Products
    ×

    Sign-up to receive top management & result-driven techniques in the industry.

    Join over 20,000+ industry leaders who receive our premium content.

    SIGN UP TODAY!
    • RESOURCES
      • Advertise
      • Contact Us
      • Store
      • Want More
    • SIGN UP TODAY
      • Create Account
      • eMagazine
      • eNewsletter
      • Customer Service
      • Manage Preferences
    • SERVICES
      • Marketing Services
      • Reprints
      • Market Research
      • List Rental
      • Survey/Respondent Access
    • STAY CONNECTED
      • LinkedIn
      • Facebook
      • YouTube
      • X (Twitter)
    • PRIVACY
      • PRIVACY POLICY
      • TERMS & CONDITIONS
      • DO NOT SELL MY PERSONAL INFORMATION
      • PRIVACY REQUEST
      • ACCESSIBILITY

    Copyright ©2025. All Rights Reserved BNP Media.

    Design, CMS, Hosting & Web Development :: ePublishing

    Security Magazine logo
    search
    cart
    facebook twitter linkedin youtube
    • Sign In
    • Create Account
    • Sign Out
    • My Account
    Security Magazine logo
    • NEWS
      • Security Newswire
      • Technologies & Solutions
    • MANAGEMENT
      • Leadership Management
      • Enterprise Services
      • Security Education & Training
      • Logical Security
      • Security & Business Resilience
      • Profiles in Excellence
    • PHYSICAL
      • Access Management
      • Fire & Life Safety
      • Identity Management
      • Physical Security
      • Video Surveillance
      • Case Studies (Physical)
    • CYBER
      • Cybersecurity News
      • More
    • BLOG
    • COLUMNS
      • Cyber Tactics
      • Leadership & Management
      • Security Talk
      • Career Intelligence
      • Leader to Leader
      • Cybersecurity Education & Training
    • EXCLUSIVES
      • Annual Guarding Report
      • Most Influential People in Security
      • The Security Benchmark Report
      • The Security Leadership Issue
      • Top Guard and Security Officer Companies
      • Top Cybersecurity Leaders
      • Women in Security
    • SECTORS
      • Arenas / Stadiums / Leagues / Entertainment
      • Banking/Finance/Insurance
      • Construction, Real Estate, Property Management
      • Education: K-12
      • Education: University
      • Government: Federal, State and Local
      • Hospitality & Casinos
      • Hospitals & Medical Centers
      • Infrastructure:Electric,Gas & Water
      • Ports: Sea, Land, & Air
      • Retail/Restaurants/Convenience
      • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
    • EVENTS
      • Industry Events
      • Webinars
      • Solutions by Sector
      • Security 500 Conference
    • MEDIA
      • Videos
        • Cybersecurity & Geopolitical Discussion
        • Ask Me Anything (AMA) Series
      • Podcasts
      • Polls
      • Photo Galleries
    • MORE
      • Call for Entries
      • Classifieds & Job Listings
      • Continuing Education
      • Newsletter
      • Sponsor Insights
      • Store
      • White Papers
    • EMAG
      • eMagazine
      • This Month's Content
      • Advertise
    • SIGN UP!