CIS Logo
tagline: Confidence in the Connected World

Top 10 Malware variants comprised 48% of total malware activity in December 2019 with fewer infections across almost every Top 10 malware variant.

Hear from a few cyber thought leaders at CIS and learn what cybersecurity trends they're expecting to see in the new year.

The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.

In November 2019, the Top 10 Malware saw Emotet & TrickBot fall out of the Top 10. The Top 10 variants comprised 57% of total malware activity in November.

Hear from the prominent women who work at CIS and support our mission on a daily basis as they give career advice for women in tech.

In October 2019, malware utilizing initiation vectors accounted for the greatest number of alerts in the Top 10 Malware list.

Hear from Senior VP Tony Sager who represented CIS and accept the “Founders Award for National Cyber Defense Leadership” at Minnesota’s annual event. 

The Top 10 Malware variants for September closely resemble those of the previous month with the exception of Bifrose and CryptoWall.

In July 2019, the top 10 malware activity accounted for 66% of total malware activity, a 3% increase over June. Cerber and Brambul activity returned.

The malware variants comprising the Top 10 Malware list for August 2019 saw the same many of the same variants from the previous month with two exceptions

Top 10 Malware activity accounted for 63% of total malware notifications in June 2019 which is a 3 percent increase from May.

In May 2019 the Top 10 Malware was consistent with the previous month’s list with two exceptions. WannaCry dropped out and Pushdo made the list.

The top 10 malware activity accounts for 64% of total malware notifications in April, a 7% increase from March. Malspam is the primary initiation vector.

The top 10 malware activity accounted for 57% of total malware notifications in March, which is a 1% increase from February.

Learn what it's like to help U.S. State, Local, Tribal, and Territorial (SLTT) government entities respond to cyber incidents on a daily basis.

1 2 3 6