World Malware Map - December 2015

Where is most malicious code being hosted in the world?

World Malware Map - December 2015

Top 5 Most Observed Vulnerabilities - December 2015

Anonymized feedback from Trustwave filtering installations showed most observed threats were based on the following vulnerabilities:

VulnerabilityDisclosedPatched
  1. Internet Explorer Memory Corruption Vulnerability (CVE-2014-6332)
20142014
  1. Generic Malicious Flash
  1. Generic Exploit Kit
  1. Local File XML Call (CVE-2013-7331)
2014
  1. Sutra TDS Redirection