12 datasets found
  1. Share of malware detected across Asia Pacific 2016-2017 by type

    • statista.com
    Updated Jul 9, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Share of malware detected across Asia Pacific 2016-2017 by type [Dataset]. https://www.statista.com/statistics/946831/asia-pacific-malware-share-by-type/
    Explore at:
    Dataset updated
    Jul 9, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Asia, APAC
    Description

    This statistic depicts the share of malware detected across Asia Pacific in 2016/2017, by type. In this period, viruses and worms accounted for around ** percent of the malware detected across the Asia Pacific region.

  2. I

    India Cyber Security Incidents: Virus or Malicious Code

    • ceicdata.com
    Updated Mar 15, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    CEICdata.com (2023). India Cyber Security Incidents: Virus or Malicious Code [Dataset]. https://www.ceicdata.com/en/india/information-technology-statistics-cyber-security-incidents/cyber-security-incidents-virus-or-malicious-code
    Explore at:
    Dataset updated
    Mar 15, 2023
    Dataset provided by
    CEICdata.com
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Time period covered
    Dec 1, 2006 - Dec 1, 2017
    Area covered
    India
    Variables measured
    Technology
    Description

    India Cyber Security Incidents: Virus or Malicious Code data was reported at 9,750.000 Unit in 2017. This records a decrease from the previous number of 13,371.000 Unit for 2016. India Cyber Security Incidents: Virus or Malicious Code data is updated yearly, averaging 2,791.000 Unit from Dec 2004 (Median) to 2017, with 14 observations. The data reached an all-time high of 13,371.000 Unit in 2016 and a record low of 5.000 Unit in 2004. India Cyber Security Incidents: Virus or Malicious Code data remains active status in CEIC and is reported by Indian Computer Emergency Response Team. The data is categorized under India Premium Database’s Transportation, Post and Telecom Sector – Table IN.TF010: Information Technology Statistics: Cyber Security Incidents.

  3. Data Collection & Requirements

    • zenodo.org
    bin
    Updated Mar 20, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Zenodo (2025). Data Collection & Requirements [Dataset]. http://doi.org/10.5281/zenodo.14976797
    Explore at:
    binAvailable download formats
    Dataset updated
    Mar 20, 2025
    Dataset provided by
    Zenodohttp://zenodo.org/
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Open-Source Cybersecurity and AI Security Datasets

    This project provides a comprehensive collection of open-source datasets focused on cybersecurity threats and AI security vulnerabilities. The datasets are carefully selected to align with specific security threats, such as:

    • Data Exfiltration
    • Data Poisoning
    • Model Manipulation
    • Adversarial Examples
    • Model Inversion
    • Model Extraction
    • Spoofing Attacks
    • Unauthorized Access
    • Supply Chain Compromise

    Dataset Collection

    Each dataset includes a detailed description, source type, purpose, and direct access links for easy retrieval.

    1. DARPA Intrusion Detection Dataset

    • Access Here
    • Description: Simulated network traffic with various cyber attack scenarios (e.g., DoS, Probe, U2R, R2L).
    • Format: PCAP
    • Update Frequency: Static
    • Use Cases: IDS training, intrusion detection research

    2. MITRE ATT&CK Framework Data

    • Access Here
    • Description: A globally-accessible knowledge base of adversarial tactics, techniques, and procedures (TTPs).
    • Format: JSON, STIX
    • Update Frequency: Quarterly
    • Use Cases: Threat intelligence, adversary simulation, AI model defense

    3. VirusShare Malware Repository

    • Access Here (Registration Required)
    • Description: Large-scale collection of live malware samples for security research.
    • Format: ZIP, PE files
    • Update Frequency: Weekly
    • Use Cases: AI-based malware detection, sandbox testing

    4. National Vulnerability Database (NVD)

    • Access Here
    • Description: A repository of reported vulnerabilities (CVEs) with severity scores and descriptions.
    • Format: XML, JSON
    • Update Frequency: Daily
    • Use Cases: Vulnerability management, exploit mitigation research

    5. LANL Unified Host and Network Dataset

    • Access Here
    • Description: Enterprise-scale dataset containing network and host logs with real-world red-team attack events.
    • Format: Text files
    • Update Frequency: Static
    • Use Cases: Insider threat detection, anomaly detection in network security

    6. CIC-IDS2017 (Intrusion Detection Dataset)

    • Access Here
    • Description: Network traffic dataset with multiple attack types, including DDoS, brute-force, and infiltration attacks.
    • Format: PCAP, CSV
    • Update Frequency: Static
    • Use Cases: Machine learning-based intrusion detection, behavioral analysis

    7. CIC IoV CAN Bus Dataset 2024

    • Access Here
    • Description: Vehicle CAN bus data, including spoofing and denial-of-service (DoS) attack traces.
    • Format: CSV, PCAP
    • Update Frequency: Static
    • Use Cases: Automotive security, AI-based anomaly detection in vehicles

    8. ImageNet-A (Adversarial Image Dataset)

    • Access Here
    • Description: A dataset of real-world images that cause misclassification in deep learning models.
    • Format: JPEG
    • Update Frequency: Static
    • Use Cases: Adversarial robustness evaluation, model retraining for security
  4. p

    CIRCL - Operational Statistics

    • data.public.lu
    • data.europa.eu
    json
    Updated Aug 31, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Computer Incident Response Center Luxembourg (2021). CIRCL - Operational Statistics [Dataset]. https://data.public.lu/en/datasets/circl-operational-statistics/
    Explore at:
    jsonAvailable download formats
    Dataset updated
    Aug 31, 2021
    Dataset authored and provided by
    Computer Incident Response Center Luxembourg
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    The operational statistics cover the activities related to the incident response activities of CIRCL especially in regards to the reporting (e.g. incident reports, request for analysis or support during computer security incident) and notifications (e.g. take-down notification, notification about vulnerability) from/to third parties. The statistics exclude automatic structured notifications and information exchange happening via threat intelligence platforms such as the CIRCL MISP information sharing platform or any other automatic exchange setup with partners. In this section some statistics are presented about incidents handled by CIRCL between 2011 and 2017. During this time frame the attackers evolved, forcing CIRCL to adapt its internal procedures. Although the reporting to CIRCL is not mandatory, the reporting behaviour of constituents has changed. On one hand, the reputation of CIRCL increased, thereby increasing the amount of reporting to CIRCL. On the other hand, due to the trainings such as Introduction to incident response, forensic analysis and many others offered by CIRCL, have helped local organisations build up their own incident response capacities thereby reducing the number of reported incidents. This makes comparing the statistics of successive years challenging. Tickets are no indicators for the overall workload as there are some tickets that are very resource intensive whereas others are quickly solved. Nevertheless, the workload for the overall triage of the tickets is increasing and showing an increase in diversity when it comes to attacker practices.

  5. Teenage Online Behavior and Cybersecurity Risks

    • kaggle.com
    Updated Oct 9, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    DatasetEngineer (2024). Teenage Online Behavior and Cybersecurity Risks [Dataset]. http://doi.org/10.34740/kaggle/dsv/9587284
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Oct 9, 2024
    Dataset provided by
    Kagglehttp://kaggle.com/
    Authors
    DatasetEngineer
    License

    https://creativecommons.org/publicdomain/zero/1.0/https://creativecommons.org/publicdomain/zero/1.0/

    Description

    Dataset Description:

    This dataset captures the real-world online behavior of teenagers, focusing on e-safety awareness, cybersecurity risks, and device interactions. The data was collected from network activity logs and e-safety monitoring systems across various educational institutions and households in Texas and California. Spanning from January 2017 to October 2024, this dataset includes interactions with social media platforms, educational websites, and other online services, providing an in-depth look at teenage online activities in urban and suburban settings. The dataset is anonymized to protect user privacy and contains real incidents of network threats, security breaches, and cybersecurity behavior patterns observed in teenagers.

    Use Cases:

    Predicting e-safety awareness and online behavior patterns. Detecting malware exposure risk and cybersecurity vulnerabilities. Analyzing online habits related to social media and internet consumption. Evaluating cybersecurity behaviors like password strength, VPN usage, and phishing attempts. Features Overview:

    S.No Feature Name Description 1 Device Type The type of device used during the online session (Mobile, Laptop, Tablet, Desktop, etc.) 2 Malware Detection Whether malware was detected on the device during the session (Yes/No) 3 Phishing Attempts Number of phishing attempts experienced during online activity 4 Social Media Usage Frequency of social media usage (Low, Medium, High) 5 VPN Usage Whether a VPN was used during the session (Yes/No) 6 Cyberbullying Reports Number of reported cyberbullying incidents 7 Parental Control Alerts Number of alerts triggered by parental control software 8 Firewall Logs Number of blocked or allowed network connections by the firewall 9 Login Attempts Number of login attempts during the session 10 Download Risk Risk level associated with downloaded files (Low, Medium, High) 11 Password Strength Strength of the passwords used (Weak, Moderate, Strong) 12 Data Breach Notifications Number of alerts regarding compromised personal information 13 Online Purchase Risk Risk level of online purchases made (Low, Medium, High) 14 Education Content Usage Frequency of engagement with educational content (Low, Medium, High) 15 Age Group Age category of the teenager (Under 13, 13-16, 17-19) 16 Geolocation Location of network access (US, EU, etc.) 17 Public Network Usage Whether the online activity occurred over a public network (Yes/No) 18 Network Type Type of network connection (WiFi, Cellular, etc.) 19 Hours Online Total hours spent online during the session 20 Website Visits Number of websites visited per hour during the session 21 Peer Interactions Level of peer-to-peer interactions during online activity 22 Risky Website Visits Whether visits to risky websites occurred (Yes/No) 23 Cloud Service Usage Whether cloud services were accessed during the session (Yes/No) 24 Unencrypted Traffic Whether unencrypted network traffic was accessed during the session (Yes/No) 25 Ad Clicks Whether online advertisements were clicked during the session (Yes/No) 26 Insecure Login Attempts Number of insecure login attempts made (e.g., over unencrypted networks) Potential Research and Machine Learning Applications:

    Cybersecurity and anomaly detection models. Predictive modeling for e-safety awareness and risk behaviors. Time-series analysis of internet consumption and security threat trends. Behavioral clustering and pattern recognition in teenage online activity. Data Collection Method: The data was collected through collaboration with local schools and cybersecurity monitoring agencies. Real-time network monitoring systems captured interactions across different online platforms. All personally identifiable information (PII) was anonymized to ensure privacy, making the dataset ideal for public use in research and machine learning tasks.

    This dataset provides a rich foundation for studying teenage online behavior patterns and developing predictive models for cybersecurity awareness and risk mitigation. Researchers and data scientists can use this data to create models that better understand online behavior, identify security risks, and design interventions to improve e-safety for teenagers.

  6. Number of computer misuse offences reported in England and Wales...

    • statista.com
    Updated Jul 9, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of computer misuse offences reported in England and Wales 2015/2016-2017/2018 [Dataset]. https://www.statista.com/statistics/754008/computer-misuse-fraud-offences-england-wales/
    Explore at:
    Dataset updated
    Jul 9, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Apr 2015 - Mar 2018
    Area covered
    England, Wales, United Kingdom
    Description

    This statistic shows the number of computer misuse fraud offences by type recorded in England and Wales in the years ending March 2017 and March 2018. Computer viruses and malware cases fell sharply from *** thousand cases in the year ending March 2017, to *** thousand in the year ending March 2018.

  7. Network traffic datasets created by Single Flow Time Series Analysis

    • zenodo.org
    • data.niaid.nih.gov
    csv, pdf
    Updated Jul 11, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Josef Koumar; Josef Koumar; Karel Hynek; Karel Hynek; Tomáš Čejka; Tomáš Čejka (2024). Network traffic datasets created by Single Flow Time Series Analysis [Dataset]. http://doi.org/10.5281/zenodo.8035724
    Explore at:
    csv, pdfAvailable download formats
    Dataset updated
    Jul 11, 2024
    Dataset provided by
    Zenodohttp://zenodo.org/
    Authors
    Josef Koumar; Josef Koumar; Karel Hynek; Karel Hynek; Tomáš Čejka; Tomáš Čejka
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Network traffic datasets created by Single Flow Time Series Analysis

    Datasets were created for the paper: Network Traffic Classification based on Single Flow Time Series Analysis -- Josef Koumar, Karel Hynek, Tomáš Čejka -- which was published at The 19th International Conference on Network and Service Management (CNSM) 2023. Please cite usage of our datasets as:

    J. Koumar, K. Hynek and T. Čejka, "Network Traffic Classification Based on Single Flow Time Series Analysis," 2023 19th International Conference on Network and Service Management (CNSM), Niagara Falls, ON, Canada, 2023, pp. 1-7, doi: 10.23919/CNSM59352.2023.10327876.

    This Zenodo repository contains 23 datasets created from 15 well-known published datasets which are cited in the table below. Each dataset contains 69 features created by Time Series Analysis of Single Flow Time Series. The detailed description of features from datasets is in the file: feature_description.pdf

    In the following table is a description of each dataset file:

    File nameDetection problemCitation of original raw dataset
    botnet_binary.csv Binary detection of botnet S. García et al. An Empirical Comparison of Botnet Detection Methods. Computers & Security, 45:100–123, 2014.
    botnet_multiclass.csv Multi-class classification of botnet S. García et al. An Empirical Comparison of Botnet Detection Methods. Computers & Security, 45:100–123, 2014.
    cryptomining_design.csvBinary detection of cryptomining; the design part Richard Plný et al. Datasets of Cryptomining Communication. Zenodo, October 2022
    cryptomining_evaluation.csv Binary detection of cryptomining; the evaluation part Richard Plný et al. Datasets of Cryptomining Communication. Zenodo, October 2022
    dns_malware.csv Binary detection of malware DNS Samaneh Mahdavifar et al. Classifying Malicious Domains using DNS Traffic Analysis. In DASC/PiCom/CBDCom/CyberSciTech 2021, pages 60–67. IEEE, 2021.
    doh_cic.csv Binary detection of DoH

    Mohammadreza MontazeriShatoori et al. Detection of doh tunnels using time-series classification of encrypted traffic. In DASC/PiCom/CBDCom/CyberSciTech 2020, pages 63–70. IEEE, 2020

    doh_real_world.csv Binary detection of DoH Kamil Jeřábek et al. Collection of datasets with DNS over HTTPS traffic. Data in Brief, 42:108310, 2022
    dos.csv Binary detection of DoS Nickolaos Koroniotis et al. Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst., 100:779–796, 2019.
    edge_iiot_binary.csv Binary detection of IoT malware Mohamed Amine Ferrag et al. Edge-iiotset: A new comprehensive realistic cyber security dataset of iot and iiot applications: Centralized and federated learning, 2022.
    edge_iiot_multiclass.csvMulti-class classification of IoT malwareMohamed Amine Ferrag et al. Edge-iiotset: A new comprehensive realistic cyber security dataset of iot and iiot applications: Centralized and federated learning, 2022.
    https_brute_force.csvBinary detection of HTTPS Brute ForceJan Luxemburk et al. HTTPS Brute-force dataset with extended network flows, November 2020
    ids_cic_binary.csvBinary detection of intrusion in IDSIman Sharafaldin et al. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp, 1:108–116, 2018.
    ids_cic_multiclass.csv Multi-class classification of intrusion in IDS Iman Sharafaldin et al. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp, 1:108–116, 2018.
    ids_unsw_nb_15_binary.csv Binary detection of intrusion in IDS Nour Moustafa and Jill Slay. Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In 2015 military communications and information systems conference (MilCIS), pages 1–6. IEEE, 2015.
    ids_unsw_nb_15_multiclass.csv Multi-class classification of intrusion in IDS Nour Moustafa and Jill Slay. Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In 2015 military communications and information systems conference (MilCIS), pages 1–6. IEEE, 2015.
    iot_23.csv Binary detection of IoT malware Sebastian Garcia et al. IoT-23: A labeled dataset with malicious and benign IoT network traffic, January 2020. More details here https://www.stratosphereips.org /datasets-iot23
    ton_iot_binary.csv Binary detection of IoT malware Nour Moustafa. A new distributed architecture for evaluating ai-based security systems at the edge: Network ton iot datasets. Sustainable Cities and Society, 72:102994, 2021
    ton_iot_multiclass.csv Multi-class classification of IoT malware Nour Moustafa. A new distributed architecture for evaluating ai-based security systems at the edge: Network ton iot datasets. Sustainable Cities and Society, 72:102994, 2021
    tor_binary.csv Binary detection of TOR Arash Habibi Lashkari et al. Characterization of Tor Traffic using Time based Features. In ICISSP 2017, pages 253–262. SciTePress, 2017.
    tor_multiclass.csv Multi-class classification of TOR Arash Habibi Lashkari et al. Characterization of Tor Traffic using Time based Features. In ICISSP 2017, pages 253–262. SciTePress, 2017.
    vpn_iscx_binary.csv Binary detection of VPN Gerard Draper-Gil et al. Characterization of Encrypted and VPN Traffic Using Time-related. In ICISSP, pages 407–414, 2016.
    vpn_iscx_multiclass.csv Multi-class classification of VPN Gerard Draper-Gil et al. Characterization of Encrypted and VPN Traffic Using Time-related. In ICISSP, pages 407–414, 2016.
    vpn_vnat_binary.csv Binary detection of VPN Steven Jorgensen et al. Extensible Machine Learning for Encrypted Network Traffic Application Labeling via Uncertainty Quantification. CoRR, abs/2205.05628, 2022
    vpn_vnat_multiclass.csvMulti-class classification of VPN Steven Jorgensen et al. Extensible Machine Learning for Encrypted Network Traffic Application Labeling via Uncertainty Quantification. CoRR, abs/2205.05628, 2022

  8. Global banking malware distribution 2017, by family

    • statista.com
    Updated Dec 19, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2022). Global banking malware distribution 2017, by family [Dataset]. https://www.statista.com/statistics/749598/banking-malware-distribution/
    Explore at:
    Dataset updated
    Dec 19, 2022
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    This statistic shows a ranking of the most common banking malware families worldwide. As of the first quarter of 2017, the Zbot family accounted for 47.79 percent of banking malware attacks. The second-ranked Nymaim family accounted for 30.59 percent.

  9. Common IT vulnerabilities and exposures worldwide 2009-2025

    • statista.com
    Updated Nov 28, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Common IT vulnerabilities and exposures worldwide 2009-2025 [Dataset]. https://www.statista.com/statistics/500755/worldwide-common-vulnerabilities-and-exposures/
    Explore at:
    Dataset updated
    Nov 28, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    As of August 2024, internet users worldwide discovered around ****** new common IT security vulnerabilities and exposures (CVEs). The highest reported annual figure was recorded in 2023, over ******. Global ransomware threats In the past couple of years, ransomware has become more prominent, becoming the most frequently reported type of cyberattack worldwide in 2023. Additionally, ** percent of organizations worldwide reported experiencing one to three ransomware infections. Among researched markets, France and South Africa were impacted the most. Costly and efficient ransomware families, such as StopCrypt and LockBit, ranked first by detections globally. Additionally, the 2017 WannaCry attack still holds the record as the most impactful ransomware event, causing an estimated **** billion U.S. dollars in damages. Manufacturing and ransomware Manufacturing remains one of the most targeted industries for cyberattacks. In 2023, it was the most vulnerable sector globally to ransomware, experiencing approximately *** incidents worldwide. These attacks were especially prevalent in industrial organizations in North America. Additionally, malware and network or application anomalies were among the most common types of cyber incidents affecting manufacturing organizations.

  10. Number of DDoS attacks in Italy 2017-2023

    • statista.com
    Updated Jul 10, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of DDoS attacks in Italy 2017-2023 [Dataset]. https://www.statista.com/statistics/649366/cyber-attacks-ddos-in-italy-timeline/
    Explore at:
    Dataset updated
    Jul 10, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Italy
    Description

    In 2023, the estimated number of distributed denial-of-service (DDoS) cyberattacks in Italy was of approximately ******. This represents a decrease from the ***** attacks registered in 20212. In 2019 and 2020, the country registered the peak of DDoS attacks, with over ****** cyberattacks reported.

  11. Countries most victimized by banking malware worldwide 2017

    • statista.com
    Updated Nov 10, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Countries most victimized by banking malware worldwide 2017 [Dataset]. https://www.statista.com/statistics/749626/banking-malware-countries/
    Explore at:
    Dataset updated
    Nov 10, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2017
    Area covered
    Worldwide
    Description

    This statistic shows a ranking of the countries most affected by banking trojans and PoS or ATM malware in 2017. During the measured year, Germany ranked first with 4.44 percent of malware victims having been attacked by financial malware.

  12. Kaspersky Lab's revenue worldwide 2016-2024

    • statista.com
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista, Kaspersky Lab's revenue worldwide 2016-2024 [Dataset]. https://www.statista.com/statistics/1196100/kaspersky-lab-revenue-worldwide/
    Explore at:
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide, Russia
    Description

    Kaspersky Lab reported a global revenue of ****** million U.S. dollars in 2024, which was the highest figure over the observed period. Kaspersky Lab is Russia's highest-earning information security provider, followed by Gazinformservice and Softline. Antivirus market in Russia The two major antivirus providers among Russian companies are Kaspersky Lab and Doctor Web. Both are listed in the Russian registry of national software vendors, which means that their products can be supplied to state institutions. As of August 2021, Kaspersky Lab was one of the leading Windows anti-malware application vendors. Doctor Web focuses on making the information security industry within Russia independent from imports. Several foreign brands, such as Avast, Bitdefender, Eset, and Norton, stopped operating in Russia over its invasion of Ukraine in 2022. Kaspersky Lab ban on U.S. government computers The U.S. Department of Homeland Security suspected Kaspersky Lab of cooperating with Russian security authorities in 2017, subsequently prohibiting its use on computers within the government. In March 2022, the company was claimed to be presenting a threat to national security of the U.S. That meant that U.S. companies could not use the Universal Service Fund to buy Kaspersky Lab products. The fund is generally used to provide communications services for low-income customers, schools, and libraries, among others.

  13. Not seeing a result you expected?
    Learn how you can add new datasets to our index.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2025). Share of malware detected across Asia Pacific 2016-2017 by type [Dataset]. https://www.statista.com/statistics/946831/asia-pacific-malware-share-by-type/
Organization logo

Share of malware detected across Asia Pacific 2016-2017 by type

Explore at:
Dataset updated
Jul 9, 2025
Dataset authored and provided by
Statistahttp://statista.com/
Area covered
Asia, APAC
Description

This statistic depicts the share of malware detected across Asia Pacific in 2016/2017, by type. In this period, viruses and worms accounted for around ** percent of the malware detected across the Asia Pacific region.

Search
Clear search
Close search
Google apps
Main menu