{"id":11374,"date":"2020-09-02T07:07:36","date_gmt":"2020-09-02T07:07:36","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=11374"},"modified":"2026-04-17T18:07:48","modified_gmt":"2026-04-17T18:07:48","slug":"2019-cybersecurity-insights-19","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/2019-cybersecurity-insights-19\/","title":{"rendered":"2019 Cybersecurity Insights -19"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p>Since the Promoting Scale Deployment of Internet Protocol Version 6 (IPv6) (&#8220;Plan&#8221;) 1 was published in November 2017, IPv6 deployments in China are on the rise. By June 2019, the number of active IPv6 users had reached 130 million, and 1.207 billion telecom users had been assigned an IPv6 address. At the same time, IPv6 traffic in China in the past year steadily grew. The number of address resources ranked first in the world (47,282 IP address blocks (\/32)) by May 2019. Telecom enterprises have made positive efforts to improve network infrastructure. All recursive domain name systems (DNS) of the three telecom magnates support IPv6 domain name resolution. Content delivery network (CDN) enterprises have conducted IPv6 deployments nationwide and have got the capability of accelerating distribution of IPv6 addresses. The transformation of backbone networks, LTE networks, and metropolitan area networks (MANs) has been almost completed2 . With the rapid development of the IPv6 technology, more attention should be paid to security threats in the IPv6 environment. This section describes the threat situation from the perspectives of vulnerabilities and traffic.<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\">IPv6 Vulnerability Trend<\/h2>\n\n\n\n<p>With the depletion of IPv4 addresses and since a World IPv6 Launch Day was carried out where countries permanently enabled IPv6 for their networks and applications in 2012, the deployment of IPv6-related systems, networks, and application services will be increasingly pervasive. So far, 25.33% networks have adopted IPv6 deployments.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"626\" height=\"375\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-1-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11376\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-1-1.jpg 626w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-1-1-300x180.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/figure><\/div>\n\n\n\n<p>With IPv6 networks and services going live, IPv6 system resources draw more and more attention from attackers. Amid this trend, IPv6-related vulnerabilities have gained momentum for rapid growth. Therefore, the Internet construction is facing severe security challenges. Compared with the IPv4 protocol, the IPv6 protocol is more secure, but the mechanism for transferring packets remains unchanged. As a result, IPv6 networks are still exposed to the same attacks as IPv4 networks. For example, HTTP attacks against the application layer and TCP attacks against the transport layer can also pose a serious threat to IPv6 networks. Since new fields and protocols are introduced, IPv6 packets are likely to contain vulnerabilities. For example, IPv6 extension headers, the Neighbor Discovery Protocol (NDP), and ICMPv6 protocol can be exploited by attackers for launching sniffing attacks and denial-of-service attacks. According to NVD statistics, a total of 369 IPv6 vulnerabilities have been detected since 2002.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"731\" height=\"199\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-2-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11378\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-2-1.jpg 731w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-2-1-300x82.jpg 300w\" sizes=\"(max-width: 731px) 100vw, 731px\" \/><\/figure><\/div>\n\n\n\n<p>Among all IPv6 vulnerabilities, denial-of-service vulnerabilities account for 60% (244), 185 of which are remote ones. DoS attacks can be devastating to network devices and services. Given the large proportion of DoS vulnerabilities, it will be an arduous task to defend against related attacks. It is noteworthy that the current IPv4 Internet is such a huge system that the economic and technical costs of migrating corresponding devices and application systems to the IPv6 Internet will be enormous. As a result, IPv4 and IPv6 networks will coexist for a long time. For smooth transition from IPv4 to IPv6, corresponding transitional techniques have been developed and put into practice, including dual stack, tunneling, and protocol translation. Security issues related to transitional techniques should also be considered. Currently, there are 16 vulnerabilities related to transitional techniques in the current vulnerability database. It is predictable that this number will increase in future.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Attack Type Distribution<\/h2>\n\n\n\n<p>In 2019, there were 295 types of alerts in the IPv6 network environment, reaching 2.37 million in total. Figure 8-2 shows the monthly trend of IPv6 alerts. As shown in the figure, IPv6 alerts were in the upward trend; in November, the number peaked at 880,000.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"502\" height=\"336\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-3.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11379\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-3.jpg 502w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-3-300x201.jpg 300w\" sizes=\"(max-width: 502px) 100vw, 502px\" \/><\/figure><\/div>\n\n\n\n<p><strong>Malware<\/strong><\/p>\n\n\n\n<p>Backdoors and cryptojacking malware are the most frequently detected malware, followed by trojans, ransomware, and worms.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"365\" height=\"317\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-4.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11380\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-4.jpg 365w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-4-300x261.jpg 300w\" sizes=\"(max-width: 365px) 100vw, 365px\" \/><\/figure><\/div>\n\n\n\n<p>In 2019, most alerts were generated on backdoors in the IPv6 environment, accounting for 32%. Figure 8-4 shows the daily trend of backdoor attacks. June and July saw the most back alerts, and several daily peaks were formed. Most alerts were generated in early July, peaking at 1633 in a day.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"558\" height=\"384\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-5-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11382\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-5-1.jpg 558w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-5-1-300x206.jpg 300w\" sizes=\"(max-width: 558px) 100vw, 558px\" \/><\/figure><\/div>\n\n\n\n<p>Table 8-2 lists top 5 types of backdoor attacks. It is worth noting that 27,500 alerts were generated on suspicious web shell backdoor access control attacks, contributing 87.8% of all trojan attacks.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"732\" height=\"182\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-6-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11384\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-6-1.jpg 732w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-6-1-300x75.jpg 300w\" sizes=\"(max-width: 732px) 100vw, 732px\" \/><\/figure><\/div>\n\n\n\n<p>In the IPv6 environment, cryptojacking alerts accounted for 31%, second only to backdoors. As shown in Figure 8-5, cryptojackers in the IPv6 environment had a lower level of activity in early 2016. Then the number of alerts increased slowly but burst in late June. At the end of 2019, there were a large number of IPv6 cryptojacking alerts. Late June and early July saw the most cyptojacking activities. The peak period lasted for nearly a month.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"582\" height=\"392\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-7-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11386\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-7-1.jpg 582w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-7-1-300x202.jpg 300w\" sizes=\"(max-width: 582px) 100vw, 582px\" \/><\/figure><\/div>\n\n\n\n<p>Table 8-3 lists top 5 cryptojacking activities. Most alerts were generated on WannaMine connection communication and WannaCry attempted communication, followed by Monero (XMR) cryptominer network communication, malicious cyrptominer XmrigDNS request connection, and cyrptominer query DNS mining pool server domain name.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"737\" height=\"180\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-8.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11387\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-8.jpg 737w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-8-300x73.jpg 300w\" sizes=\"(max-width: 737px) 100vw, 737px\" \/><\/figure><\/div>\n\n\n\n<p><strong>Web Attacks<\/strong><\/p>\n\n\n\n<p>In terms of attacked applications, web services were the major attack target, accounting for 44%, followed by DNS services (42%).<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"449\" height=\"331\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-9.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11388\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-9.jpg 449w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-9-300x221.jpg 300w\" sizes=\"(max-width: 449px) 100vw, 449px\" \/><\/figure><\/div>\n\n\n\n<p>Table 8-4 lists top 5 attacked web frameworks. Tomcat and ThinkPHP received the most attacks, followed by Internet Information Services (IIS), Struts, and Nginx.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"733\" height=\"179\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-10.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11389\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-10.jpg 733w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-10-300x73.jpg 300w\" sizes=\"(max-width: 733px) 100vw, 733px\" \/><\/figure><\/div>\n\n\n\n<p>Remote cross-site scripting attacks were still the most common web attacks, an increase of 10 times from 2018.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"735\" height=\"322\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-11-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11391\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-11-1.jpg 735w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0902-11-1-300x131.jpg 300w\" sizes=\"(max-width: 735px) 100vw, 735px\" \/><\/figure><\/div>\n\n\n\n<p><em>To be continued.<\/em><\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Since the Promoting Scale Deployment of Internet Protocol Version 6 (IPv6) (&#8220;Plan&#8221;) 1 was published in November 2017, IPv6 deployments in China are on the rise. By June 2019, the number of active IPv6 users had reached 130 million, and 1.207 billion telecom users had been assigned an IPv6 address. At the same time, IPv6 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10756,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,15],"tags":[357],"class_list":["post-11374","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-research-reports","tag-cybersecurity-insights"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>2019 Cybersecurity Insights -19 - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-19\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2019 Cybersecurity Insights -19 - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Since the Promoting Scale Deployment of Internet Protocol Version 6 (IPv6) (&quot;Plan&quot;) 1 was published in November 2017, IPv6 deployments in China are on the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-19\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-02T07:07:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/Cybersecurity2019.png\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"2019 Cybersecurity Insights -19 - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Since the Promoting Scale Deployment of Internet Protocol Version 6 (IPv6) (&quot;Plan&quot;) 1 was published in November 2017, IPv6 deployments in China are on the\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/Cybersecurity2019.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-19\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-19\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"2019 Cybersecurity Insights -19\",\"datePublished\":\"2020-09-02T07:07:36+00:00\",\"dateModified\":\"2026-04-17T18:07:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-19\\\/\"},\"wordCount\":828,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-19\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Cybersecurity2019.png\",\"keywords\":[\"Cybersecurity Insights\"],\"articleSection\":[\"Blog\",\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-19\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-19\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-19\\\/\",\"name\":\"2019 Cybersecurity Insights -19 - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-19\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-19\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Cybersecurity2019.png\",\"datePublished\":\"2020-09-02T07:07:36+00:00\",\"dateModified\":\"2026-04-17T18:07:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-19\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-19\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-19\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Cybersecurity2019.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Cybersecurity2019.png\",\"width\":475,\"height\":355,\"caption\":\"Cybersecurity insights with network and keywords.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-19\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2019 Cybersecurity Insights -19\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2019 Cybersecurity Insights -19 - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-19\/","og_locale":"pt_BR","og_type":"article","og_title":"2019 Cybersecurity Insights -19 - NSFOCUS","og_description":"Since the Promoting Scale Deployment of Internet Protocol Version 6 (IPv6) (\"Plan\") 1 was published in November 2017, IPv6 deployments in China are on the","og_url":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-19\/","og_site_name":"NSFOCUS","article_published_time":"2020-09-02T07:07:36+00:00","article_modified_time":"2026-04-17T18:07:48+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/Cybersecurity2019.png","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"2019 Cybersecurity Insights -19 - NSFOCUS","twitter_description":"Since the Promoting Scale Deployment of Internet Protocol Version 6 (IPv6) (\"Plan\") 1 was published in November 2017, IPv6 deployments in China are on the","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/Cybersecurity2019.png","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-19\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-19\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"2019 Cybersecurity Insights -19","datePublished":"2020-09-02T07:07:36+00:00","dateModified":"2026-04-17T18:07:48+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-19\/"},"wordCount":828,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-19\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/Cybersecurity2019.png","keywords":["Cybersecurity Insights"],"articleSection":["Blog","Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-19\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-19\/","url":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-19\/","name":"2019 Cybersecurity Insights -19 - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-19\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-19\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/Cybersecurity2019.png","datePublished":"2020-09-02T07:07:36+00:00","dateModified":"2026-04-17T18:07:48+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-19\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-19\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-19\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/Cybersecurity2019.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/Cybersecurity2019.png","width":475,"height":355,"caption":"Cybersecurity insights with network and keywords."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-19\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"2019 Cybersecurity Insights -19"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/11374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=11374"}],"version-history":[{"count":1,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/11374\/revisions"}],"predecessor-version":[{"id":32735,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/11374\/revisions\/32735"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/10756"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=11374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=11374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=11374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}