It’s time to publish the statistics derived from the cyber attacks timelines of August (Part I and Part II), a