Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Anomali

Below you will find reports with the source of “Anomali”

image from The Value of Threat Intelligence: Annual Study of North American & United Kingdom Companies

The Value of Threat Intelligence: Annual Study of North American & United Kingdom Companies

Ponemon Institute is pleased to present The Value of Threat Intelligence: Annual Study of North American and United Kingdom Companies, sponsored by Anomali. (more available)
Added: March 1, 2019
image from Online Malware and Threats A Profile of Today’s Security Posture

Online Malware and Threats A Profile of Today’s Security Posture

From the report, “Our survey examined the most common malware threats that organizations are grappling with, how often those threats result in actual compromises, and the challenges involved in responding to them. (more available)
Added: November 29, 2018
image from 2018 Threat Intelligence Report

2018 Threat Intelligence Report

“Threat intelligence has become a significant weapon in the fight against cybersecurity threats, and a large majority of organizations have made it a key part of their security programs. (more available)
Added: November 29, 2018
image from WannaCry: One Year Later

WannaCry: One Year Later

“Despite the massive impact the WannaCry ransomware attack had on businesses across the globe and the immediate changes to security practices following it, a year later businesses still have a reactive approach and struggle to implement comprehensive security policies that target employees and management. (more available)
Added: November 29, 2018
image from NotPetya: One Year Later

NotPetya: One Year Later

“Almost immediately following the WannaCry cyberattack, the NotPetya malware affected countries and organisations around the globe that had strikingly similar repercussions and lessons to take away. (more available)
Added: November 29, 2018
image from Cyber Threat Profile: Democratic People's Republic of Korea (DPRK)

Cyber Threat Profile: Democratic People's Republic of Korea (DPRK)

This report offers insight into the Cyber security landscape of The People’s Republic of Korea.
Added: November 29, 2018
image from Cyber Threat Landscape: The Healthcare Industry

Cyber Threat Landscape: The Healthcare Industry

“Organizations in the healthcare industry have been in the news a number of times in recent years as a result of significant cyber attacks. (more available)
Added: November 29, 2018
image from Cyber Threat Brief: US Recognizes Jerusalem As Capital Of Israel

Cyber Threat Brief: US Recognizes Jerusalem As Capital Of Israel

This report takes a look at the cyber threats that occurred when the US recognized Jerusalem as the Capital of Israel. (more available)
Added: November 29, 2018
image from Cyber Threat Brief: 2018 Winter Olympics

Cyber Threat Brief: 2018 Winter Olympics

This report begins with the sentence, “There are a number of influences on the 2018 Winter Olympics event that may increase the likeliness of malicious activity. (more available)
Added: November 29, 2018
image from Cybersecurity Profile: The United States Of America

Cybersecurity Profile: The United States Of America

This report offers insight into the cyber security profile of the United States Of America.
Added: November 29, 2018
image from Threatscape Of The US Election

Threatscape Of The US Election

From the report, “The cyber attacks targeting political elections is in full swing as the 115th United States midterm elections grow closer. (more available)
Added: November 29, 2018
image from Can Lightning Strike US Elections Twice?: Email Spoofing Threat To The 2018 US Midterm Elections

Can Lightning Strike US Elections Twice?: Email Spoofing Threat To The 2018 US Midterm Elections

As the November 2018 US midterm elections looms, Anomali Labs set forth to answer the cyber version of the old myth “lightning never strikes the same place twice” — replaced with “can email spoofing attacks really strike the US elections twice”. (more available)
Added: November 29, 2018
image from Threat Landscape: Republic of South Africa (RSA)

Threat Landscape: Republic of South Africa (RSA)

This report offers a view of The Republic of South Africa. And takes a look at the Threat Landscape of that nation. (more available)
Added: November 29, 2018
image from Peering Over The DAX 100 Threat Horizon

Peering Over The DAX 100 Threat Horizon

This report offers insight into the German DAX 100 Threat Horizon.
Added: November 29, 2018
image from The Recent Escalation Between Turkey And The U.S. Provokes Response From Cyber Groups

The Recent Escalation Between Turkey And The U.S. Provokes Response From Cyber Groups

The recent escalation in tensions between the United States and Turkey over the detention of pastor Andrew Brunson, have prompted Turkish patriotic hacktivist groups to target American websites. (more available)
Added: November 29, 2018
image from Cyber Threat Brief: The 2018 FIFA World Cup

Cyber Threat Brief: The 2018 FIFA World Cup

Russia will host the 2018 FIFA World Cup from 14 June to 15 July 2018 at 12 different venues throughout 11 host cities, and thousands of foreign visitors are expected to travel to the games. (more available)
Added: November 29, 2018
image from Targeted Brand Attacks and Mass Credential Exposures

Targeted Brand Attacks and Mass Credential Exposures

This report helps detail the importance of monitoring suspicious domain registrations to protect a brand from being destroyed by cyber criminals. (more available)
Added: October 25, 2018
image from Russian Federation Country Profile 2017

Russian Federation Country Profile 2017

This paper gives a profile of the Russian Federation.
Added: October 24, 2018
image from Cyber Threat Landscape: The Aviation Industry

Cyber Threat Landscape: The Aviation Industry

This paper focusses completely on cybersecurity issues in the aviation industry.
Added: October 23, 2018
image from The Value Of Threat Intelligence: The Second Annual Study Of North American & United Kingdom Companies

The Value Of Threat Intelligence: The Second Annual Study Of North American & United Kingdom Companies

The purpose of this research is to examine trends in the benefits of threat intelligence and the challenges companies face when integrating threat intelligence with existing security platforms and technologies. (more available)
Added: October 23, 2018
image from China Country Profile 2017

China Country Profile 2017

This paper gives a profile of China.
Added: October 22, 2018
© Cyentia Institute 2023
Library updated: January 31, 2023 20:08 UTC (build 051771c)