Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Cylance

Below you will find reports with the source of “Cylance”

image from Assault On Healthcare

Assault On Healthcare

This report offers some insight into Health Information Technology and the cybersecurity issues that plague that area.
Added: February 5, 2019
image from Operation Shaheen

Operation Shaheen

This report is part of a larger developing series, the aim of which is to apply a different approach to threat intelligence to identify a new threat actor and its previously unknown espionage campaigns; it also aims to link together campaigns that were assumed to be unrelated, or which were falsely attributed to other groups. (more available)
Added: December 29, 2018
image from The SpyRATs of OceanLotus

The SpyRATs of OceanLotus

This paper takes a look at several bespoke backdoors deployed by OceanLotus Group, as well as evidence of the threat actor using obfuscated CobaltStrik Beacon payloads to perform C2. (more available)
Added: December 29, 2018
image from Predictive Malware Response Test

Predictive Malware Response Test

SE Labs tested a product from Cylance and sought to discover its weaknesses.
Added: December 29, 2018
image from Advanced Endpoint Protection

Advanced Endpoint Protection

This report offers insight into the Cylance methodology of endpoint protection.
Added: December 29, 2018
image from Endpoint Security Isn't Dead - It's Just Getting Smarter

Endpoint Security Isn't Dead - It's Just Getting Smarter

This report details a new Cylance survey of iTnews readers and provides insight into the state of endpoint security.
Added: December 29, 2018
image from 2017 Threat Report Discussion Guide

2017 Threat Report Discussion Guide

The Cylance 2017 Threat Report offers valuable analysis on the current state of cybersecurity. The information provided in the report is unavailable anywhere else. (more available)
Added: December 29, 2018
image from Expanding Machine Learning Applications on the Endpoint

Expanding Machine Learning Applications on the Endpoint

This paper discusses one possible avenue for improving EDR which is the broader adoption of machine learning techniques.
Added: December 29, 2018
image from 2017 Threat Report

2017 Threat Report

This report contains an overview of the threat trends and malware families Cylance’s customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats. (more available)
Added: November 20, 2018
image from The Deception Project: A New Japanese-Centric Threat

The Deception Project: A New Japanese-Centric Threat

“In an effort to expose a common problem we see happening in the industry, Cylance® would like to shed some light on just how easy it is to fake attribution. (more available)
Added: November 15, 2018
image from Generations of Machine Learning In Cybersecurity

Generations of Machine Learning In Cybersecurity

In this white paper, they aim to define generations of machine learning and to explain the maturity levels of artificial intelligence (AI) and machine learning (ML) that are being applied to cybersecurity today. (more available)
Added: October 18, 2018
image from AI Based Prevention And Detection

AI Based Prevention And Detection

This report discusses the new evolution in Endpoint Security.
Added: October 17, 2018
© Cyentia Institute 2021
Library updated: March 5, 2021 12:07 UTC (build 7e736b2)