Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

F-Secure

Below you will find reports with the source of “F-Secure”

image from The CISO's New Dawn

The CISO's New Dawn

This report looks at the roles and responsibility CISO’s have, highlighting changes over the past 12-18 months.

Added: February 24, 2021
image from Analysis Of Brexit Centric Twitter

Analysis Of Brexit Centric Twitter

This report explores Brexit-related Twitter activity occurring between December 4, 2018 and February 13, 2019. Using the standard Twitter API, researchers collected approximately 24 million tweets that matched the word “brexit” published by 1.65 million users.

(more available)
Added: March 16, 2019
image from Demystifying Vulnerabilitiy Management

Demystifying Vulnerabilitiy Management

This report takes a close look at vulnerability management and seeks to make it a far simpler task.

Added: October 26, 2018
image from DeepGaurd: Proactive On-host Protection Against New And Emerging Threats

DeepGaurd: Proactive On-host Protection Against New And Emerging Threats

This whitepaper explains the trends and developments in computing that have made host-based behavioral analysis and exploit interception necessary elements of computer security and provides an overview of the technology and methodology used by DeepGuard, the Host-based Intrusion Prevention System (HIPS) of F-Secure’s security products.

(more available)
Added: October 25, 2018
image from Evaluating The Customer Journey Of Crypto-Ransomware And The Paradox Behind It

Evaluating The Customer Journey Of Crypto-Ransomware And The Paradox Behind It

From the report, “We found the paradox of illicit, malicious activity juxtaposed with helpful customer service so interesting that we decided to evaluate the customer journeys of fi ve current ransomware families. From the fi rst ransom message to communicating with the criminals via their support channels, we wanted to see just how these gangs are doing with their customer journey – and whose is the best (or rather, least loathsome).”

(more available)
Added: October 24, 2018
image from Callisto Group

Callisto Group

This White Paper is a report regarding The Callisto Group. The Callisto Group is an advanced threat actor whose known targets include military personnel, government officials, think tanks, and journalists in Europe and the South Caucasus. Their primary interest appears to be gathering intelligence related to foreign and security policy in the Eastern Europe and South Caucasus regions.

(more available)
Added: October 23, 2018
image from 2015 Threat Report

2015 Threat Report

The report introduces the Chain of Compromise as an analytical concept to help readers, particularly those working in cyber security and information technology roles, understand how attackers compromise security using different combinations of tactics and resources. Some of 2015’s most prominent threats, such as exploit kits, ransomware, and DNS hijacks, are discussed in relation to this model, demonstrating how users become compromised by modern cyber attacks.

(more available)
Added: October 15, 2018
image from FSecure 2017 State Of Cyber Security

FSecure 2017 State Of Cyber Security

This report gives detailed ideas behind having the proper plans for how to deal with Cybersecurity breaches.

Added: October 14, 2018
image from Ransomware:How To Predict, Prevent, Detect And Respond

Ransomware:How To Predict, Prevent, Detect And Respond

This report asserts that, “Many organizations still follow an outdated approach to cyber security, relying solely on a defensive perimeter to protect their infrastructure.” The report recommends a more robust, iterative approach, which can be broken down into four phases, Predict, Prevent, Detect, and Respond.

(more available)
Added: October 13, 2018
image from NANHAISHU:RATing The South China Sea

NANHAISHU:RATing The South China Sea

This whitepaper details a malicious program identified as NanHaiShu. Based on analysis, the threat actor behind this malware targets government and private-sector organizations. Notable targets of the malware include the Department of Justice of the Philippines, the organizers of the Asia-Pacific Economic Cooperation (APEC) Summit and a major international law firm.

(more available)
Added: October 12, 2018
© Cyentia Institute 2025
Library updated: July 9, 2025 00:09 UTC (build b1d7be4)