Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

PhishLabs

Below you will find reports with the source of “PhishLabs”

image from Executive Guide To Mobile Banking Trojans

Executive Guide To Mobile Banking Trojans

This report offers a helpful look at Mobile Banking Trojans.

Added: December 4, 2018
image from Qadars Banking Trojan: A Notoriously Sophisticated Crimware Trojan

Qadars Banking Trojan: A Notoriously Sophisticated Crimware Trojan

The Qadars Banking Trojan has been observed globally targeting well-known banks since 2013. The research in this white paper provides a detailed analysis of the banking trojan, discussing the obfuscation techniques, domain generation algorithm (DGA), communication protocols and data formatting, and social engineering techniques employed by the trojan.

(more available)
Added: October 26, 2018
image from Q2 2017 Phishing Trends And Intelligence Report

Q2 2017 Phishing Trends And Intelligence Report

The data and observations presented in this report are sourced from the continuous work PhishLabs does to fight back against phishing attacks and the threat actors behind them. The information highlighted in this report will help organizations better assess and mitigate the risk posed by modern phishing attacks.

(more available)
Added: October 25, 2018
image from 2018 Phishing Trends And Intelligence Report: Hacking The Human

2018 Phishing Trends And Intelligence Report: Hacking The Human

The purpose of this report is to provide insight on significant industry trends, tools, and techniques being used by threat actors to carry out phishing attacks. It also sheds light on why shifts are occurring and what to expect in the coming year.

(more available)
Added: October 24, 2018
image from Definitive Guide To Ransomware

Definitive Guide To Ransomware

In this whitepaper, they explore the growing threat of ransomware and what you can do to keep your organization secure.

(more available)
Added: October 23, 2018
image from Best Practices For Enterpise Phishing Protection

Best Practices For Enterpise Phishing Protection

This whitepaper presents 15 best practices for making users a powerful layer of phishing defense.

Added: October 22, 2018
image from The Weakest Link: Why People Are Your Network's Greatest Vulnerability

The Weakest Link: Why People Are Your Network's Greatest Vulnerability

In this white paper, they explore why people are the biggest vulnerability for most organizations, and whether it’s possible to ‘patch’ this vulnerability.

(more available)
Added: October 12, 2018
© Cyentia Institute 2025
Library updated: July 3, 2025 20:08 UTC (build b1d7be4)