Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

RiskIQ

Below you will find reports with the source of “RiskIQ”

image from 2020 Mobile App Threat Landscape Report

2020 Mobile App Threat Landscape Report

This report will give a snapshot of 2020’s mobile threat landscape and dive into emerging trends we anticipate carrying into 2021. (more available)
Added: April 13, 2022
image from Analysis of an Attack Surface: Five Ways Hackers are Targeting Organizations

Analysis of an Attack Surface: Five Ways Hackers are Targeting Organizations

A combination of data from RiskIQ’s internet telemetry network and thought analysis, this report covers changes related to the COVID-19 pandemic, organization’s public attack surface, mobile threats, and the importance of JavaScript as an attack vector. (more available)
Added: June 11, 2020
image from 2019 Mobile App Threat Landscape Report

2019 Mobile App Threat Landscape Report

RiskIQ scans mobile application stores and analyzes the apps presented for potential malware and other threats. This annual threat report covers the security posture of the mobile ecosystem, identifying threat actions, and making time comparisons. (more available)
Added: June 11, 2020
image from Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface

Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface

Risk IQ offers a glimpse into the multiple attacks on IT infrastructure organizations like Wipro and several others. This report is an analysis of those campaigns, their operators, and their targets. (more available)
Added: July 10, 2019
image from 2019 Tax Season Threat Roundup

2019 Tax Season Threat Roundup

This unique report takes a hard look at scams that focus on tax reporting and the filing of taxes.
Added: April 19, 2019
image from Holiday Shopping Season Threat Activity: 2018 Snapshot

Holiday Shopping Season Threat Activity: 2018 Snapshot

This brief but important report offers information into the events and data from the holiday shopping season of 2018.
Added: February 27, 2019
image from The Anatomy of an Attack Surface: Five Ways Hackers are Cashing In

The Anatomy of an Attack Surface: Five Ways Hackers are Cashing In

From the report, “For security teams, the sheer depth and breadth of what they need to defend may seem daunting, but thinking about the Internet from an attacker’s perspective —a collection of digital assets that are discoverable by hackers as they research their next campaigns— can put the massive scope of their organization’s attack surface into perspective. (more available)
Added: February 6, 2019
image from The Q3 2017 Mobile Threat Landscape Report

The Q3 2017 Mobile Threat Landscape Report

The third quarter of 2017 saw an increase in the number of malicious apps flooding the mobile marketplace, the continued issues of imitation and trojan apps in official app stores, and the emergence of the WireX mobile botnet. (more available)
Added: January 25, 2019
image from The Q4 2017 Mobile Threat Landscape Report

The Q4 2017 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. The fourth quarter of 2017 showed a 37 percent decrease in blocklisted apps over Q3. (more available)
Added: January 25, 2019
image from The Q3 2018 Mobile Threat Landscape Report

The Q3 2018 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. Q3 showed a nearly 220 percent increase in blocklisted apps over Q2. (more available)
Added: January 25, 2019
image from The Q2 2018 Mobile Threat Landscape Report

The Q2 2018 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. Q2 showed a nearly 57 percent increase in blocklisted apps over Q1. (more available)
Added: January 25, 2019
image from The Q2 2017 Mobile Threat Landscape Report

The Q2 2017 Mobile Threat Landscape Report

In this report, we’ll give an overview of the recent mobile threats RiskIQ detected in Q2 of 2017, as well as emerging trends we anticipate will be prevalent in Q3 and beyond to help you protect yourself and your customers. (more available)
Added: January 25, 2019
image from The Q1 2018 Mobile Threat Landscape Report

The Q1 2018 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analaysis on threat trends in the mobile application space. The first quarter of 2018 showed a 43 percent decrease in blocklisted apps over Q4. (more available)
Added: January 25, 2019
image from AppSession: Is Our Appetite For Mobile Apps Putting Us At Risk

AppSession: Is Our Appetite For Mobile Apps Putting Us At Risk

From the report, “With so much of our personal information now flowing through mobile applications, has our security awareness kept pace? (more available)
Added: January 25, 2019
image from Eight Degrees Of Kevin Bacon: Threat Research Edition

Eight Degrees Of Kevin Bacon: Threat Research Edition

This report offers insight into how you can use the theory of 8 degrees of separation in threat research.
Added: January 25, 2019
image from Remote Control Interloper:Analyzing New Chinese htpRAT Malware Attacks Against ASEAN

Remote Control Interloper:Analyzing New Chinese htpRAT Malware Attacks Against ASEAN

This report discusses a new kind of Remote Access Trojan at use in ASIA, and looks at its connection with the Chinese Government. (more available)
Added: October 21, 2018
© Cyentia Institute 2023
Library updated: January 31, 2023 16:09 UTC (build 051771c)