Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

TrapX Security

Below you will find reports with the source of “TrapX Security”

image from Kovter the Click-Fraud Fileless Malware

Kovter the Click-Fraud Fileless Malware

This report includes detailed technical information discovered during our analysis of the forensics artifacts collected from the affected systems by the AIR Module. The report provides detailed information about the key processes used by AIR to review the malicious activity and detect the infection quickly. We also break down the encoding techniques, the registry operation, and the protection and communication mechanisms used by Kovter.

(more available)
Added: February 6, 2019
image from Anatomy Of An Attack: Industril Control Systems Under Siege

Anatomy Of An Attack: Industril Control Systems Under Siege

From the report, “Over the past few year’s attackers have exploited this opportunity, and as documented in our Anatomy of an Attack (AOA) report, have compromised a wide variety of manufacturing control systems. This report documents five case studies which show how cyber attackers could gain access to manufacturing and utility facilities. We also detail the progression of the attacks which in some cases disabled operations for an extended period. In one of our case studies, losses were catastrophic with the impacted entity suffering losses of over 800,000 euro per day. This report will explain how the attacks happen, and once established, how the attackers can extend these command and control points to breach the institution’s records, blackmail and extort funds, or worse, disable ongoing operations of the facility over an extended period.” Read on to find out more.

(more available)
Added: February 6, 2019
image from Health Care Cyber Breach Research Report for 2016

Health Care Cyber Breach Research Report for 2016

This report offers insight into Cyber Breaches and the health industry for 2016. It provides information on the important trends of 2016, medical device hijacks and the top ten health care cyber attacks of 2016.

(more available)
Added: February 6, 2019
image from MEDJACK.4 Medical Device Hijacking

MEDJACK.4 Medical Device Hijacking

This report takes an inside look at the Cyber Security challenge for healthcare today and more specifically looks at the medical device security challenge.

(more available)
Added: February 6, 2019
image from MEDJACK.2 Hospitals Under Siege

MEDJACK.2 Hospitals Under Siege

This report offers a variety of case studies that highlight the challenges in the Healthcare Network.

Added: February 6, 2019
image from Zombie Zero: Weaponized Malware Targets ERP Systems

Zombie Zero: Weaponized Malware Targets ERP Systems

This report takes a look at the dangers of weaponized malware and provides a case study of Zombie Zero behavior.

(more available)
Added: February 6, 2019
image from Anatomy Of An Attack: Iranian Nation State Interdiction

Anatomy Of An Attack: Iranian Nation State Interdiction

This report offers deep insight into the threat actor known as Oilrig.

Added: February 6, 2019
© Cyentia Institute 2025
Library updated: July 6, 2025 20:08 UTC (build b1d7be4)