Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

TrapX Security

Below you will find reports with the source of “TrapX Security”

image from Kovter the Click-Fraud Fileless Malware

Kovter the Click-Fraud Fileless Malware

This report includes detailed technical information discovered during our analysis of the forensics artifacts collected from the affected systems by the AIR Module. (more available)
Added: February 6, 2019
image from Anatomy Of An Attack: Industril Control Systems Under Siege

Anatomy Of An Attack: Industril Control Systems Under Siege

From the report, “Over the past few year’s attackers have exploited this opportunity, and as documented in our Anatomy of an Attack (AOA) report, have compromised a wide variety of manufacturing control systems. (more available)
Added: February 6, 2019
image from Health Care Cyber Breach Research Report for 2016

Health Care Cyber Breach Research Report for 2016

This report offers insight into Cyber Breaches and the health industry for 2016. It provides information on the important trends of 2016, medical device hijacks and the top ten health care cyber attacks of 2016. (more available)
Added: February 6, 2019
image from MEDJACK.4 Medical Device Hijacking

MEDJACK.4 Medical Device Hijacking

This report takes an inside look at the Cyber Security challenge for healthcare today and more specifically looks at the medical device security challenge. (more available)
Added: February 6, 2019
image from MEDJACK.2 Hospitals Under Siege

MEDJACK.2 Hospitals Under Siege

This report offers a variety of case studies that highlight the challenges in the Healthcare Network.
Added: February 6, 2019
image from Zombie Zero: Weaponized Malware Targets ERP Systems

Zombie Zero: Weaponized Malware Targets ERP Systems

This report takes a look at the dangers of weaponized malware and provides a case study of Zombie Zero behavior.
Added: February 6, 2019
image from Anatomy Of An Attack: Iranian Nation State Interdiction

Anatomy Of An Attack: Iranian Nation State Interdiction

This report offers deep insight into the threat actor known as Oilrig.
Added: February 6, 2019
© Cyentia Institute 2022
Library updated: July 5, 2022 04:08 UTC (build d6199b1)