Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Attack campaign

Below you will find reports with the tag of “Attack campaign”

image from The State of Dependency Management

The State of Dependency Management

In their inaugural report, the Station 9 research team explores the complexities of open source dependencies and the top security considerations for open source adoption at the enterprise. (more available)
Added: December 20, 2022
image from Gaming Respawned

Gaming Respawned

This SOTI report looks at current state of online gaming. it also examines the most pervasive threats coming from online criminals. (more available)
Added: September 14, 2022
image from The 2019 Duo Trusted Access Report

The 2019 Duo Trusted Access Report

For The 2019 Duo Trusted Access Report, our data shows that Duo customers across all industries are starting to implement zero-trust security principles to secure their workforce. (more available)
Added: June 15, 2022
image from Trellix Threat Labs Research Report April 2022

Trellix Threat Labs Research Report April 2022

Our latest Trellix Threat Lab Research Report includes our findings from Q4 2021, our identification of a multi-stage espionage attack on high-ranking government officials, and our recent analysis of cyberattacks targeting Ukraine and the newly identified HermeticWiper during Q1. (more available)
Added: May 11, 2022
image from IsaacWiper Continues Trend of Wiper Attacks Against Ukraine

IsaacWiper Continues Trend of Wiper Attacks Against Ukraine

This report is a technical overview of the IsaacWiper malware reported by ESET. The malware was primarily delivered to Ukrainian organizations coincident with the Russian invasion of Ukraine. (more available)
Added: April 14, 2022
image from The Human Factor 2021

The Human Factor 2021

Using Proofpoint deployments across the globe over 2020, this report reviews the email messages, URLs, and attachments being communicated and what these mean for email and cyber security. (more available)
Added: August 11, 2021
image from Phishing Activity Trends Report Q4 2020

Phishing Activity Trends Report Q4 2020

This report analyzes phishing attacks and other identity theft techniques used in Q4 2020.
Added: February 24, 2021
image from Protecting People 2019: A global Cybersecurity Analysis of Vulnerability, Attacks and Privilege

Protecting People 2019: A global Cybersecurity Analysis of Vulnerability, Attacks and Privilege

This report examines which employees, departments, and industries are the most vulnerable in 2019. It analyzes which ones receive the most targeted threats, and how their privilege might be abused. (more available)
Added: September 28, 2020
image from H2 2020 Email Fraud & Identity Deception Trends

H2 2020 Email Fraud & Identity Deception Trends

This biannual report from Agari goes in-depth on changes and trends in email and identity fraud for the second half of 2020. (more available)
Added: September 2, 2020
image from Abnormal Quarterly BEC Report Q2 2020

Abnormal Quarterly BEC Report Q2 2020

The second Abnormal Security Quarterly BEC Report examines the business email compromise (BEC) threat landscape during what may be the most tumultuous quarter in modern business history: the first full quarter of the COVID-19 pandemic. (more available)
Added: September 1, 2020
image from What Doxxing Victims Reveal About "Targeted Attacks"

What Doxxing Victims Reveal About "Targeted Attacks"

A review of doxxing related ransomware cases handled by Kivu Consulting in a post-breach role. Explores firmographics of the organizations involved in various variants of ransomware families. (more available)
Added: July 27, 2020
image from Threat Intelligence Executive Report 2020 Vol. 1

Threat Intelligence Executive Report 2020 Vol. 1

The Threat Intelligence Executive Report by Secureworks is a report designed to analyze security threats and help organizations protect their systems. (more available)
Added: July 8, 2020
image from Analysis of an Attack Surface: Five Ways Hackers are Targeting Organizations

Analysis of an Attack Surface: Five Ways Hackers are Targeting Organizations

A combination of data from RiskIQ’s internet telemetry network and thought analysis, this report covers changes related to the COVID-19 pandemic, organization’s public attack surface, mobile threats, and the importance of JavaScript as an attack vector. (more available)
Added: June 11, 2020
image from Trend Micro Cloud App Security Report 2019

Trend Micro Cloud App Security Report 2019

Trend Micro looks into the email security threat landscape, looking into threat types, number of threats, etc.
Added: May 18, 2020
image from 100 Days of Coronavirus

100 Days of Coronavirus

This report focuses on the changes in security threats and the effect that COVID-19 has on the overall landscape.
Added: May 8, 2020
image from Q4 2019 Malware Trends

Q4 2019 Malware Trends

This report outlines happenings in malware attacks for the last 3 months of 2019. In general, it says malware attacks died down this quarter. (more available)
Added: March 29, 2020
image from 2019 Threat Report

2019 Threat Report

A long form narrative on several threat trends seen in recent months.
Added: February 14, 2020
image from Overwatch 2019 mid-year report

Overwatch 2019 mid-year report

An analysis of threat actors and key action patterns based upon CrowdStrike’s threat hunting human analyst team over the first half of 2019. (more available)
Added: November 25, 2019
image from The State of SOAR Report, 2019

The State of SOAR Report, 2019

From the report, “The challenges facing security teams are, perhaps unfortunately, common knowledge by now. A constant rise in alert volume, a stark security skills gap, piecemeal processes, and siloed tools have made security operations a tough place to be. (more available)
Added: September 18, 2019
image from Threat Insights Report - July 2019

Threat Insights Report - July 2019

The Bromium Threat Insights Report is updated on a regular basis to track notable threats and the information gleaned from them. (more available)
Added: September 18, 2019
image from Fake Executive Emails, Real Financial Losses

Fake Executive Emails, Real Financial Losses

From the report, “BEC is a specific type of phishing email that operates without links and without attachments (two of the standard markers that perimeter defenses look for). (more available)
Added: September 18, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 6
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 1, 2023 20:09 UTC (build 051771c)