Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Attack Campaign

Below you will find reports with the tag of “Attack Campaign”

image from GTIC Monthly Threat Report October 2017

GTIC Monthly Threat Report October 2017

This monthly threat report takes a look at the month of October 2017. More specifically, it takes a look at the shift in Phishing campaigns, the WIFI WPA Security VULN, and a variety of other threats.

(more available)
Added: October 22, 2018
image from Law Enforcement Cyber Center: Final Technical Report

Law Enforcement Cyber Center: Final Technical Report

The research reported here was conducted in the RAND Justice Policy Program, which spans both criminal and civil justice system issues with such topics as public safety, effective policing, police–community relations, drug policy and enforcement, corrections policy, use of technology in law enforcement, tort reform, catastrophe and mass-injury compensation, court resourcing, and insurance regulation. Program research is supported by government agencies, foundations, and the private sector.

(more available)
Added: October 22, 2018
image from Quarterly Threat Report Q4 2017

Quarterly Threat Report Q4 2017

This quarterly report offers key takeaways from the fourth quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 22, 2018
image from GTIC Monthly Threat Report November 2017

GTIC Monthly Threat Report November 2017

This monthly threat report takes a look at the month of November 2017. Specifically, it looks at IoT Attacks, Hidden Cobra, and the Fancy Bear exploit of a Microsoft VULN.

(more available)
Added: October 21, 2018
image from Remote Control Interloper:Analyzing New Chinese htpRAT Malware Attacks Against ASEAN

Remote Control Interloper:Analyzing New Chinese htpRAT Malware Attacks Against ASEAN

This report discusses a new kind of Remote Access Trojan at use in ASIA, and looks at its connection with the Chinese Government.

(more available)
Added: October 21, 2018
image from GTIC Monthly Threat Report March 2018

GTIC Monthly Threat Report March 2018

This monthly threat report takes a look at the month of March 2018. Specifically, it looks at a Cisco VULN, the strength of APT37 a North Korean APT, and where a Chines APT backdoor was found.

(more available)
Added: October 20, 2018
image from McAfee Labs Threats Report June 2018 Infographic

McAfee Labs Threats Report June 2018 Infographic

This is the infographic based on the threat report of the same name.

Added: October 20, 2018
image from Mobile Phishing Report 2018

Mobile Phishing Report 2018

This whitepaper looks at the evolution of mobile phishing - examining why and how people get phished. It explores the prevalence and severity of enterprise phishing techniques, providing actionable advice for how best to protect your mobile device fleet.

(more available)
Added: October 20, 2018
image from State of the Internet - Security Q1 2016 report

State of the Internet - Security Q1 2016 report

Get detailed cloud security insights about DDoS and web application attack trends observed across the Akamai Intelligent Platform™ for Q1 2016. Highlights include: 1) A 23% increase in DDoS attacks and a 26% increase in web application attacks, compared with Q4 2015, setting new records for the number of attacks in the quarter 2) The rise in repeat DDoS attacks, with an average of 29 attacks per targeted customer – including one customer who was targeted 283 times 3) The continued rise in multi-vectored attacks (56% of all DDoS attacks mitigated in Q1 2016), making mitigation more difficult

(more available)
Added: October 20, 2018
image from GTIC Monthly Threat Report June 2017

GTIC Monthly Threat Report June 2017

This monthly threat report takes a look at the month of June 2017. More specifically, it takes a look at the Trickbot ‘mac1’ Phishing campaign.

(more available)
Added: October 19, 2018
image from Hospital Network Security Requirements:5 Steps Beyond Compliance

Hospital Network Security Requirements:5 Steps Beyond Compliance

As this report states, you can be compliant, but still not be secure. Read the 5 steps that can help make your hospital secure beyond the requirements for compliance.

(more available)
Added: October 19, 2018
image from Post-Soviet Bank Heists

Post-Soviet Bank Heists

This report takes a look at recent bank heists that originated from Post-Soviet states.

Added: October 19, 2018
image from State of the Internet/Security Q4 2015 report

State of the Internet/Security Q4 2015 report

This report gives a detailed breakdown of DDoS attacks in Q4 of 2015.

Added: October 19, 2018
image from 2015 Internet Security Threat Report, Volume 20, Appendices

2015 Internet Security Threat Report, Volume 20, Appendices

The 2015 Internet Security Threat Report (ISTR) provides an overview and analysis of the year in global threat activity. (aggregating and collecting data collected from Symantec devices and customers)

(more available)
Added: October 18, 2018
image from GTIC Monthly Threat Report July 2017

GTIC Monthly Threat Report July 2017

This monthly threat report takes a look at the month of July 2017. More specifically, it takes a look at why the GDPR matters, observations from the Cyber Kill Chain, and buffer flow VULNS.

(more available)
Added: October 18, 2018
image from Security Response: The Waterbug Attack Group

Security Response: The Waterbug Attack Group

This report takes a look at the Waterbug Attack Group and their impact in 2016.

Added: October 18, 2018
image from Assessing Russian Activities and Intentions in Recent US Elections

Assessing Russian Activities and Intentions in Recent US Elections

This is a declassified version of a highly classified assessment that has been provided to the President and to recipients approved by the President.

(more available)
Added: October 17, 2018
image from Trusted Access Report 2018

Trusted Access Report 2018

This report takes a closer look at user authentications and how users behave in phishing simulations, as well as shedding light on the security health of users’ devices used to log into enterprise applications.

(more available)
Added: October 17, 2018
image from Two Years Of Pawn Storm: Examining An Increasingly Relevant Threat

Two Years Of Pawn Storm: Examining An Increasingly Relevant Threat

This paper is exclusively dedicated to the cyber threat, Pawn Storm.

Added: October 17, 2018
image from Digging Deeper: An In Depth Analysis Of A Fast Flux Network

Digging Deeper: An In Depth Analysis Of A Fast Flux Network

This whitepaper provides some insight into a Fast Flux Network and its ability to deal with attacks.

Added: October 16, 2018
image from Cryptowall Report

Cryptowall Report

This is a report that deals with the CryptoWall Malware. The focus of this report is to study the prevalence and global impact of CryptoWall.

(more available)
Added: October 15, 2018
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)