Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Backdoor

Below you will find reports with the tag of “Backdoor”

image from Cyber Threats To The Aerospace And Defense Industries

Cyber Threats To The Aerospace And Defense Industries

Read about the threat outlook for aerospace and defense sectors as threat groups seek to gain military and economic advantages.

(more available)
Added: October 26, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report April 2016

SecureWorks Threat Intelligence Executive Monthly Report April 2016

This report from April 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 26, 2018
image from 2016 Hacked Website Report Q3

2016 Hacked Website Report Q3

This is an annual report that discusses the latest malware and hacking trends in compromised websites.

Added: October 25, 2018
image from Cyber Threats To International Organizations And Non-Profits

Cyber Threats To International Organizations And Non-Profits

Gain insights into the nature and rationales of cyber threats international organizations and nonprofits face.

Added: October 25, 2018
image from M-Trends 2018

M-Trends 2018

In this report they look at incidents that occurred between October 2016 and September 2017.

Added: October 25, 2018
image from 2016 Hacked Website Report Q2

2016 Hacked Website Report Q2

This is an annual report that discusses the latest malware and hacking trends in compromised websites.

Added: October 24, 2018
image from Cyber Espionage Is Alive And Well APT32

Cyber Espionage Is Alive And Well APT32

This blog post discusses APT32 and it’s targetting of global corporations for destruction.

Added: October 24, 2018
image from Monthly Threat Report May 2017

Monthly Threat Report May 2017

This monthly threat report takes a look at the month of May 2017.

Added: October 24, 2018
image from Security Intelligence Report Volume 20

Security Intelligence Report Volume 20

This report focuses on software vulnerabilities, software vulnerability exploits, malware, and unwanted software. It is the hope that readers find the data, insights, and guidance provided in this report useful in helping them protect their organizations, software, and users.

(more available)
Added: October 24, 2018
image from Shelltea + Poslurp Memory-Resident Point-Of-Sale Malware Attacks Industry

Shelltea + Poslurp Memory-Resident Point-Of-Sale Malware Attacks Industry

This paper discusses the specific issue of malware that attacks Point-Of-Sale systems.

Added: October 24, 2018
image from 2017 Hacked Website Report

2017 Hacked Website Report

This is an annual report that discusses the latest malware and hacking trends in compromised websites.

Added: October 23, 2018
image from Insights Into Iranian Cyber Espionage APT33

Insights Into Iranian Cyber Espionage APT33

This blog post provides great discussion and insight into an APT operating out of Iran that is specifically targeting the Aerospace and Defense Industries.

(more available)
Added: October 22, 2018
image from Threat Actor - APT28

Threat Actor - APT28

This report takes a look at ATP28 a recognized state sponsored threat actor operating out of Russia.

Added: October 22, 2018
image from APT37 (Reaper) The Overlooked North Korean Actor

APT37 (Reaper) The Overlooked North Korean Actor

This report takes a look at a North Korean CyberEspionage Groub.

Added: October 21, 2018
image from GTIC Monthly Threat Report November 2017

GTIC Monthly Threat Report November 2017

This monthly threat report takes a look at the month of November 2017. Specifically, it looks at IoT Attacks, Hidden Cobra, and the Fancy Bear exploit of a Microsoft VULN.

(more available)
Added: October 21, 2018
image from Tech Report:Targeted Attacks On Defense Industry

Tech Report:Targeted Attacks On Defense Industry

This report, based on case studies, outlines the recent trends of cyberattacks on the defense industry.

Added: October 21, 2018
image from APT28: Center Of The Storm

APT28: Center Of The Storm

This report details observations of APT28’s, a Russian Sponsored cyber network, targeting, and an investigation into a related breach. They also provide an update on shifts in the group’s tool development and use, and summarize the tactics APT28 employs to compromise its victims.

(more available)
Added: October 20, 2018
image from Follow The Money:Dissecting The Operations Of The Cyber Crime Group FIN6

Follow The Money:Dissecting The Operations Of The Cyber Crime Group FIN6

This report examines the Cyber Crime Group FIN6.

Added: October 20, 2018
image from GTIC Monthly Threat Report March 2018

GTIC Monthly Threat Report March 2018

This monthly threat report takes a look at the month of March 2018. Specifically, it looks at a Cisco VULN, the strength of APT37 a North Korean APT, and where a Chines APT backdoor was found.

(more available)
Added: October 20, 2018
image from Ok Panic: Newly Evolved Ransomware Is Bad News For Everyone

Ok Panic: Newly Evolved Ransomware Is Bad News For Everyone

A quick and effecient article discussing why the new ransomware is dangerous.

Added: October 19, 2018
image from Stonedrill - Shamoon & Shamoon 2.0 Variant

Stonedrill - Shamoon & Shamoon 2.0 Variant

It would appear that a new variant titled ‘StoneDrill‘ has now hit the wild and conducts operations very similar to that of Shamoon 2.0 and Shamoon malware. Here is a brief analysis of StoneDrill,

(more available)
Added: October 19, 2018
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 12:08 UTC (build b1d7be4)