Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Backdoor

Below you will find reports with the tag of “Backdoor”

image from EternalBlue & DoublePulsar - NSA Equation Group Breakdown

EternalBlue & DoublePulsar - NSA Equation Group Breakdown

This paper takes a look at one of the largest cyber-security attacks in history, that took place using Wannacry in May of 2017.

(more available)
Added: October 13, 2018
image from M-Trends 2016

M-Trends 2016

In this issue, Mandiant presents their popular annual breach statistics, discuss three new trends that they have noticed, explore more in depth “Trends Turned Constants”, and include two additional articles to help support their interpretation of the numbers they present. The articles address the [re]Rise of Red Teaming operations, and how their FireEye as a Service (FaaS) service line is keeping companies safer and reducing the standard number of days compromised.

(more available)
Added: October 13, 2018
image from Cyber Threats To The Construction And Engineering Industries

Cyber Threats To The Construction And Engineering Industries

Learn why the construction and engineering sectors are high profile targets for state-sponsored threat actors engaged in cyber espionage.

Added: October 12, 2018
image from M-Trends 2015

M-Trends 2015

Mandiant consultants’ role as the first responders to critical security incidents gives them a unique vantage point into how attackers’ motives and tactics are changing . The insights and analysis presented here represent their combined experience over the course of hundreds of service engagements . Over the last decade, they have helped clients across more than 30 industries around the globe .

(more available)
Added: October 12, 2018
image from Panda Labs Annual Report 2017

Panda Labs Annual Report 2017

This report discusses events of 2017 and lays out trends and predictions for 2018, including the secret of how to fight malware. In this report’s conclusion, they go a little more into detail, but ultimately the secret is “forgetting about” malware. If we focus on fighting malware, the battle is lost before it has begun.

(more available)
Added: October 12, 2018
image from Threats Report - March 2016

Threats Report - March 2016

This report discusses two key topics: 1) An Intel Security survey that found that awareness was very high and, 97% of those interviewed, said that sharing cyber intelligence was valuable and 2) They explore the Adwind Java-based Trojan. It also includes the usual key points about predictions and threat summaries.

(more available)
Added: October 12, 2018
image from Winter 2018 Netskope Cloud Report

Winter 2018 Netskope Cloud Report

This quarterly report from Netskope details information gleaned from providing cloud security to their clients.

Added: October 12, 2018
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 12:08 UTC (build b1d7be4)