Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Botnet

Below you will find reports with the tag of “Botnet”

image from An Analysis Of Exposed IoT Technologies in China

An Analysis Of Exposed IoT Technologies in China

From the paper, “In terms of the technical roadmap, and considering the great differences between China and international IoT systems and products, this paper mainly analyzes IoT assets in China and describes their exposure. This helps illustrate what IoT devices and services are accessible on the Internet and their potential security problems, with the purpose of raising the public awareness of defending IoT.”

(more available)
Added: October 22, 2018
image from Credential Compromise: What You Need To Know About Theft, Stuffing, And Spilling, And What You Can Do About It

Credential Compromise: What You Need To Know About Theft, Stuffing, And Spilling, And What You Can Do About It

This paper seeks to help mitigate serious crimes related to mobile security and credential fraud.

Added: October 22, 2018
image from DDoS Threat Report Q4 2016

DDoS Threat Report Q4 2016

This report takes a look at the DDoS threats that occurred in the fourth quarter of 2016.

Added: October 22, 2018
image from From Insecurity To Resiliency: 2018 State Of Cyber Resilience For Banking & Capital Markets

From Insecurity To Resiliency: 2018 State Of Cyber Resilience For Banking & Capital Markets

Banking and capital markets firms have several things to be happy about in Accenture Security‘s comprehensive research study. Compared with the findings from last year’s report, the percentage of successful security breaches has decreased. The number of cybersecurity capabilities in banking increased from 15 to 19. Give this report a read.

(more available)
Added: October 22, 2018
image from GTIC Monthly Threat Report October 2017

GTIC Monthly Threat Report October 2017

This monthly threat report takes a look at the month of October 2017. More specifically, it takes a look at the shift in Phishing campaigns, the WIFI WPA Security VULN, and a variety of other threats.

(more available)
Added: October 22, 2018
image from ISTR Email Threats 2017

ISTR Email Threats 2017

This special report analyzes Email and the threats that occur in that environment.

Added: October 22, 2018
image from State of the Internet Security 2nd Quarter 2017

State of the Internet Security 2nd Quarter 2017

This is Akamai’s State of The Internet Security report from the second quarter of 2017

Added: October 22, 2018
image from 2017 Internet Security Threat Report, Volume 22

2017 Internet Security Threat Report, Volume 22

Symantec has established the largest civilian threat collection network in the world, and through that has developed the Symantec Global Intelligence Network. Through that development comes this report based on their experiences in 2016.

(more available)
Added: October 21, 2018
image from 2017 State Of Cybercrime

2017 State Of Cybercrime

The goal of this report is to help all organizations better protect themselves from current and emerging cyber threats; to help make them become smarter and safer.

(more available)
Added: October 21, 2018
image from 2018 Cyber Threat Intelligence Estimate

2018 Cyber Threat Intelligence Estimate

This report is based on security digital footprint assessments conducted in 2017. It offers predictions for 2018 and analysis of 2017.

(more available)
Added: October 21, 2018
image from 2018 Gambling Report

2018 Gambling Report

iovation offers their unique insight into the igaming industry. They provide observations of the trends in 2017 and look ahead to the future of the industry in 2018.

(more available)
Added: October 21, 2018
image from DDoS Threat Report Q3 2017

DDoS Threat Report Q3 2017

This report takes a look at the DDoS threats that occurred in the third quarter of 2017.

Added: October 21, 2018
image from How Cybercriminals Can Abuse Chat Platform API's As C&C Infrastructures

How Cybercriminals Can Abuse Chat Platform API's As C&C Infrastructures

This paper presents exclusive research into how chat platforms can be abused and become a cyber security weakness.

Added: October 21, 2018
image from How The Rise Of Cryptocurrencies Is Shaping The Cyber Crime Landscape

How The Rise Of Cryptocurrencies Is Shaping The Cyber Crime Landscape

This blog post discusses cyber crime as it relates to cryptocurrencies and how it is changing the landscape.

Added: October 21, 2018
image from It Takes More than Offensive Capability to Have an Effective Cyberdeterrence Posture

It Takes More than Offensive Capability to Have an Effective Cyberdeterrence Posture

This paper presents the testimony, of Martin Libicki, presented before the House Armed Services Committee on March 1, 2017.

Added: October 21, 2018
image from Malicious Bots On Property Portals

Malicious Bots On Property Portals

The Malicious Bots on Property Portals - Avoiding Common Engineering Pitfalls eBook is the re- sult of analyses conducted on some of the top property portals (aka, real estate websites) in the world. The report outlines various hidden issues found in property portals that can be exploited to scrape data.

(more available)
Added: October 21, 2018
image from SERT Quarterly Threat Report 2015

SERT Quarterly Threat Report 2015

“The SERT Quarterly Threat Report provides a glimpse inside the research conducted by Solutionary researchers, security professionals and analysts spanning the last three months and highlights the results of this research. In addition to a wide variety of open-source intelligence tools and honeypots, SERT also analyzes data from the Solutionary ActiveGuard platform. The patented, cloud-based Solutionary ActiveGuard service platform collects, correlates and analyzes security events across systems for Solutionary clients globally, providing researchers with an even deeper understanding of the overall threat landscape.”

(more available)
Added: October 21, 2018
image from State of the Internet - Security Q1 2017 report

State of the Internet - Security Q1 2017 report

This paper represents analysis and research based on data from Akamai’s global infrastructure and routed Distributed Denial of Service (DDoS) solution.

(more available)
Added: October 21, 2018
image from Stop Advanced Automated Attacks That Go Undetected

Stop Advanced Automated Attacks That Go Undetected

If you are interested in looking about Bots that go undetected, this paper is for you.

Added: October 21, 2018
image from Technical Analysis Report On Rowdy, A New Type Of IOT Malware Exploiting STB's

Technical Analysis Report On Rowdy, A New Type Of IOT Malware Exploiting STB's

This report offers a breakdown and analysis of the actions and behaviors of Rowdy, a new type of IoT Malware.

(more available)
Added: October 21, 2018
image from US-Japan Alliance Conference: Strengthening Strategic Cooperation

US-Japan Alliance Conference: Strengthening Strategic Cooperation

In 2015, after two years of study and policy coordination, the United States and Japan publicly issued new defense guidelines, updating and expanding upon the previous guidance of 1997. The new guidelines enable a much broader set of cooperative engagements, including in geographic areas beyond the areas surrounding Japan and in the new domains of outer space and cyberspace.

(more available)
Added: October 21, 2018
  • ««
  • «
  • 9
  • 10
  • 11
  • 12
  • 13
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 08:08 UTC (build b1d7be4)