Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Botnet

Below you will find reports with the tag of “Botnet”

image from WAF And DDoS:Perfect Bedfellows

WAF And DDoS:Perfect Bedfellows

This short article discusses why a marriage between WAF and DDoS is a good idea.

Added: October 21, 2018
image from Advancing To Bot Management And Security

Advancing To Bot Management And Security

This report discusses the use of Bots in managing security risks for an organization. It specifically discusses the issures related to credential stuffing.

(more available)
Added: October 20, 2018
image from Combating Web Scraping In Online Businesses

Combating Web Scraping In Online Businesses

This report takes a look at the harmful practice of web scraping.

Added: October 20, 2018
image from CyberThreat Report: The Malware Wars Are Heating Up

CyberThreat Report: The Malware Wars Are Heating Up

The purpose of this report is to help businesses better understand the risks that they are facing. This report asks businesses to be mindful that they should take the new security landscape seriously.

(more available)
Added: October 20, 2018
image from DDoS Threat Report Q3 2016

DDoS Threat Report Q3 2016

This report takes a look at the DDoS threats that occurred in the third quarter of 2016.

Added: October 20, 2018
image from DDoS Trends Report Q4 2016

DDoS Trends Report Q4 2016

This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign. It represents a unique view into the attack trends unfolding online, including attack statistics and behavioral trends for Q4 2016.

(more available)
Added: October 20, 2018
image from eCommerce Threats Of 2018

eCommerce Threats Of 2018

This report discusses the malicious Bots in 2018 and how they can impact the eCommerce sector.

Added: October 20, 2018
image from ENISA Threat Landscape Report 2017

ENISA Threat Landscape Report 2017

This report summarizes the threat landscape seen in 2017 and gives some clear recommendations for the future.

Added: October 20, 2018
image from Exposing The Enemy Within

Exposing The Enemy Within

This e-Book takes a look at what your DNS can tell you about your security Posture.

Added: October 20, 2018
image from GTIC Monthly Threat Report March 2018

GTIC Monthly Threat Report March 2018

This monthly threat report takes a look at the month of March 2018. Specifically, it looks at a Cisco VULN, the strength of APT37 a North Korean APT, and where a Chines APT backdoor was found.

(more available)
Added: October 20, 2018
image from ISP DDoS Protection May Not Cover All Bases

ISP DDoS Protection May Not Cover All Bases

This short article gives a 10 reasons why an ISP’s DDoS Protection may not be able to actually protect an organization.

(more available)
Added: October 20, 2018
image from State of the Internet - Security Q1 2016 report

State of the Internet - Security Q1 2016 report

Get detailed cloud security insights about DDoS and web application attack trends observed across the Akamai Intelligent Platform™ for Q1 2016. Highlights include: 1) A 23% increase in DDoS attacks and a 26% increase in web application attacks, compared with Q4 2015, setting new records for the number of attacks in the quarter 2) The rise in repeat DDoS attacks, with an average of 29 attacks per targeted customer – including one customer who was targeted 283 times 3) The continued rise in multi-vectored attacks (56% of all DDoS attacks mitigated in Q1 2016), making mitigation more difficult

(more available)
Added: October 20, 2018
image from The 2017 Global Threat Landscape Report

The 2017 Global Threat Landscape Report

“This report is based exclusively on information collected via a wide range of security services within GravityZone: Security for Virtualized Environments, Security for Endpoints, Security for Mobile and Security for Exchange, consumer-oriented products such as Bitdefender Antivirus, Bitdefender Internet Security or Bitdefender Total Security, as well as from Bitdefender BOX, the innovative solution for protecting devices in the IoT space.”

(more available)
Added: October 20, 2018
image from The Future Of Political Warfare: Russia, The West, And The Coming Age Of Digital Competition

The Future Of Political Warfare: Russia, The West, And The Coming Age Of Digital Competition

This paper outlines the current state of play in political warfare, identifies emerging threats, and proposes potential policy responses. It argues for greater information sharing mechanisms between trans-Atlantic governments and the private sector, greater information security and transparency, and greater investments in research and development on AI and computational propaganda. As authoritarian regimes seek to undermine democratic institutions, Western societies must harness their current— though fleeting—competitive advantage in technology to prepare for the next great leap forward in political warfare.

(more available)
Added: October 20, 2018
image from 2018 Bad Bot Report:The Year Bad Bots Went Mainstream

2018 Bad Bot Report:The Year Bad Bots Went Mainstream

Focussing on Bad Bots, this report offers some updated insights into the current bad bot statistics and situations.

Added: October 19, 2018
image from 6 Best Practices For Amazon Security Groups

6 Best Practices For Amazon Security Groups

This paper provides 6 Best Practices for Amazon Security Groups

Added: October 19, 2018
image from ASEC Report Volume 88 Q3 2017

ASEC Report Volume 88 Q3 2017

This report from the Ahn Lab Security Emergency Response Center provides a review of various Cyber events that took place in the 3rd Qtr. of 2017.

(more available)
Added: October 19, 2018
image from DDoS Threat Report Q2 2017

DDoS Threat Report Q2 2017

This report takes a look at the DDoS threats that occurred in the second quarter of 2017.

Added: October 19, 2018
image from ENISA Threat Landscape Report 2016

ENISA Threat Landscape Report 2016

In the following report, we give an overview of the top cyber-threats assessed in 2016. By concentrating more on the cyber-threats, ETL 2016 is more streamlined towards the details of cyber threats, while it provides information on threat agents and attack vectors. Based on this material, we deliver our conclusions for policy makers, businesses and research.

(more available)
Added: October 19, 2018
image from Global Application & Network Security Report 2017-2018

Global Application & Network Security Report 2017-2018

This report highlights the trends and threats of 2017 as observed by Radware.

Added: October 19, 2018
image from Global Cyberspace Is Safer Than You Think

Global Cyberspace Is Safer Than You Think

This paper argues that the level of security in cyberspace is actually far better than the picture described by media accounts and IT security reports.

(more available)
Added: October 19, 2018
  • ««
  • «
  • 10
  • 11
  • 12
  • 13
  • 14
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 04:08 UTC (build b1d7be4)