Below you will find reports with the tag of “Botnet” Global Application and Network Security Report From the report, “This research provides a comprehensive and objective review of 2015 cyber-attacks from both a business and a technical perspective. It offers best practice advice for organizations to consider when planning for cyber-attack protection in 2016." (more available) Added: October 15, 2018 McAfee Labs Threats Report June 2017 In this quarterly threats report, they highlight three Key Topics: They broadly examine evasion techniques and how malware authors use them to accomplish their goals. They explore the very interesting topic of steganography in the digital world. They examine Fareit, the most famous password-stealing malware. (more available) Added: October 15, 2018 Threat Landscape Report Q1 2018 This report continues Fortinet’s excellent threat report. It discusses operational technology, Zero-day markets, malware, cryptojacking, the hacking event at the winter olympics, the rise of botnets, and Adromeda. Read On! (more available) Added: October 15, 2018 2017 Fintech Security Analysis Report This very thorough report is based on a survey that sought to understand the security status of China’s Fintech Enterprises. (more available) Added: October 14, 2018 Behind The Hidden Conversion Of Electricity To Money: An In-Depth Analysis of XMR Cryptominer Malware This paper provides an in-depth look at current cryptominer trends and the technology behind Monero. Additionally, it explores the projected attack methods that threat actors are likely to adopt, as well as tactics and best practices that security teams can utilize to keep themselves on the right side of this emerging cat-and-mouse game. (more available) Added: October 14, 2018 Cyber Vulnerability: Where do you Stand This report focusses on the analysis of the cyber security posture of three industries: Finance and Insurance, Healthcare and Social Assistance, and Public Administration. The study looks into the number of event types by year from 2012 to 2016, the security ratings for cyber insurance by industry, and many other key data. (more available) Added: October 14, 2018 Data Breach Digest: IoT Calamity, The Panda Monium This is a report based on a one man’s experience with IoT security. Added: October 14, 2018 Fortinet Threat Landscape Report Q1 2017 In this report, you’ll find a few highlights of what FortiGuard Labs analysts gleaned from Q1 intelligence collections. After that, they hope you’ll hang around while they dig deep into the threat landscape to unearth nuggets of insight you definitely won’t want to miss. (more available) Added: October 14, 2018 FSecure 2017 State Of Cyber Security This report gives detailed ideas behind having the proper plans for how to deal with Cybersecurity breaches. Added: October 14, 2018 H2 2017 Global Cyber Attack Trends Report This report takes a look back at the events of the last year and ponders what might occur in 2018. (more available) Added: October 14, 2018 The Main Pillars Of The DevOps Toolchain This paper discusses DevOps and the security issues related to DevOps. Added: October 14, 2018 Top Ten DNS Attacks This report takes a look at the top ten DNS attacks. Added: October 14, 2018 X-Force Threat Intelligence Index 2017 The Threat Intelligence Index outlines the security threat landscape based on data gathered for the entire year of 2016. It uses data developed by analyzing “billions" of events, monitored by IBM security services, in more than 100 countries. (more available) Added: October 14, 2018 6 Important Steps To Evaluating A Web Security Solution Six Important Steps to Evaluating a Web Security Solution from EdgeWave®, offers IT professionals a checklist for evaluating Web security vendor solutions. The goal is to help you size up competitive offerings and understand new approaches to the critical problem of protecting your organization from mailcious web sites and inappropriate web use. (more available) Added: October 13, 2018 Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience This report analyzes the digital improvements to business communication and how you can use that to improve your ability to reach your audience. (more available) Added: October 13, 2018 Firewall Best Practices To Block Ransomware Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. Modern firewalls are purpose-built to defend against these kinds of attacks, but they need to be given an opportunity to do their job. In this whitepaper we’ll discuss how these attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the best protection possible. (more available) Added: October 13, 2018 Malware Review Q1 2017 Between the beginning of 2017 and close of its first quarter, PhishMe IntelligenceTM completed analysis of 749 sets of phishing emails delivering nearly ten thousand unique malware samples supported by over fourteen thousand online resources. These indicators of compromise, as well as a full assessment of the phishing email tactics and malware capabilities, were profiled in in reports and Strategic Analysis documents designed to highlight techniques being used across the threat landscape. Several trends defined the phishing threat landscape in the first quarter of 2017. (more available) Added: October 13, 2018 Pathways into Cybercrime There are a number of young people in the UK that are are becoming involved in cyber dependent crime. This report aims to Collate, and analyze offender briefs to identify motivations and pathways into cyber crime, as well as review academic studies in this area, to identify key intervention points that should be targeted and identify gaps in understanding and propose recommendations. (more available) Added: October 13, 2018 SecureWorks Threat Intelligence Executive Monthly Report July 2016 This report from July 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues. (more available) Added: October 13, 2018 Security Response: Dridex Tidal Waves Of Spam Pushing Dangerous Financial Trojan This report takes a look a the Trojan, Dridex. Added: October 13, 2018 State of the Internet Security Web Attacks Summer 2018 From the report, “This quarter, we’re taking a deeper look into the attacks directed against the hospitality industry - including hotel, travel, and airline sites - in an effort to understand why five out of six logins at these sites use fake or stolen credentials. We were surprised to find that many of these login attempts were coming from Russia and China, a departure from the general attack trends.” (more available) Added: October 13, 2018 «« « 12 13 14 15 16 » »»
Global Application and Network Security Report From the report, “This research provides a comprehensive and objective review of 2015 cyber-attacks from both a business and a technical perspective. It offers best practice advice for organizations to consider when planning for cyber-attack protection in 2016." (more available) Added: October 15, 2018
McAfee Labs Threats Report June 2017 In this quarterly threats report, they highlight three Key Topics: They broadly examine evasion techniques and how malware authors use them to accomplish their goals. They explore the very interesting topic of steganography in the digital world. They examine Fareit, the most famous password-stealing malware. (more available) Added: October 15, 2018
Threat Landscape Report Q1 2018 This report continues Fortinet’s excellent threat report. It discusses operational technology, Zero-day markets, malware, cryptojacking, the hacking event at the winter olympics, the rise of botnets, and Adromeda. Read On! (more available) Added: October 15, 2018
2017 Fintech Security Analysis Report This very thorough report is based on a survey that sought to understand the security status of China’s Fintech Enterprises. (more available) Added: October 14, 2018
Behind The Hidden Conversion Of Electricity To Money: An In-Depth Analysis of XMR Cryptominer Malware This paper provides an in-depth look at current cryptominer trends and the technology behind Monero. Additionally, it explores the projected attack methods that threat actors are likely to adopt, as well as tactics and best practices that security teams can utilize to keep themselves on the right side of this emerging cat-and-mouse game. (more available) Added: October 14, 2018
Cyber Vulnerability: Where do you Stand This report focusses on the analysis of the cyber security posture of three industries: Finance and Insurance, Healthcare and Social Assistance, and Public Administration. The study looks into the number of event types by year from 2012 to 2016, the security ratings for cyber insurance by industry, and many other key data. (more available) Added: October 14, 2018
Data Breach Digest: IoT Calamity, The Panda Monium This is a report based on a one man’s experience with IoT security. Added: October 14, 2018
Fortinet Threat Landscape Report Q1 2017 In this report, you’ll find a few highlights of what FortiGuard Labs analysts gleaned from Q1 intelligence collections. After that, they hope you’ll hang around while they dig deep into the threat landscape to unearth nuggets of insight you definitely won’t want to miss. (more available) Added: October 14, 2018
FSecure 2017 State Of Cyber Security This report gives detailed ideas behind having the proper plans for how to deal with Cybersecurity breaches. Added: October 14, 2018
H2 2017 Global Cyber Attack Trends Report This report takes a look back at the events of the last year and ponders what might occur in 2018. (more available) Added: October 14, 2018
The Main Pillars Of The DevOps Toolchain This paper discusses DevOps and the security issues related to DevOps. Added: October 14, 2018
X-Force Threat Intelligence Index 2017 The Threat Intelligence Index outlines the security threat landscape based on data gathered for the entire year of 2016. It uses data developed by analyzing “billions" of events, monitored by IBM security services, in more than 100 countries. (more available) Added: October 14, 2018
6 Important Steps To Evaluating A Web Security Solution Six Important Steps to Evaluating a Web Security Solution from EdgeWave®, offers IT professionals a checklist for evaluating Web security vendor solutions. The goal is to help you size up competitive offerings and understand new approaches to the critical problem of protecting your organization from mailcious web sites and inappropriate web use. (more available) Added: October 13, 2018
Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience This report analyzes the digital improvements to business communication and how you can use that to improve your ability to reach your audience. (more available) Added: October 13, 2018
Firewall Best Practices To Block Ransomware Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. Modern firewalls are purpose-built to defend against these kinds of attacks, but they need to be given an opportunity to do their job. In this whitepaper we’ll discuss how these attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the best protection possible. (more available) Added: October 13, 2018
Malware Review Q1 2017 Between the beginning of 2017 and close of its first quarter, PhishMe IntelligenceTM completed analysis of 749 sets of phishing emails delivering nearly ten thousand unique malware samples supported by over fourteen thousand online resources. These indicators of compromise, as well as a full assessment of the phishing email tactics and malware capabilities, were profiled in in reports and Strategic Analysis documents designed to highlight techniques being used across the threat landscape. Several trends defined the phishing threat landscape in the first quarter of 2017. (more available) Added: October 13, 2018
Pathways into Cybercrime There are a number of young people in the UK that are are becoming involved in cyber dependent crime. This report aims to Collate, and analyze offender briefs to identify motivations and pathways into cyber crime, as well as review academic studies in this area, to identify key intervention points that should be targeted and identify gaps in understanding and propose recommendations. (more available) Added: October 13, 2018
SecureWorks Threat Intelligence Executive Monthly Report July 2016 This report from July 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues. (more available) Added: October 13, 2018
Security Response: Dridex Tidal Waves Of Spam Pushing Dangerous Financial Trojan This report takes a look a the Trojan, Dridex. Added: October 13, 2018
State of the Internet Security Web Attacks Summer 2018 From the report, “This quarter, we’re taking a deeper look into the attacks directed against the hospitality industry - including hotel, travel, and airline sites - in an effort to understand why five out of six logins at these sites use fake or stolen credentials. We were surprised to find that many of these login attempts were coming from Russia and China, a departure from the general attack trends.” (more available) Added: October 13, 2018