Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Botnet

Below you will find reports with the tag of “Botnet”

image from 2017 Data Breach Investigations Report

2017 Data Breach Investigations Report

As always, this report is comprised of real-world data breaches and security incidents—either investigated by us or provided by one of our outstanding data contributors.

(more available)
Added: October 12, 2018
image from State of the Internet Security Report Q1 2018

State of the Internet Security Report Q1 2018

This Quaterly report continues Akamai’s breakdown of the internet security events that occurred in the first Quarter of 2018.

Added: October 12, 2018
image from The Fake News Machine: How Propagandists Abuse The Internet And Manipulate The Public

The Fake News Machine: How Propagandists Abuse The Internet And Manipulate The Public

This paper studies and explores the techniques and methods used by actors to spread fake news and manipulate public opinion to serve various motives ranging from personal and financial to political. It also discusses the three legs of the fake news triangle: the services that enable them, their appearance on social media sites, and the motivations behind these activities.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 12
  • 13
  • 14
  • 15
  • 16
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)