Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Botnet

Below you will find reports with the tag of “Botnet”

image from Bot Baseline: Fraud in Digital Advertising

Bot Baseline: Fraud in Digital Advertising

For the fourth time, White Ops and the ANA have partnered to measure bot fraud in the digital advertising ecosystem. Previous studies measured bot fraud in the digital advertising ecosystem in August/September 2014, August/September 2015, and November/December 2016. This one studies November/December 2019.

(more available)
Added: March 15, 2020
image from Threat Landscape Report Q4 2019

Threat Landscape Report Q4 2019

This is the threat landscape report from Fortinet for the 4th quarter of 2019. It goes into changes in this quarter, including threat detection changes and attack changes.

(more available)
Added: March 15, 2020
image from The New Mafia: Gangs and Vigilantes

The New Mafia: Gangs and Vigilantes

This guide was constructed with insight from a global panel of Malwarebytes experts and external experts from a variety of disciplines. It also features a brief review of cybercrime history, the emergence of new participants and the impact on businesses and individuals.

(more available)
Added: February 18, 2020
image from Global DDoS Threat Landscape Q4 2017

Global DDoS Threat Landscape Q4 2017

Imperva outlines trends in the DDoS threat landscape in 2017, including that the number of attacks has doubled, that crypto-currency continues to be targeted, and that persistent attacks are growing more common.

(more available)
Added: February 17, 2020
image from LexisNexis Risk Solutions Cybercrime Report

LexisNexis Risk Solutions Cybercrime Report

The LexisNexis® Risk Solutions Cybercrime Report is based on cybercrime attacks detected by the LexisNexis® Digital Identity Network® from January – June 2019, during real-time analysis. It covers the digital identity network, and attacks on “high-risk” transactions.

(more available)
Added: February 9, 2020
image from Quarterly Threat Landscape Report Q3 2018

Quarterly Threat Landscape Report Q3 2018

This publication from Fortinet looks at how the threat landscape has changed in the third quarter of 2018 by doing data-driven analysis with some noteworthy events pulled from Q3 2018 headlines.

(more available)
Added: October 1, 2019
image from Fortinet Quarterly Threat Landscape Report Q1 2019

Fortinet Quarterly Threat Landscape Report Q1 2019

This is a quarterly publication from Fortinet that looks at how the threat landscape has changed in the first quarter of 2019.

(more available)
Added: October 1, 2019
image from Internet Risk Surface Report

Internet Risk Surface Report

This report goes in depth into the state of Internet security, including how companies are storing data, orgation’s internet surface areas, and where exposures exist the most.

(more available)
Added: October 1, 2019
image from State of the Internet: Media Under Assault

State of the Internet: Media Under Assault

From the report, “From January 2018 through June 2019, Akamai recorded more than 61 billion credential stuffing attempts and more than 4 billion web application attacks. In this special edition of the State of the Internet / Security Report, we’re focusing on data within the high tech, video media, and entertainment sectors — collectively named Media & Technology.”

(more available)
Added: September 18, 2019
image from Web Attacks and Gaming Abuse

Web Attacks and Gaming Abuse

This installment of State of the Internet / Security examines credential stuffing and web application attack trends over the last 17 months, with a focus on the gaming industry. One reason gaming is so lucrative is the trend of adding easily commoditized items for gamers to consume, such as cosmetic enhancements, special weapons, or other related items. Gamers are also a niche demographic known for spending money, so their financial status makes them tempting targets. We began collecting credential abuse data at the beginning of November 2017 and chose to use the same period with our application attack data to make direct comparisons between plots easier for readers.

(more available)
Added: July 10, 2019
image from Phishing Threat & Malware Review 2019

Phishing Threat & Malware Review 2019

This report is about evolution, how phishing emails and malware are in a state of constant flux. But one thing hasn’t changed: phishing is still the #1 cyber-attack vector. The vast majority of breaches begin with malicious emails or other social engineering and most malware is delivered by email.

(more available)
Added: July 10, 2019
image from 10 Predictions for Developers in 2019

10 Predictions for Developers in 2019

This report provides exactly what its title offers, 10 predictions for developers in 2019.

Added: July 10, 2019
image from Healthcare's Legacy Infrastructure Of Unmanaged Devices Exposes A Vulnerable Attack Surface

Healthcare's Legacy Infrastructure Of Unmanaged Devices Exposes A Vulnerable Attack Surface

This specialized report offers insights into the Healthcare industry and the gaps in policies and procedures that could lead to damaging cyber events within the industry.

(more available)
Added: May 18, 2019
image from Attacker Behavior Industry Report

Attacker Behavior Industry Report

This report examines a wide range of cyberattack detections and trends from a sample of 354 Vectra customers with more than 3 million devices and workloads per month from nine different industries. This report takes a multidisciplinary approach that spans all strategic phases of the attack lifecycle.

(more available)
Added: May 18, 2019
image from State of the Internet: Credential Stuffing - Attacks and Economies

State of the Internet: Credential Stuffing - Attacks and Economies

In this report, we’re going to give you an overview of the credential stuffing attacks in 2018 against the aforementioned sectors and look at the risks these attacks pose. We’ll also explore some of the ways adversaries conduct these attacks.

(more available)
Added: April 19, 2019
image from Exposed: Cyberattacks On Cloud Honeypots

Exposed: Cyberattacks On Cloud Honeypots

Contrary to popular belief, every device is worth hacking when the process is automated. It doesn’t matter who or where you are, if you own a company big or small, or have technology in the home – every device can be monetized by an enterprising criminal. Brute force login attempts are likely occurring on any online device. Yet the speed and scale of the problem can boggle the mind. Criminals are relentless and often competitive with one another to find, take over, and monetize your smart devices. The research you’ll find here, using honeypot devices across the internet, is a first step in attempting to quantify the issue.

(more available)
Added: April 19, 2019
image from Everything You Always Wanted To Know About Security At The Edge, But Were Afraid To Ask

Everything You Always Wanted To Know About Security At The Edge, But Were Afraid To Ask

Akamai provides a thorough report to educated the industry on the attacks that are growing, evolving, and becoming more sophisticated.

(more available)
Added: April 4, 2019
image from The Tactics & Tropes of the Internet Research Agency

The Tactics & Tropes of the Internet Research Agency

Upon request by the United States Senate Select Committee on Intelligence (SSCI), New Knowledge reviewed an expansive data set of social media posts and metadata provided to SSCI by Facebook, Twitter, and Alphabet, plus a set of related data from additional platforms. The data sets were provided by the three primary platforms to serve as evidence for an investigation into the Internet Research Agency (IRA) influence operations.

(more available)
Added: March 26, 2019
image from DDoS Threat Report Q4 2018

DDoS Threat Report Q4 2018

This quarterly threat report offers insight into the DDoS attacks that occurred in the 4th quarter of 2018.

Added: March 26, 2019
image from The IRA, Social Media and Political Polarization in the United State, 2012-2018

The IRA, Social Media and Political Polarization in the United State, 2012-2018

This report provided by Oxford University provides research data into the Russian involvement in the United States election process.

Added: March 26, 2019
image from Analysis Of Brexit Centric Twitter

Analysis Of Brexit Centric Twitter

This report explores Brexit-related Twitter activity occurring between December 4, 2018 and February 13, 2019. Using the standard Twitter API, researchers collected approximately 24 million tweets that matched the word “brexit” published by 1.65 million users.

(more available)
Added: March 16, 2019
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)