Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Brute Force

Below you will find reports with the tag of “Brute Force”

image from 2023 State of Identity Security

2023 State of Identity Security

The report outlines the most significant identity attacks of 2022, the weaknesses of MFA, and the IAM hygiene issues that are increasing identity attack surfaces. This report analyzed user data, login information, and information from identity providers including Okta, Azure Active Directory, Duo, and Auth0. In total, the analysis covers more than 500,000 identities from organizations with 1,000+ employees.

(more available)
Added: April 26, 2023
image from Account Takeover In 2022

Account Takeover In 2022

Weak passwords abound, and ATO is interrupting services critical to every aspect of online life: working, streaming, ordering, paying, and just plain connecting. Raising security awareness of this topic can certainly help; but the ATO threat will remain endemic until the problems inherent to password use are resolved.

(more available)
Added: June 24, 2022
image from Overstimulating: CARES Act Fraud On the Deep and Dark Web

Overstimulating: CARES Act Fraud On the Deep and Dark Web

After the CARES act was passed in March of 2020, fraudsters worked towards making money off of it. This report seeks to understand all of the components of fraud happening on the dark web in relation to the CARES act.

(more available)
Added: July 29, 2020
image from Exposed: Cyberattacks On Cloud Honeypots

Exposed: Cyberattacks On Cloud Honeypots

Contrary to popular belief, every device is worth hacking when the process is automated. It doesn’t matter who or where you are, if you own a company big or small, or have technology in the home – every device can be monetized by an enterprising criminal. Brute force login attempts are likely occurring on any online device. Yet the speed and scale of the problem can boggle the mind. Criminals are relentless and often competitive with one another to find, take over, and monetize your smart devices. The research you’ll find here, using honeypot devices across the internet, is a first step in attempting to quantify the issue.

(more available)
Added: April 19, 2019
image from Beginner's Guide to Brute Force & DDoS Attacks

Beginner's Guide to Brute Force & DDoS Attacks

This report offers advice for what to do when the barbarians are at your door…

Added: February 27, 2019
image from 2018 Legal Threat Report

2018 Legal Threat Report

From the one page report, “From trade secrets to client information, legal services and law firms have an ethical and legal obligation to protect privileged data. To help you understand the common attack types and trends facing the legal industry, we’ve compiled the following observations based on real data from across our client base.”

(more available)
Added: February 5, 2019
image from 2018 Finance Threat report

2018 Finance Threat report

This one page report offers the following, “Whether it’s account data or trading and investor information, financial firms hold a wealth of information that can be quickly turned into monetary gain. To help you understand the common attack types and trends facing the finance industry, we’ve compiled the following observations based on real data from across our client base.”

(more available)
Added: February 5, 2019
image from 2019 Threats Predictions

2019 Threats Predictions

This infographic provides a summarized list of the points made in McAfee’s 2019 threat predictions blog post.

Added: December 29, 2018
image from Cloud Native Security Report: Watching The Honeypots

Cloud Native Security Report: Watching The Honeypots

This report is the first in a bi-annual series that examines risks and attacks in the cloud native computing ecosystem. The next report will be released in the first half of 2019.

(more available)
Added: November 20, 2018
image from Dridex v4

Dridex v4

The upgraded version of the Dridex Trojan was at one time one of the most successful bank Trojans originally discovered in 2014 and has since re-emerged. This paper provides an overview.

(more available)
Added: October 26, 2018
image from Quarterly Threat Report Q2 2018

Quarterly Threat Report Q2 2018

This Quarterly report continues Rapid7’s excellent work of providing insight to the threats they have witnessed during the 2nd Quarter of 2018.

(more available)
Added: October 26, 2018
image from Technical Analysis Report On Rowdy, A New Type Of IOT Malware Exploiting STB's

Technical Analysis Report On Rowdy, A New Type Of IOT Malware Exploiting STB's

This report offers a breakdown and analysis of the actions and behaviors of Rowdy, a new type of IoT Malware.

(more available)
Added: October 21, 2018
image from Blockchain Threat Report

Blockchain Threat Report

This report discusses the security concerns that have arisen about the new technology, blockchain.

Added: October 20, 2018
image from DDoS Threat Report Q3 2016

DDoS Threat Report Q3 2016

This report takes a look at the DDoS threats that occurred in the third quarter of 2016.

Added: October 20, 2018
image from ISP DDoS Protection May Not Cover All Bases

ISP DDoS Protection May Not Cover All Bases

This short article gives a 10 reasons why an ISP’s DDoS Protection may not be able to actually protect an organization.

(more available)
Added: October 20, 2018
image from Don't Compromise On Identity Because Of GDPR Compliance

Don't Compromise On Identity Because Of GDPR Compliance

This paper offers a helpful checklist for making sure you do not compromise your identity management for the sake of GDPR compliance.

(more available)
Added: October 19, 2018
image from Stonedrill - Shamoon & Shamoon 2.0 Variant

Stonedrill - Shamoon & Shamoon 2.0 Variant

It would appear that a new variant titled ‘StoneDrill‘ has now hit the wild and conducts operations very similar to that of Shamoon 2.0 and Shamoon malware. Here is a brief analysis of StoneDrill,

(more available)
Added: October 19, 2018
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)