Below you will find reports with the tag of “C2” Q4 2019 Malware Trends This report outlines happenings in malware attacks for the last 3 months of 2019. In general, it says malware attacks died down this quarter. (more available) Added: March 29, 2020 Cisco 2018 Annual Cyber Security Report: At-a-Glance - Cloud Security A focused subset of Cisco’s 2018 full Cyber Security Report, focusing on cloud security practices. Added: February 17, 2020 Economic Value of DNS Security Using data from the Verizon DBIR and other sources, this report reviews the value of DNS in overall organizational security. Added: November 25, 2019 Overwatch 2019 mid-year report An analysis of threat actors and key action patterns based upon CrowdStrike’s threat hunting human analyst team over the first half of 2019. (more available) Added: November 25, 2019 Fortinet Quarterly Threat Landscape Report Q1 2019 This is a quarterly publication from Fortinet that looks at how the threat landscape has changed in the first quarter of 2019. (more available) Added: October 1, 2019 State of the Internet: Media Under Assault From the report, “From January 2018 through June 2019, Akamai recorded more than 61 billion credential stuffing attempts and more than 4 billion web application attacks. (more available) Added: September 18, 2019 Threat Insights Report - July 2019 The Bromium Threat Insights Report is updated on a regular basis to track notable threats and the information gleaned from them. (more available) Added: September 18, 2019 Healthcare's Legacy Infrastructure Of Unmanaged Devices Exposes A Vulnerable Attack Surface This specialized report offers insights into the Healthcare industry and the gaps in policies and procedures that could lead to damaging cyber events within the industry. (more available) Added: May 18, 2019 Military and Security Developments Involving the People's Republic of China 2019 A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2000, as Amended Added: May 18, 2019 Everything You Always Wanted To Know About Security At The Edge, But Were Afraid To Ask Akamai provides a thorough report to educated the industry on the attacks that are growing, evolving, and becoming more sophisticated. Added: April 4, 2019 Beginner's Guide to Brute Force & DDoS Attacks This report offers advice for what to do when the barbarians are at your door… Added: February 27, 2019 The Increased Risk Of Cyberattacks Against Manufacturing Organizations: 2018 Spotlight Report This report offers insight into cyberattack behavior in the manufacturing industry. It discusses the severity of attacks, botnets, and other important issues related to the manufacturing industry. (more available) Added: February 7, 2019 The Hidden Threat Of Cyberattacks In The Energy And Utilities Industry: 2018 Spotlight Report This report offers research on analysis and lifecycle of an attack on critical infrastructure. It discusses command and control, internal reconnaissance, lateral movement, and targeting the ICS and SCADA infrastructure. (more available) Added: February 7, 2019 Kovter the Click-Fraud Fileless Malware This report includes detailed technical information discovered during our analysis of the forensics artifacts collected from the affected systems by the AIR Module. (more available) Added: February 6, 2019 Anatomy Of An Attack: Iranian Nation State Interdiction This report offers deep insight into the threat actor known as Oilrig. Added: February 6, 2019 BluVector Threat Report Q3 2018 From the report, “Trojans are still winning. Out of the 12 Threat Reports over Q3, six were trojans. While the results from the Threat Report quarterly from Q2 2018 were pretty even in terms of the volume of threats being spread out between APTs, ransomware and trojans, Q3 2018 showcased the depth and breadth of trojan diversity and malicious innovation. (more available) Added: February 5, 2019 The Top 5 Retail Point-of-Sale Cyberthreats On an ongoing basis, Visa tracks global breach trends affecting retailers and other merchants. In 2017, research confirmed that the U. (more available) Added: January 31, 2019 APT Group Profile: OilRig This report offers insight into OilRig an Iranian-linked Advanced Persistent Threat. It discusses who they are and why you should care. (more available) Added: January 25, 2019 The Q3 2017 Mobile Threat Landscape Report The third quarter of 2017 saw an increase in the number of malicious apps flooding the mobile marketplace, the continued issues of imitation and trojan apps in official app stores, and the emergence of the WireX mobile botnet. (more available) Added: January 25, 2019 The Q4 2017 Mobile Threat Landscape Report RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. The fourth quarter of 2017 showed a 37 percent decrease in blocklisted apps over Q3. (more available) Added: January 25, 2019 Indicators of Attack Versus Indicators of Compromise Based on extensive use of CrowdStrike’s next generation endpoint protection platform to detect and prevent sophisticated attacks against large organizations, CrowdStrike’s in house team of security experts, adversary hunters, intelligence analysts and incident responders have pooled their knowledge to produce this valuable guidebook and checklist for proactively enhancing your corporate information security procedures while avoiding common mistakes and pitfalls. (more available) Added: January 1, 2019 «« « 1 2 3 … 8 » »»
Q4 2019 Malware Trends This report outlines happenings in malware attacks for the last 3 months of 2019. In general, it says malware attacks died down this quarter. (more available) Added: March 29, 2020
Cisco 2018 Annual Cyber Security Report: At-a-Glance - Cloud Security A focused subset of Cisco’s 2018 full Cyber Security Report, focusing on cloud security practices. Added: February 17, 2020
Economic Value of DNS Security Using data from the Verizon DBIR and other sources, this report reviews the value of DNS in overall organizational security. Added: November 25, 2019
Overwatch 2019 mid-year report An analysis of threat actors and key action patterns based upon CrowdStrike’s threat hunting human analyst team over the first half of 2019. (more available) Added: November 25, 2019
Fortinet Quarterly Threat Landscape Report Q1 2019 This is a quarterly publication from Fortinet that looks at how the threat landscape has changed in the first quarter of 2019. (more available) Added: October 1, 2019
State of the Internet: Media Under Assault From the report, “From January 2018 through June 2019, Akamai recorded more than 61 billion credential stuffing attempts and more than 4 billion web application attacks. (more available) Added: September 18, 2019
Threat Insights Report - July 2019 The Bromium Threat Insights Report is updated on a regular basis to track notable threats and the information gleaned from them. (more available) Added: September 18, 2019
Healthcare's Legacy Infrastructure Of Unmanaged Devices Exposes A Vulnerable Attack Surface This specialized report offers insights into the Healthcare industry and the gaps in policies and procedures that could lead to damaging cyber events within the industry. (more available) Added: May 18, 2019
Military and Security Developments Involving the People's Republic of China 2019 A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2000, as Amended Added: May 18, 2019
Everything You Always Wanted To Know About Security At The Edge, But Were Afraid To Ask Akamai provides a thorough report to educated the industry on the attacks that are growing, evolving, and becoming more sophisticated. Added: April 4, 2019
Beginner's Guide to Brute Force & DDoS Attacks This report offers advice for what to do when the barbarians are at your door… Added: February 27, 2019
The Increased Risk Of Cyberattacks Against Manufacturing Organizations: 2018 Spotlight Report This report offers insight into cyberattack behavior in the manufacturing industry. It discusses the severity of attacks, botnets, and other important issues related to the manufacturing industry. (more available) Added: February 7, 2019
The Hidden Threat Of Cyberattacks In The Energy And Utilities Industry: 2018 Spotlight Report This report offers research on analysis and lifecycle of an attack on critical infrastructure. It discusses command and control, internal reconnaissance, lateral movement, and targeting the ICS and SCADA infrastructure. (more available) Added: February 7, 2019
Kovter the Click-Fraud Fileless Malware This report includes detailed technical information discovered during our analysis of the forensics artifacts collected from the affected systems by the AIR Module. (more available) Added: February 6, 2019
Anatomy Of An Attack: Iranian Nation State Interdiction This report offers deep insight into the threat actor known as Oilrig. Added: February 6, 2019
BluVector Threat Report Q3 2018 From the report, “Trojans are still winning. Out of the 12 Threat Reports over Q3, six were trojans. While the results from the Threat Report quarterly from Q2 2018 were pretty even in terms of the volume of threats being spread out between APTs, ransomware and trojans, Q3 2018 showcased the depth and breadth of trojan diversity and malicious innovation. (more available) Added: February 5, 2019
The Top 5 Retail Point-of-Sale Cyberthreats On an ongoing basis, Visa tracks global breach trends affecting retailers and other merchants. In 2017, research confirmed that the U. (more available) Added: January 31, 2019
APT Group Profile: OilRig This report offers insight into OilRig an Iranian-linked Advanced Persistent Threat. It discusses who they are and why you should care. (more available) Added: January 25, 2019
The Q3 2017 Mobile Threat Landscape Report The third quarter of 2017 saw an increase in the number of malicious apps flooding the mobile marketplace, the continued issues of imitation and trojan apps in official app stores, and the emergence of the WireX mobile botnet. (more available) Added: January 25, 2019
The Q4 2017 Mobile Threat Landscape Report RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. The fourth quarter of 2017 showed a 37 percent decrease in blocklisted apps over Q3. (more available) Added: January 25, 2019
Indicators of Attack Versus Indicators of Compromise Based on extensive use of CrowdStrike’s next generation endpoint protection platform to detect and prevent sophisticated attacks against large organizations, CrowdStrike’s in house team of security experts, adversary hunters, intelligence analysts and incident responders have pooled their knowledge to produce this valuable guidebook and checklist for proactively enhancing your corporate information security procedures while avoiding common mistakes and pitfalls. (more available) Added: January 1, 2019