Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

C2

Below you will find reports with the tag of “C2”

image from Overwatch 2019 mid-year report

Overwatch 2019 mid-year report

An analysis of threat actors and key action patterns based upon CrowdStrike’s threat hunting human analyst team over the first half of 2019.

(more available)
Added: November 25, 2019
image from Fortinet Quarterly Threat Landscape Report Q1 2019

Fortinet Quarterly Threat Landscape Report Q1 2019

This is a quarterly publication from Fortinet that looks at how the threat landscape has changed in the first quarter of 2019.

(more available)
Added: October 1, 2019
image from State of the Internet: Media Under Assault

State of the Internet: Media Under Assault

From the report, “From January 2018 through June 2019, Akamai recorded more than 61 billion credential stuffing attempts and more than 4 billion web application attacks. In this special edition of the State of the Internet / Security Report, we’re focusing on data within the high tech, video media, and entertainment sectors — collectively named Media & Technology.”

(more available)
Added: September 18, 2019
image from Threat Insights Report - July 2019

Threat Insights Report - July 2019

The Bromium Threat Insights Report is updated on a regular basis to track notable threats and the information gleaned from them.

(more available)
Added: September 18, 2019
image from Healthcare's Legacy Infrastructure Of Unmanaged Devices Exposes A Vulnerable Attack Surface

Healthcare's Legacy Infrastructure Of Unmanaged Devices Exposes A Vulnerable Attack Surface

This specialized report offers insights into the Healthcare industry and the gaps in policies and procedures that could lead to damaging cyber events within the industry.

(more available)
Added: May 18, 2019
image from Military and Security Developments Involving the People's Republic of China 2019

Military and Security Developments Involving the People's Republic of China 2019

A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2000, as Amended

Added: May 18, 2019
image from Everything You Always Wanted To Know About Security At The Edge, But Were Afraid To Ask

Everything You Always Wanted To Know About Security At The Edge, But Were Afraid To Ask

Akamai provides a thorough report to educated the industry on the attacks that are growing, evolving, and becoming more sophisticated.

(more available)
Added: April 4, 2019
image from Beginner's Guide to Brute Force & DDoS Attacks

Beginner's Guide to Brute Force & DDoS Attacks

This report offers advice for what to do when the barbarians are at your door…

Added: February 27, 2019
image from The Increased Risk Of Cyberattacks Against Manufacturing Organizations: 2018 Spotlight Report

The Increased Risk Of Cyberattacks Against Manufacturing Organizations: 2018 Spotlight Report

This report offers insight into cyberattack behavior in the manufacturing industry. It discusses the severity of attacks, botnets, and other important issues related to the manufacturing industry.

(more available)
Added: February 7, 2019
image from The Hidden Threat Of Cyberattacks In The Energy And Utilities Industry: 2018 Spotlight Report

The Hidden Threat Of Cyberattacks In The Energy And Utilities Industry: 2018 Spotlight Report

This report offers research on analysis and lifecycle of an attack on critical infrastructure. It discusses command and control, internal reconnaissance, lateral movement, and targeting the ICS and SCADA infrastructure.

(more available)
Added: February 7, 2019
image from Kovter the Click-Fraud Fileless Malware

Kovter the Click-Fraud Fileless Malware

This report includes detailed technical information discovered during our analysis of the forensics artifacts collected from the affected systems by the AIR Module. The report provides detailed information about the key processes used by AIR to review the malicious activity and detect the infection quickly. We also break down the encoding techniques, the registry operation, and the protection and communication mechanisms used by Kovter.

(more available)
Added: February 6, 2019
image from Anatomy Of An Attack: Iranian Nation State Interdiction

Anatomy Of An Attack: Iranian Nation State Interdiction

This report offers deep insight into the threat actor known as Oilrig.

Added: February 6, 2019
image from BluVector Threat Report Q3 2018

BluVector Threat Report Q3 2018

From the report, “Trojans are still winning. Out of the 12 Threat Reports over Q3, six were trojans. While the results from the Threat Report quarterly from Q2 2018 were pretty even in terms of the volume of threats being spread out between APTs, ransomware and trojans, Q3 2018 showcased the depth and breadth of trojan diversity and malicious innovation.”

(more available)
Added: February 5, 2019
image from The Top 5 Retail Point-of-Sale Cyberthreats

The Top 5 Retail Point-of-Sale Cyberthreats

On an ongoing basis, Visa tracks global breach trends affecting retailers and other merchants. In 2017, research confirmed that the U.S. and Europe were the top two regions for payment data breaches. This report offers insight specific to Visa and their unique due diligence in the cyber threat universe.

(more available)
Added: January 31, 2019
image from APT Group Profile: OilRig

APT Group Profile: OilRig

This report offers insight into OilRig an Iranian-linked Advanced Persistent Threat. It discusses who they are and why you should care.

(more available)
Added: January 25, 2019
image from The Q3 2017 Mobile Threat Landscape Report

The Q3 2017 Mobile Threat Landscape Report

The third quarter of 2017 saw an increase in the number of malicious apps flooding the mobile marketplace, the continued issues of imitation and trojan apps in official app stores, and the emergence of the WireX mobile botnet. In this report, they’ll give an overview of these mobile threats, as well as emerging trends they anticipate will be prevalent in Q4 and beyond to help you protect yourself and your customers.

(more available)
Added: January 25, 2019
image from The Q4 2017 Mobile Threat Landscape Report

The Q4 2017 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. The fourth quarter of 2017 showed a 37 percent decrease in blocklisted apps over Q3. Key threat trends include brand imitation, phishing, malware, and bankbot attacks on cryptocurrency users.

(more available)
Added: January 25, 2019
image from Indicators of Attack Versus Indicators of Compromise

Indicators of Attack Versus Indicators of Compromise

Based on extensive use of CrowdStrike’s next generation endpoint protection platform to detect and prevent sophisticated attacks against large organizations, CrowdStrike’s in house team of security experts, adversary hunters, intelligence analysts and incident responders have pooled their knowledge to produce this valuable guidebook and checklist for proactively enhancing your corporate information security procedures while avoiding common mistakes and pitfalls.

(more available)
Added: January 1, 2019
image from Beyond Malware: Detecting The Undetectable

Beyond Malware: Detecting The Undetectable

This report discusses a key issue in a Malware-centric defense approach; it will leave you vulnerable to attacks that don’t leverage malware. Read on to learn more.

(more available)
Added: January 1, 2019
image from Intelligence Report: CSIR-18004 Nigerian Confraternities Emerge

Intelligence Report: CSIR-18004 Nigerian Confraternities Emerge

This paper discuses a particular Business Email Compromise that has appeared out of Nigeria.

Added: January 1, 2019
image from Modern Bank Heists: Cyberattacks & Lateral Movement in the Financial Sector

Modern Bank Heists: Cyberattacks & Lateral Movement in the Financial Sector

In this survey of 40 CISO’s from major financial institutions, revealed trends in lateral movement, counter incident response, integrity attacks and the most concerning threat actors organizations face.

(more available)
Added: January 1, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)