Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Credentials

Below you will find reports with the tag of “Credentials”

image from How To Stop Fraud With The Resources You Have

How To Stop Fraud With The Resources You Have

This is a handy guide to fraud protection management.

Added: October 21, 2018
image from Identity Theft In America

Identity Theft In America

This report provides an overlook at Identity Theft in America and how it can be prevented.

Added: October 21, 2018
image from Increasing Identity Security Without Increasing User Disruptions: A Case For Adaptive Authentication

Increasing Identity Security Without Increasing User Disruptions: A Case For Adaptive Authentication

Read this paper to understand: How attackers compromise organizations, How you can more quickly detect attackers, How you can increase security without disrupting users

(more available)
Added: October 21, 2018
image from Mobile Wi-Fi Security Report

Mobile Wi-Fi Security Report

This report is designed to inform you of the many dangers of Wi-Fi, and how to deal with them.

Added: October 21, 2018
image from New Australian Data Breach Legislation: Guide To Auditing And Securing Your Business

New Australian Data Breach Legislation: Guide To Auditing And Securing Your Business

This report provides insight into Australian Data Breach Protocol.

Added: October 21, 2018
image from Prevent Healthcare Data Breaches With Indentity Management

Prevent Healthcare Data Breaches With Indentity Management

Learn how Single Sign-On and identity management can be used for the healthcare industry. In 2016 alone, over 15 million medical records were stolen due to data breaches. The risks associated with security and identity management are higher in healthcare than any other industry.

(more available)
Added: October 21, 2018
image from Remote Control Interloper:Analyzing New Chinese htpRAT Malware Attacks Against ASEAN

Remote Control Interloper:Analyzing New Chinese htpRAT Malware Attacks Against ASEAN

This report discusses a new kind of Remote Access Trojan at use in ASIA, and looks at its connection with the Chinese Government.

(more available)
Added: October 21, 2018
image from State of the Internet - Security Q1 2017 report

State of the Internet - Security Q1 2017 report

This paper represents analysis and research based on data from Akamai’s global infrastructure and routed Distributed Denial of Service (DDoS) solution.

(more available)
Added: October 21, 2018
image from Stop Advanced Automated Attacks That Go Undetected

Stop Advanced Automated Attacks That Go Undetected

If you are interested in looking about Bots that go undetected, this paper is for you.

Added: October 21, 2018
image from Technical Analysis Report On Rowdy, A New Type Of IOT Malware Exploiting STB's

Technical Analysis Report On Rowdy, A New Type Of IOT Malware Exploiting STB's

This report offers a breakdown and analysis of the actions and behaviors of Rowdy, a new type of IoT Malware.

(more available)
Added: October 21, 2018
image from The Business Of Hacking

The Business Of Hacking

This paper will explore the business of hacking: the different ways people make money by hacking, the motivations, the organization. It will break down the businesses’ profitability and risk levels, and provide an overall SWOT analysis. From this, opportunities for disruption will be discussed and a competitive approach for disrupting the business of hacking will be laid out.

(more available)
Added: October 21, 2018
image from Threat Advisory: Thomas Cook (India) Ltd. Mobile Apps And Website

Threat Advisory: Thomas Cook (India) Ltd. Mobile Apps And Website

This is a threat advisory for Thomas Cook Ltd. Mobile Apps & Website

Added: October 21, 2018
image from What iOS11 Means To The Enterprise

What iOS11 Means To The Enterprise

This report offers insight into iOS11 and how Apple technology is providing useful resources to enterprises that are moving away from PC’s.

(more available)
Added: October 21, 2018
image from Blockchain Threat Report

Blockchain Threat Report

This report discusses the security concerns that have arisen about the new technology, blockchain.

Added: October 20, 2018
image from Building Technology Infrastructure For Learning

Building Technology Infrastructure For Learning

This report from the Department Of Education provides insight into good technoglogy infrastructure for educational purposes.

Added: October 20, 2018
image from DDoS Threat Report Q3 2016

DDoS Threat Report Q3 2016

This report takes a look at the DDoS threats that occurred in the third quarter of 2016.

Added: October 20, 2018
image from Eavesdropper: How A Mobile Developer Error Is Exposing Millions Of Conversations

Eavesdropper: How A Mobile Developer Error Is Exposing Millions Of Conversations

This report focuses the vulnerability that they call “Eavesdropper.” The Eavesdropper vulnerability is due to the hardcoding of credentials in mobile apps that are using the Twilio Rest API as well as some using the Twilio SDK. This vulnerability exposes massive amounts of current and historic data, including sensitive call and messaging data.

(more available)
Added: October 20, 2018
image from German Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In German Cities

German Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In German Cities

This paper takes a look at the cities of Germany, and the cyber threats that occurred there.

Added: October 20, 2018
image from Global Advanced Threat Landscape Survey 2016

Global Advanced Threat Landscape Survey 2016

The 10th annual CyberArk Global Advanced Threat Landscape Survey 2016, themed “Cyber Security: Past, Present & Future,” examines whether global enterprises are learning and applying lessons as a result of years of highly publicized cyber attacks, and how security priorities and decision making are being impacted.

(more available)
Added: October 20, 2018
image from JWT Handbook

JWT Handbook

Ever wondered how JWT came to be and what problems it was designed to tackle? Are you curious about the plethora of algorithms available for signing and encrypting JWTs? Or are you interested in getting up-to-speed with JWTs as soon as possible? Then this handbook is for you.

(more available)
Added: October 20, 2018
image from March 2018 AppSec Intelligence Report

March 2018 AppSec Intelligence Report

This monthly report details Application Security obvservations from March 2018.

Added: October 20, 2018
  • ««
  • «
  • 19
  • 20
  • 21
  • 22
  • 23
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 00:08 UTC (build b1d7be4)