Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Credentials

Below you will find reports with the tag of “Credentials”

image from Under The Hoodie: Lessons From A Season Of Penetration Testing

Under The Hoodie: Lessons From A Season Of Penetration Testing

This report offers insight from the research and results of Rapid7’s repeated penetration testing.

Added: October 17, 2018
image from What About The Plant Floor: Six Subversive Concerns For Industrial Environments

What About The Plant Floor: Six Subversive Concerns For Industrial Environments

This paper describes six key weaknesses that an adversary can use to undermine a plant’s operation, providing real-life threat details and mitigation options.

(more available)
Added: October 17, 2018
image from 2017 Quarterly Threat Report Q2

2017 Quarterly Threat Report Q2

This report takes a look at the cyber threats that took place in the 2nd Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 16, 2018
image from A Quick History Of IoT Botnets

A Quick History Of IoT Botnets

Here is a short report on the history of IoT Botnets.

Added: October 16, 2018
image from Cybercrime And Other Threats Faced By The Healthcare Industry

Cybercrime And Other Threats Faced By The Healthcare Industry

In this paper they discuss several aspects of the healthcare threat surface.

Added: October 16, 2018
image from ERP Applications Under Fire: How CyberAttackers Target The Crown Jewels

ERP Applications Under Fire: How CyberAttackers Target The Crown Jewels

This report is the result of joint research performed by Digital Shadows and Onapsis, aimed to provide insights into how the threat landscape has been evolving over time for ERP applications.

(more available)
Added: October 16, 2018
image from GDPR Advisory #2: Detecting And Responding Rapidly To Personal Data Breaches

GDPR Advisory #2: Detecting And Responding Rapidly To Personal Data Breaches

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 16, 2018
image from GTIC Monthly Threat Report February 2018

GTIC Monthly Threat Report February 2018

This monthly threat report takes a look at the month of February 2018. Specifically, it looks at how Agent Tesla works, cryptocurreny malware, ransomware’s refusal to die, and Turla APT updating their malware after public advisories.

(more available)
Added: October 16, 2018
image from Quarterly Threat Report:Fourth Quarter 2017

Quarterly Threat Report:Fourth Quarter 2017

This is Rapid7’s Quarterly Threat Report. In this report they wrap up the cyber events from the year 2017 and lay out some thoughts on what is ahead in 2018.

(more available)
Added: October 16, 2018
image from Security Response: The Apple Threat Landscape

Security Response: The Apple Threat Landscape

This report examines the weaknesses in Apple products and the growing trend of attacks on the Apple system.

Added: October 16, 2018
image from Six Best Practices For Securing Amazon Web Service

Six Best Practices For Securing Amazon Web Service

This paper offers some solutions to the best practices for securing Amazon Web Services.

Added: October 16, 2018
image from State of Software Security Volume 8

State of Software Security Volume 8

In this, the eighth volume of this report, they present metrics that are based on real application risk postures, drawn from code-level analysis of nearly 250 billion lines of code across 400,000 assessmnets performed over a period of 12 months between April 1, 2016 and March 31, 2017.

(more available)
Added: October 16, 2018
image from Threat Advisory: Lycos Mail

Threat Advisory: Lycos Mail

This ia a threat advisory for Lycos Mail

Added: October 16, 2018
image from Top Threats To Cloud Computing: Deep Dive

Top Threats To Cloud Computing: Deep Dive

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the top threat’s for its foundation. Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations. They encourage architects and engineers to use this information as a starting point for their own analysis and comparisons.

(more available)
Added: October 16, 2018
image from Tracking Trends In Business Email Compromise

Tracking Trends In Business Email Compromise

This report takes a look at Business Email Compromise attacks and examines why the FBI was able to report that it has become a billion dollar industry.

(more available)
Added: October 16, 2018
image from Underground Hacker Markets

Underground Hacker Markets

For our 3rd Annual Underground Hacker Markets Report, Dell SecureWorks engaged two of our top intelligence analysts from our CISO INTEL Team. The team members spend time tracking hackers on the numerous underground hacker forums and marketplaces all over the world. While much of the cybercrime hitting organizations throughout the world is the result of cooperation by hackers working outside the confines of publicly-accessible marketplaces, these underground forums provide a small window into the world cybercriminals occupy. In this report, we concentrated on marketplaces located on the Russian Underground and on English-speaking marketplaces between Q3 2015 and Q1 2016.

(more available)
Added: October 16, 2018
image from "VPN Filter" Botnet: A Sophoslabs Analysis

"VPN Filter" Botnet: A Sophoslabs Analysis

This report provides a technical investigation of the malicious components involved in the attack that infected over 500,000 routers and network storage devices.

(more available)
Added: October 15, 2018
image from 2015 Data Breach Industry Forecast

2015 Data Breach Industry Forecast

To help businesses understand implications of such changes and navigate the road ahead, Experian Data Breach Resolution has developed six key predictions about how the data breach industry will evolve in 2015. These predictions are based on experience helping more than 3,000 companies manage breaches of all types in 2014 and conversations with leaders across the security landscape. With this mindset, they also looked back at how our 2014 predictions played out.

(more available)
Added: October 15, 2018
image from 2015 Threat Report

2015 Threat Report

The report introduces the Chain of Compromise as an analytical concept to help readers, particularly those working in cyber security and information technology roles, understand how attackers compromise security using different combinations of tactics and resources. Some of 2015’s most prominent threats, such as exploit kits, ransomware, and DNS hijacks, are discussed in relation to this model, demonstrating how users become compromised by modern cyber attacks.

(more available)
Added: October 15, 2018
image from 2017 Call Center Fraud Report

2017 Call Center Fraud Report

This report will provide insights about the depth and breadth of fraud activity across a variety of industries from a data set of more than half a billion calls.

(more available)
Added: October 15, 2018
image from 2017 Global Security Report

2017 Global Security Report

This annual report takes a look at the security events of 2017 and projects what is to come in 2018.

(more available)
Added: October 15, 2018
  • ««
  • «
  • 23
  • 24
  • 25
  • 26
  • 27
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 12:08 UTC (build b1d7be4)