Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Credentials

Below you will find reports with the tag of “Credentials”

image from Bulletproof Annual Cyber Security Industry Report 2020

Bulletproof Annual Cyber Security Industry Report 2020

Drawing from their managed SIEM, vulnerability scanning, and penetration testing practices, this report covers the key threat and compliance challenges over the 2019 calendar year.

(more available)
Added: October 19, 2020
image from Bulletproof Annual Cyber Security Report 2019

Bulletproof Annual Cyber Security Report 2019

Drawing from their managed SIEM, vulnerability scanning, and penetration testing services, this report reviews the key trends from the 2018 calendar year.

(more available)
Added: October 19, 2020
image from Zerologon: Unauthenticated Domain Controller Compromise by Subverting Netlogon Cryptography (CVE-2020-1472)

Zerologon: Unauthenticated Domain Controller Compromise by Subverting Netlogon Cryptography (CVE-2020-1472)

This whitepaper explains a new vulnerability in Windows Server that is highly exploitable.

Added: October 18, 2020
image from Web Application Vulnerability Report 2020

Web Application Vulnerability Report 2020

A review of web application vulnerabilities as seen through Acuentix’s web scans between March 2019 and February 2020.

Added: September 30, 2020
image from Threat Landscape for Industrial Automation Systems H1 2020

Threat Landscape for Industrial Automation Systems H1 2020

This report from Kaspersky explains changes in the threat landscape for industrial automation systems for the first half of 2020. It goes in detail on the variety of malware, the main threat sources, regional differences, and more.

(more available)
Added: September 25, 2020
image from State of the Internet: Security Report: Volume 6, Issue 2 - Gaming

State of the Internet: Security Report: Volume 6, Issue 2 - Gaming

Using Akamai’s global visibility and content delivery networks, this report covers the security threats present in the gaming industry. An exploration of how gamers are a growing lucrative target for criminals, including methods, geography, and recommendations.

(more available)
Added: September 23, 2020
image from State of Cybersecurity Industry Exposure at Dark Web

State of Cybersecurity Industry Exposure at Dark Web

This research purports to help better understand the emerging risks and modern threat landscape both in qualitative and quantitative aspects, and to help cybersecurity companies better prioritize and address emerging cyber risks.

(more available)
Added: September 8, 2020
image from Third-Party Security Signals: Exposing the reality of unsafe network services

Third-Party Security Signals: Exposing the reality of unsafe network services

Using RiskRecon’s telemetry of the public risk surface of thousands of organizations, this report takes a look at services which are commonly viewed as unsafe. The prevalence and co-occurrence of these services is used as a indicator of other hygiene and risk indicators at firms.

(more available)
Added: September 2, 2020
image from 2020 State of the Software Supply Chain

2020 State of the Software Supply Chain

Now in its sixth year, Sonatype’s State of the Software Supply Chain Report continues to examine measurable practices of secure open source software development and delivery.

(more available)
Added: September 1, 2020
image from More Evidence of APT Hackers-for-Hire Used for Industrial Espionage

More Evidence of APT Hackers-for-Hire Used for Industrial Espionage

Bitdefender researchers recently investigated a sophisticated APT-style cyberespionage attack targeting aninternational architectural and video production company, pointing to an advanced threat actor and a South Korean based C&C infrastructure. This report goes in-depth on this attack.

(more available)
Added: September 1, 2020
image from Under the Hoodie 2019

Under the Hoodie 2019

A review of 180 engagements performed by Rapid7 consulting, supplemented by a survey of questions given to all Rapid7 consulting customers. Addresses lessons learned from this events.

(more available)
Added: August 28, 2020
image from Under the Hoodie 2020

Under the Hoodie 2020

A review of lessons learned over the past year from Rapid7’s penetration testing services. Combined with survey day on social engineering and red team simulations of 206 engagements.

(more available)
Added: August 28, 2020
image from Enduring from home

Enduring from home

A survey of 200 IT professionals on the readiness and impact of COVID-19 upon cyber security.

Added: August 20, 2020
image from Implementing Cloud Security Best Practices

Implementing Cloud Security Best Practices

This report covers findings from a survey conducted by Dimensional Research in July 2020. A total of 310 qualified individuals completed the survey.

(more available)
Added: August 17, 2020
image from 2020 Mid Year Report

2020 Mid Year Report

This mid year report covers publicly disclosed data breaches first reported between January 1, 2020 and June 30, 2020 and compares current observations to the same time period for prior years.

(more available)
Added: August 17, 2020
image from Overstimulating: CARES Act Fraud On the Deep and Dark Web

Overstimulating: CARES Act Fraud On the Deep and Dark Web

After the CARES act was passed in March of 2020, fraudsters worked towards making money off of it. This report seeks to understand all of the components of fraud happening on the dark web in relation to the CARES act.

(more available)
Added: July 29, 2020
image from Identity and Access Management Report

Identity and Access Management Report

A review of community members opinions on their prioritization for identity access management systems, the challenges implementing these solutions, and the desired capabilities when selecting IAM technologies.

(more available)
Added: July 27, 2020
image from Threat Intelligence Executive Report 2020 Vol. 1

Threat Intelligence Executive Report 2020 Vol. 1

The Threat Intelligence Executive Report by Secureworks is a report designed to analyze security threats and help organizations protect their systems. In this report, they look into Iranian espionage operations in 2020, Customized Magecart attacks, and China based threat groups targeting NGOs and Asian government networks.

(more available)
Added: July 8, 2020
image from Consumer Attitudes Toward Data Privacy Survey, 2018

Consumer Attitudes Toward Data Privacy Survey, 2018

This report by Akamai, sought to find out how much consumers trust companies. The study found that American consumers are very forgiving with companies that have access to their personal information.

(more available)
Added: June 29, 2020
image from Trouble at the Top: Why the C-Suite is the weakest link when it comes to cybersecurity

Trouble at the Top: Why the C-Suite is the weakest link when it comes to cybersecurity

A commissioned survey of 300 IT decision makers and 50 C-suite members on C-suite attitudes towards mobile device security attitudes.

(more available)
Added: June 22, 2020
image from Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

The inaugural report from AT&T Business. Leverages data from the AT&T network operations groups as well as outside research firms and network partners.

(more available)
Added: June 13, 2020
  • ««
  • «
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)