Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Criminal Group

Below you will find reports with the tag of “Criminal Group”

image from Why consumers don’t understand card fraud…

Why consumers don’t understand card fraud…

To understand how consumers felt about card fraud against this changing landscape, we surveyed 4,000 consumers across the U.S. and the U.K. (on February 16 and 17, using Propeller Insights) to get a sense of how impacted they’d been, how concerned they were, and how they wanted their banks, financial services, providers and card issuers to respond to this growing threat.

(more available)
Added: May 11, 2020
image from 2020 Global Identity and Fraud Report

2020 Global Identity and Fraud Report

Experian’s 2020 Global Identity & Fraud Report explores inconsistencies between businesses’ views of their ability to meet their customers’ needs, and customer experiences with those businesses. It also underscores the opportunity for companies like yours to differentiate from the competition through the ways you engage with customers, with emphasis on how you identify and recognise them each time they interact with your business. Experian appreciates that many companies find it challenging to evolve traditional business models in order to meet the expectations of ‘always-on’ customers. But we also believe that customers’ identity verification and ongoing recognition (re-recognition) can be driving forces for greatly improved and more profitable customer relationships.

(more available)
Added: May 8, 2020
image from 100 Days of Coronavirus

100 Days of Coronavirus

This report focuses on the changes in security threats and the effect that COVID-19 has on the overall landscape.

Added: May 8, 2020
image from Untangling the Web of Cloud Security Threats

Untangling the Web of Cloud Security Threats

As more organizations move to the cloud and public cloud platforms gain more users and offer more services, cybercriminals will find ways to launch attacks and profit from compromise. As we’ve demonstrated in this research, misconfiguration in cloud services opens an organization to risks like cryptojacking, e-skimming, and data exfiltration. Container technologies in the cloud, when exposed, also pose similar risks. Finally, mismanagement of credentials and other secrets have costs that can grow as threats move across the cloud stack.

(more available)
Added: May 8, 2020
image from 2020 Global State of Least Privilege Cyber Security

2020 Global State of Least Privilege Cyber Security

Applying the principle of least privilege should be a foundational element of any organization’s cyber security strategy. However, a sustainable least privilege strategy isn’t something that can be set up overnight. It takes planning, collaboration, and the right tools to meet the needs of security, IT, desktop support, and users.

(more available)
Added: May 8, 2020
image from 2019 TLS Telemetry Report

2019 TLS Telemetry Report

Overview of deployment of TLS encryption in the general internet and Alex Top 1000 sites.

Added: April 17, 2020
image from Dark Commerce: Exploring the Cybercrime Industry and it's Business Models

Dark Commerce: Exploring the Cybercrime Industry and it's Business Models

This report, the first in a series from Blueliv offering an overview of cybercrimeindustry, detailed some features of a rapidly growing cybercriminal serviceseconomy. We first covered the first elements in a process, from acquiringand preparing malicious code for use in a campaign, prior to setting upthe infrastructure to deliver the ‘product’ to its victims.

(more available)
Added: April 5, 2020
image from Bot Baseline: Fraud in Digital Advertising

Bot Baseline: Fraud in Digital Advertising

For the fourth time, White Ops and the ANA have partnered to measure bot fraud in the digital advertising ecosystem. Previous studies measured bot fraud in the digital advertising ecosystem in August/September 2014, August/September 2015, and November/December 2016. This one studies November/December 2019.

(more available)
Added: March 15, 2020
image from The New Mafia: Gangs and Vigilantes

The New Mafia: Gangs and Vigilantes

This guide was constructed with insight from a global panel of Malwarebytes experts and external experts from a variety of disciplines. It also features a brief review of cybercrime history, the emergence of new participants and the impact on businesses and individuals.

(more available)
Added: February 18, 2020
image from 2019 Cyber Threatscape Report

2019 Cyber Threatscape Report

Accenture details trends in cyber threats in 2019. It narrows it down to five key features of the 2019 Trendscape: 1. New threats are occuring from technology evolution and disinformation. 2:Cybercriminals adapt, hustle, diversify, and are looking more like states. 3: hybrid motives pose new dangers of ransomware defense and response 4:Improved ecosystem hygiene is pushing threats to the supply chain

(more available)
Added: February 17, 2020
image from X-Force Threat Intelligence Index

X-Force Threat Intelligence Index

X-Force Incident Response and Intelligence Services (IRIS) compiled IBM Security software and security services analyses from the past year, which show that 2019 was a year of reemerging old threats being used in new ways.

(more available)
Added: February 14, 2020
image from Cloud Threat Report: Putting the Sec in DevOps

Cloud Threat Report: Putting the Sec in DevOps

2020 edition of the Unit 42 Cloud Threat Report, ourteam of elite cloud threat researchers focused theirattention on the practices of DevOps. The research aimedto uncover where cloud vulnerabilities are surfacing.DevOps teams are shortening the time to productionusing infrastructure as code (IaC) templates. But the IaCtemplates themselves are not the issue. It’s the flawedprocess by which they are being created.

(more available)
Added: February 14, 2020
image from Cybercrime Tactics and Techniques: The 2019 State of Healthcare

Cybercrime Tactics and Techniques: The 2019 State of Healthcare

In this special CTNT report on healthcare, wefocus on the top threat categories and familiesthat plagued the medical industry over the lastyear, as well as the most common attack methodsused by cybercriminals to penetrate healthcaredefenses. In addition, we highlight the securitychallenges inherent to organizations, from smallprivate practices to enterprise health maintenanceorganizations (HMOs), as well as the reasons whyhackers look to infiltrate their defenses. Finally,we look ahead to future biotech innovations andthe need to consider security in their design andimplementation.

(more available)
Added: February 12, 2020
image from 2019 Email Threat Survey Report Europe Under Siege

2019 Email Threat Survey Report Europe Under Siege

Agari recently surveyed 305 senior European IT security professionals to better understand the region’s email threat landscape from the perspective of those fighting on the front lines against business email compromise (BEC), spear phishing, and other targeted email attacks. What emerges is a snapshot of a continent plagued by frictionless email scams that evade technical security controls and successfully hack the human psyche.

(more available)
Added: February 9, 2020
image from LexisNexis Risk Solutions Cybercrime Report

LexisNexis Risk Solutions Cybercrime Report

The LexisNexis® Risk Solutions Cybercrime Report is based on cybercrime attacks detected by the LexisNexis® Digital Identity Network® from January – June 2019, during real-time analysis. It covers the digital identity network, and attacks on “high-risk” transactions.

(more available)
Added: February 9, 2020
image from 2020 Sonicwall Cyber Threat Report

2020 Sonicwall Cyber Threat Report

Sonicwall outlines the changes in the threat landscape in 2020 for companies to utilize.

Added: February 6, 2020
image from How Lucrative are Vulnerabilities? A Closer Look at the Economics of the Exploit Supply Chain

How Lucrative are Vulnerabilities? A Closer Look at the Economics of the Exploit Supply Chain

this report t explores the vulnerability-to-exploit (V2E) cybercrime and cybersecurity supply chain, outlines the players in the different market segments and provides insights into the related economic drivers.

(more available)
Added: November 26, 2019
image from Fortinet Quarterly Threat Landscape Report Q1 2019

Fortinet Quarterly Threat Landscape Report Q1 2019

This is a quarterly publication from Fortinet that looks at how the threat landscape has changed in the first quarter of 2019.

(more available)
Added: October 1, 2019
image from Fortinet Quarterly Threat Landscape Report Q2 2019

Fortinet Quarterly Threat Landscape Report Q2 2019

This is quarterly publication from Fortinet that looks in the current cyber security threats from April 1 to July 1.

(more available)
Added: October 1, 2019
image from The Underground Economy

The Underground Economy

This report compiles information gained by the Trustwave SpiderLabs who maintain a presence in some of the more prominent recess of the online criminal underground. The provide information on the dark web’s code of honor, reputation systems, job market, and techniques used by cybercriminals to hide their tracks from law enforcement.

(more available)
Added: September 18, 2019
image from The Economics of Penetration Testing for Web Application Security

The Economics of Penetration Testing for Web Application Security

This white paper describes the critical role of pen testing for web applications. It explores the economics of “classic” pen testing and considers a variety of unseen costs and points of diminishing value. The paper concludes by describing a next-generation hybrid applicationsecurity-testing-as-a-service and how it can help bring the flexibility in applying both automated app testing tools (DAST) and the human expertise of ethical hackers (pen testing) to this challenge.

(more available)
Added: September 18, 2019
  • ««
  • «
  • 8
  • 9
  • 10
  • 11
  • 12
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 08:08 UTC (build b1d7be4)