Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Criminal Group

Below you will find reports with the tag of “Criminal Group”

image from Global Fraud Attack Index: Second Quarter 2016

Global Fraud Attack Index: Second Quarter 2016

Forter and PYMNTS.com partnered together to track, analyze and report on the important trends happening in the world of fraud as it relates to payments and commerce online. Every quarter we will monitor how fraud attempts, reflected as a percent of U.S. sales transactions, on U.S. merchant websites are trending. Up? Down? Stable? Time to panic? Hopefully not.

(more available)
Added: February 13, 2019
image from 2016 The Forter/MRC Fraud Attack Index

2016 The Forter/MRC Fraud Attack Index

From the report, “Overall, 2016 saw a steady rise in online fraud attack rate, which increased 8.9% over the course of the year. The frightening “tsunami” of fraud attempts that many merchants experienced at the end of 2015 was not repeated, but the moderate rate of increase was sustained. For several industries, primarily apparel, digital goods and travel, 2016 was a year of dramatic fluctuations, affected by numerous fraudsters who were looking for new vulnerabilities they can exploit.” Read on to find out more.

(more available)
Added: February 13, 2019
image from Profile of A Fraudster

Profile of A Fraudster

This report offers insight into 6 different fraud profiles in the online world.

Added: February 13, 2019
image from Fraud Attack Index Fifth Edition

Fraud Attack Index Fifth Edition

From the report, “As such, Forter creates a biannual Fraud Attack Index to highlight these changes as they affect e-commerce and mobile merchants and to provide anti-fraud professionals with the context they need to succeed. This report leverages Forter’s data to examine the trends in online fraud attacks across industries, comparing the different fraud experienced by different verticals. The report also looks at the prevalence of specific fraud methods or directions of attack (e.g. location manipulation, botnets, etc.). This is to provide insights into the various techniques commonly employed by today’s cunning fraudsters.” Read on to find out more.

(more available)
Added: February 13, 2019
image from The Future Is Now: Q1 2018 Fraud Trends Report

The Future Is Now: Q1 2018 Fraud Trends Report

From the report, “This report shares Feedzai’s original research. We found that fraudsters are attacking in methods that are faster and faster – and continuously new. The time horizon for the future of fraud has been shrinking. Today, the time horizon has shrunk to now. What does this new now look like?” Read on to find out more.

(more available)
Added: February 13, 2019
image from The Dawn Of Machine Learning For Banking And Payments

The Dawn Of Machine Learning For Banking And Payments

From the report, “The advent of big data happened to coincide with the advent of better computing, better algorithms, and new AI-focused organizations, allowing us to take this data and turn it into something even better: meaning. This brings us to machine learning. Later in this guide, we’ll look at how machine learning works and how it can work for you. But first, let’s take a closer look at all the ingredients that got us here.” Read on to learn more.

(more available)
Added: February 13, 2019
image from From Login to Logout: Continuous Authentication with Behavioral Biometrics

From Login to Logout: Continuous Authentication with Behavioral Biometrics

This report offers insight into authentication. It discusses some key problems with various standard authentication processes and highlights ways that authentication can be improved.

(more available)
Added: February 13, 2019
image from Behavioral Biometrics in a PSD2 World

Behavioral Biometrics in a PSD2 World

This report offers insight into the changes occurring in the financial services industry as relates to the revised Payment Services Directive (PSD2).

(more available)
Added: February 13, 2019
image from The Role Of Applicant Behavior In Identity Proofing

The Role Of Applicant Behavior In Identity Proofing

As account opening continues to transition from physical to digital channels, financial institutions, issuers, lenders, and other organizations must optimize the digital experience of applicants in order to compete. At the same time, fraud is on the rise as criminals have become more successful than ever, thanks to some of the same digital channel benefits enjoyed by consumers: convenience, speed, and ease of use. To achieve the necessary balance between preventing fraud and providing a delightful experience for consumers, an approach to identity proofing that accounts for the channel, product, customer, and threat environment is absolutely critical. But regardless of the approach, inconspicuous solutions — like those based on applicant behavior — have a distinct role to play in how institutions manage the risk of application fraud.

(more available)
Added: February 13, 2019
image from 7 Secrets Of Online Fraud

7 Secrets Of Online Fraud

This is a handy guide that provides information useful for understanding online fraud.

Added: February 13, 2019
image from Vulnerability And Threat Trends 2018 Mid-Year Update

Vulnerability And Threat Trends 2018 Mid-Year Update

This report examines trends in vulnerabilities, exploits and threats in order to better align your security strategy with the current threat landscape. Incorporating such intelligence to vulnerability management programs begins to put vulnerabilities in risk–based context and helps to focus remediation on vulnerabilities most likely to be used in an attack. This is an update to a report published in January 2018 to reflect mid–year trends. All statistics for 2018 reflect data from the first half of the year — January 1, 2018 through June 30, 2018.

(more available)
Added: February 12, 2019
image from 2019 Vulnerability And Threat Trends

2019 Vulnerability And Threat Trends

The 2019 Vulnerability and Threat Trends Report examines new vulnerabilities published in 2018, newly developed exploits, new exploit–based malware and attacks, current threat tactics and more. Such analysis helps to provide much needed context to the more than 16,000 vulnerabilities published in the previous year. The insights and recommendations provided are there to help align security strategies to effectively counter the current threat landscape. Incorporating such intelligence in vulnerability management programs will help put vulnerabilities in a risk based context and focus remediation on the small subset of vulnerabilities most likely to be used in an attack.

(more available)
Added: February 12, 2019
image from Post Grams Not Scams: Detecting Money Flipping Scams On Instagram Using Machine Learning

Post Grams Not Scams: Detecting Money Flipping Scams On Instagram Using Machine Learning

As more people become connected on social platforms, cyber criminals find themselves with more numerous and accessible potential targets than ever before. Over a 4 month period in 2015, the ZeroFOX Research Team built a machine learning classifier and identified thousands scams targeting major financial institutions and their customers across Instagram. The results of the study shine a light on a growing problem with serious impacts on financial institutions’ bottom lines.

(more available)
Added: February 7, 2019
image from Social Engineering In The Social Media Age: Top Fraudulent Account and Impersonator Tactics

Social Engineering In The Social Media Age: Top Fraudulent Account and Impersonator Tactics

Fraudulent accounts run rampant on social media. But what are they up to, what cyber attacks are they launching? ZeroFOX Research investigates 40,000 fake accounts to find out.

(more available)
Added: February 7, 2019
image from External Social And Digital Threats To Financial Institutions

External Social And Digital Threats To Financial Institutions

Social media has become a major platform for financial institutions to engage customers, grow their business, and promote offers and services. However, scammers and cybercriminals have adopted the platform as well, exploiting the low technical barriers, ease of target acquisition, ease of payload delivery, and broad access to potential victims.

(more available)
Added: February 7, 2019
image from The Increased Risk Of Cyberattacks Against Manufacturing Organizations: 2018 Spotlight Report

The Increased Risk Of Cyberattacks Against Manufacturing Organizations: 2018 Spotlight Report

This report offers insight into cyberattack behavior in the manufacturing industry. It discusses the severity of attacks, botnets, and other important issues related to the manufacturing industry.

(more available)
Added: February 7, 2019
image from The Hidden Threat Of Cyberattacks In The Energy And Utilities Industry: 2018 Spotlight Report

The Hidden Threat Of Cyberattacks In The Energy And Utilities Industry: 2018 Spotlight Report

This report offers research on analysis and lifecycle of an attack on critical infrastructure. It discusses command and control, internal reconnaissance, lateral movement, and targeting the ICS and SCADA infrastructure.

(more available)
Added: February 7, 2019
image from Attacker Behavior Industry Report: 2018 Black Hat Edition

Attacker Behavior Industry Report: 2018 Black Hat Edition

The Black Hat Edition of the Vectra® Attacker Behavior Industry Report provides a first-hand analysis of active and persistent attacker behaviors inside cloud, data center and enterprise environments of Vectra customers from January through June 2018.

(more available)
Added: February 7, 2019
image from Attacker Behavior Industry Report: 2018 RSA Conference Edition

Attacker Behavior Industry Report: 2018 RSA Conference Edition

The 2018 RSA Conference Edition of the Vectra Attacker Behavior Industry Report provides a first-hand analysis of active and persistent attacker behaviors inside cloud, data center and enterprise environments of Vectra customers from August 2017 through January 2018.

(more available)
Added: February 7, 2019
image from Under The Hood Of Cyber Crime

Under The Hood Of Cyber Crime

From the report, “In the first installment of the 2019 Security Report ‘CyberAttack Trends Analysis’, we reviewed the latest trends and threats facing the IT security industry today. We assessed the major incidents that impacted organizations over the past year along with our commentary and insights regarding them. These trends fell into the categories of Cryptominers, Ransomware, Malware Methodology, Data Breaches, Mobile and Nation State Cyber Attacks. In this installment we zone in on an underlying trend that lies behind all of the above categories, the democratization of cyber crime.” Read on to find out more.

(more available)
Added: February 7, 2019
image from The Biggest Cyber Threat To Health Insurance Companies in 2019

The Biggest Cyber Threat To Health Insurance Companies in 2019

This White Paper attempts to paint a comprehensive picture of the file-borne threat crisis facing health insurance companies due to the tight connection with medical institutions and the immense number of files shared and transferred between the two sectors, as well as explain why current security systems and industry regulations fail to adequately meet this sophisticated threat, and what measures can be taken to guard against it without investing in security infrastructure.

(more available)
Added: February 7, 2019
  • ««
  • «
  • 11
  • 12
  • 13
  • 14
  • 15
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 16:08 UTC (build b1d7be4)