Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Criminal Group

Below you will find reports with the tag of “Criminal Group”

image from The State of Endpoint Security: Past, Present and Future

The State of Endpoint Security: Past, Present and Future

From the report, “With endpoint security products continuing to be at the tip of the spear of cyber defenses for years to come, the question is how to ensure the best possible security posture. No matter which way an endpoint security buyer turns, there is no one magic bullet. It is likely that a layered approach with multiple different technologies working together is required.” Read on to find out why.

(more available)
Added: February 6, 2019
image from You've Been Phished, Again! Solution: Eliminate the Click-it Temptation

You've Been Phished, Again! Solution: Eliminate the Click-it Temptation

From the report, “In this SPIE, we shine a spotlight on the phishing prevention approaches of one start-up company, Area 1 Security; and one long-tenured cybersecurity vendor, IBM. Although complete elimination cannot be promised, each is taking steps that reduce the potential of their business clients (Area 1’s Horizon) and their clients’ clients (IBM Trusteer Rapport) from becoming victims. Secondarily, by removing the burden of phishing defense from employees and consumers, employees’ productivity is positively affected, and consumers’ trust in online activities is strengthened.”

(more available)
Added: February 5, 2019
image from Minerva Labs 2018 Year In Review: The Year Fileless Malware Became The Norm

Minerva Labs 2018 Year In Review: The Year Fileless Malware Became The Norm

By the end of this report, you’ll have a better understanding of today’s approaches to evading detection tools and the trajectory of evasion into the next year. This way, you’ll have a better sense regarding your endpoint security architecture and your plans for maintaining or improving its effectiveness.

(more available)
Added: February 5, 2019
image from Q2 2018 DataVisor Fraud Index Report

Q2 2018 DataVisor Fraud Index Report

The DataVisor Fraud Index Report Q2 2018 is based on attacks that were detected by the DataVisor UML Engine from April through June 2018 with additional recent attack trend data. This report provides unprecedented insights into the evolving attack trends and characteristics of fraud attacks across a number of industries including social platform, e-commerce, financial services, and mobile gaming.

(more available)
Added: February 5, 2019
image from Q1 2018 Datavisor Fraud Index Report

Q1 2018 Datavisor Fraud Index Report

The DataVisor Fraud Index Report: Q1 2018 is based on attacks that were detected by the DataVisor UML Engine from January through March of 2018, analyzing 40 billion events and 680 million user accounts. This report provides unprecedented insights into the attack techniques that bad actors use to engage in malicious activities and evade detection.

(more available)
Added: February 5, 2019
image from Q3 2018 DataVisor Fraud Index Report: Unraveling The Matrix Of Fraud

Q3 2018 DataVisor Fraud Index Report: Unraveling The Matrix Of Fraud

The Q3 2018 Fraud Index Report, produced by the DataVisor Research Team, analyzes recent fraud attacks impacting consumers and organizations for the period July - September 2018.

(more available)
Added: February 5, 2019
image from Assault On Healthcare

Assault On Healthcare

This report offers some insight into Health Information Technology and the cybersecurity issues that plague that area.

Added: February 5, 2019
image from Will EU Regulation Aid Cyber Criminals?

Will EU Regulation Aid Cyber Criminals?

From the report, “During the last few months, global corporations have been extremely busy with implementing the needed changes in order to be compliant with the upcoming GDPR regulation. While this happens, cyber-threat actors are preparing themselves for the possible consequences, without a clear picture of whether GDPR will hurt them or benefit them. According to the General Data Protection Regulation (GDPR) any company that handles European Union consumer personal data is obligated to take tangible steps to ensure the information’s security. This means the EU sees any organization that uses EU citizens’ data of any kind, responsible to protect it, whether the organization is headquartered inside EU territory or not. It will, of course, affect the way global corporations handle consumer data encryption, but in even more basic terms, it will affect what kind of information is permitted to be stored and passed along to other users.”

(more available)
Added: January 31, 2019
image from How Vulnerable is the Healthcare Industry to Cyber Attacks

How Vulnerable is the Healthcare Industry to Cyber Attacks

This report takes a look at the healthcare industry and seeks to provide insight into the cyber security issues that remain in that industry.

(more available)
Added: January 31, 2019
image from UK Active Cyber Defence

UK Active Cyber Defence

The key findings of this report are; 1) Active Cyber defence has significant potential in helping improve UK national cybersecurity 2) Active Cyber defence can play a powerful role in shaping the cybersecurity marketplace and furthering the interests of UK internet users and consumers 3) Active Cyber defense is a potentially useful model for export to like-minded countries 4) Active Cyber defense may constitute an emergent public good 5)Active cyber defense is not perfect, nor should we expect it to be.

(more available)
Added: January 31, 2019
image from The Future Of Cybercrime & Security

The Future Of Cybercrime & Security

This report offers insight into both Cybercrime and Cybersecurity. It discusses IoT botnets and DDoS, Rising Ransomware, File-less Attacks, and on the security side, it discusses Talent 7 Budget Shortage, Government opinions, Pervasive Threat Intelligence and Market Consolidation.

(more available)
Added: January 31, 2019
image from "Anonymous Slovakia" Targets NATO and EU Sites

"Anonymous Slovakia" Targets NATO and EU Sites

From the report, “On November 26th, Slovakian Anonymous leader ‘Abaddon’ posted in the deep web message board ‘Hidden Answers’, looking to recruit accomplices for an operation targeting NATO and EU websites. The proposed attacks would potentially arrive by means of XSS (cross-site scripting), SQL injection, or a combination of both. And by DDoS (distributed denial of service), a type of attack that is intended to make an online resource unavailable to its legitimate users by overwhelming it with traffic. It is not yet clear what the motives for the operation are, or what the official name will be.”

(more available)
Added: January 31, 2019
image from The Changing Face of Online Banking and Financial Fraud

The Changing Face of Online Banking and Financial Fraud

This report seeks to review the dramatic changes that took place in the banking industry in 2018, and lay out a strategy for those institutions in 2019.

(more available)
Added: January 31, 2019
image from Forging Documents in the Deep and Dark Web

Forging Documents in the Deep and Dark Web

This report offers insight into forged documents online. And how they are traded and used to commit identity fraud or evade authorities.

(more available)
Added: January 31, 2019
image from Gobal Consumers' Authentiacation Preferences: Have Your Cake and Eat It Too

Gobal Consumers' Authentiacation Preferences: Have Your Cake and Eat It Too

This Impact Report provides insights into consumers’ views on authentication. Consumers often don’t understand the mechanics of technologies very well, or even why they’re being used, but they have definite preferences about how and when they want to engage in authentication activities.

(more available)
Added: January 31, 2019
image from Web-Based Crypto Wallet Hijacking

Web-Based Crypto Wallet Hijacking

Recently, cybercriminals have managed to redirect web-based crypto-wallet DNS queries to a malicious mirror website. By doing so, they were able to steal $17m in Ethereum. The hackers pulled off a BGP (Border Gateway Protocol) hijacking attack on the website’s DNS service host, causing it to receive a false IP address and direct users to a phishing website. As a result, the users became victims of the attack, losing their stored wallet’s crypto-currency.

(more available)
Added: January 31, 2019
image from Unmasking Synthetic Identites: Exposing the Real Fraudster Behind the Fabricated Persona

Unmasking Synthetic Identites: Exposing the Real Fraudster Behind the Fabricated Persona

From the report, “Widespread data breaches, the EMV migration, and efforts to extend the longevity of the SSN, have created an ideal environment in which synthetic identity fraud is flourishing. Furthermore, consumers’ physical and digital footprints are becoming more complicated, meandering across locations, devices, and geographies. This makes it more difficult than ever to differentiate legitimate user behavior from fraudsters. Businesses need to prevent synthetic identities from entering their ecosystems by understanding anomalies to individual user behavior and helping to correlate the seemingly disconnected events and security incidents in real time. Combining historical and real-time data and leveraging machine learning to analyze individual behavior across channels can reveal complex patterns to help detect and block synthetic identities without causing friction for real customers.”

(more available)
Added: January 30, 2019
image from The Path To Digital Transformation

The Path To Digital Transformation

This report offers insight into controlling friction while tackling Cybercrime in Financial Services.

Added: January 30, 2019
image from Global eCommerce Transaction and Fraud Trends Q2 2018

Global eCommerce Transaction and Fraud Trends Q2 2018

This infographic provides a brief overview of data presented in the ThreatMetrix Q2 2018 Cybercrime Report.

Added: January 30, 2019
image from ThreatMetrix Cybercrime Report

ThreatMetrix Cybercrime Report

The ThreatMetrix Payment Processor Cybercrime Report is based on actual cybercrime attacks last year that were detected by the ThreatMetrix Digital Identity Network (the Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Q2 2018 Gaming & Gambling Report

Q2 2018 Gaming & Gambling Report

The ThreatMetrix Gaming and Gambling Cybercrime Report is based on actual cybercrime attacks in Q2 2018 that were detected by the ThreatMetrix Digital Identity Network (the Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
  • ««
  • «
  • 12
  • 13
  • 14
  • 15
  • 16
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 16, 2025 20:08 UTC (build b1d7be4)