Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Criminal Group

Below you will find reports with the tag of “Criminal Group”

image from Protecting Against Tomorrow's Malware Attacks Today

Protecting Against Tomorrow's Malware Attacks Today

This article from the UK discusses ways that organizations can protect themselves from future Malware attacks.

Added: October 25, 2018
image from Q2 2017 Phishing Trends And Intelligence Report

Q2 2017 Phishing Trends And Intelligence Report

The data and observations presented in this report are sourced from the continuous work PhishLabs does to fight back against phishing attacks and the threat actors behind them. The information highlighted in this report will help organizations better assess and mitigate the risk posed by modern phishing attacks.

(more available)
Added: October 25, 2018
image from Ransomware and Businesses 2016

Ransomware and Businesses 2016

This report from Symantec gives a variety of information about ransomware. It gives an overview, discusses the factors driving the growth and persistence of ransomware, infection vectors, platforms affected, the major ransomware families and finally, how businesses are going to be impacted.

(more available)
Added: October 25, 2018
image from Ransomware: Past, Present and Future

Ransomware: Past, Present and Future

This paper details the history and abilities of Ransomware, and where it is headed in the coming years.

Added: October 25, 2018
image from SilverTerrier: Rise Of Nigerian Business Email Compromise

SilverTerrier: Rise Of Nigerian Business Email Compromise

With unique and specialized analysis, this paper discusses Nigerian cyber crime actors, their growth, collaboration, and the direction they are headed.

(more available)
Added: October 25, 2018
image from Super Antivirus 2018: A Shady App Many Are Downloading On Google Play

Super Antivirus 2018: A Shady App Many Are Downloading On Google Play

This report provides an inside look at a threat being downloaded on Google Play.

Added: October 25, 2018
image from Threat Intelligence: Cyberattacks And The Utility Industry

Threat Intelligence: Cyberattacks And The Utility Industry

This report takes a look at how cyberattacks impact the utility industry.

Added: October 25, 2018
image from Understanding the Depth of the Global Ransomware Problem

Understanding the Depth of the Global Ransomware Problem

This report presents the results of a survey undertaken in the United States, Canada, Germany and the United Kingdom on ransomware and related issues. The survey was conducted during June 2016 with 165 organizations in the United States, and 125 each in the other nations for a total of 540 surveys completed.

(more available)
Added: October 25, 2018
image from University of Kent Computing Survey

University of Kent Computing Survey

This is a report from Kent University in Canterbury, UK. It details the findings from their online survey which gives a better picture of the prevalence and impact of cybercrime victimization, cyber security practices, and risks as seen by a sample of the UK population.

(more available)
Added: October 25, 2018
image from Behind The Curtain: The Illicit Trade Of Firearms, Ammunition, And Explosives On The Dark Web

Behind The Curtain: The Illicit Trade Of Firearms, Ammunition, And Explosives On The Dark Web

While the use of the dark web as facilitators for illicit drug trade has increasingly been the subject of research by a number of academics, little has been done to conduct a systematic investigation of the role of the dark web in relation to the illegal arms trade, drawing on the insights offered by primary data. To address this gap, and with a view to support- ing policy and decision makers, RAND Europe and the University of Manchester designed this research project.

(more available)
Added: October 24, 2018
image from Cybersecurity Threatscape 2017

Cybersecurity Threatscape 2017

This annual report details the cybersecurity trends and threats of 2017.

Added: October 24, 2018
image from DDoS Trends Report Q4 2016-Q1 2017

DDoS Trends Report Q4 2016-Q1 2017

This report contains observations from DDoS attack attempts in Q4 2016 and Q1 2017, as well as comparisons against previous quarters. The data represents the frequency and sophistication of DDoS attacks that organizations face today.

(more available)
Added: October 24, 2018
image from Insuring The Future: 2018 State Of Cyber Resilience For Insurance

Insuring The Future: 2018 State Of Cyber Resilience For Insurance

“Across all technologies and capabilities examined in the survey, about 80 percent or more of insurance executives are “confident” or “extremely confident” about their effectiveness. That might seem reasonable given the progress, but a case can be made that leadership is overconfident. Attackers are becoming increasingly sophisticated and attacks can shut down the business or expose customer data. If about one in five attempted breaches is successful, that’s still a lot of breaches. And, given the findings that 45 percent of breaches are not detected for more than a week (9 percent require more than a month), that’s a lot of risk exposure.”

(more available)
Added: October 24, 2018
image from ISTR Ransomware 2017

ISTR Ransomware 2017

This special report takes a specific look at Ransomware.

Added: October 24, 2018
image from McAfee Labs Threats Report June 2018

McAfee Labs Threats Report June 2018

In this report, they highlight the notable investigative research and threat trend statistics gathered by the McAfee Advanced Threat Research and McAfee Labs teams in Q1 of 2018.

(more available)
Added: October 24, 2018
image from Monthly Threat Report May 2017

Monthly Threat Report May 2017

This monthly threat report takes a look at the month of May 2017.

Added: October 24, 2018
image from Paradigm Shifts:TrendMicro Security Predictions For 2018

Paradigm Shifts:TrendMicro Security Predictions For 2018

This report offers Security Predictions for 2018

Added: October 24, 2018
image from Ransomware: Unlocking The Lucrative Criminal Business Model

Ransomware: Unlocking The Lucrative Criminal Business Model

This is a well written exclusive look at Ransomware.

Added: October 24, 2018
image from Russian Federation Country Profile 2017

Russian Federation Country Profile 2017

This paper gives a profile of the Russian Federation.

Added: October 24, 2018
image from The Importance Of Knowing Your Device In A Mobile-First World

The Importance Of Knowing Your Device In A Mobile-First World

This white paper will examine “Know Your Device” (KYD) as a method to not only protect against fraud, but also enhance your customer’s digital channel experiences and compete in a crowded marketplace.

(more available)
Added: October 24, 2018
image from Understanding The Mobile Threat Landscape In 2018

Understanding The Mobile Threat Landscape In 2018

“2017 was a huge year for mobile security. Malicious actors returned with a vengeance and cyber attacks grew rapidly in sophistication. Ransomware outbreaks like WannaCry and Petya hit enterprises globally causing unparalleled disruption, new vulnerabilities like BlueBorne were discovered and malware variants grew more aggressive and prevalent by the day. This report will summarise the key mobile security trends that emerged in 2017, and summarise thoughts for the mobile threat landscape for the year ahead.”

(more available)
Added: October 24, 2018
  • ««
  • «
  • 17
  • 18
  • 19
  • 20
  • 21
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 04:08 UTC (build b1d7be4)