Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Criminal Group

Below you will find reports with the tag of “Criminal Group”

image from Will 2018 Be Another Year Of Bankbots?

Will 2018 Be Another Year Of Bankbots?

This paper set out to study the inner workings of a bankbot because they predict we will see more bankbots in the future.

(more available)
Added: October 24, 2018
image from 2016 Cyber Security Intelligence Index

2016 Cyber Security Intelligence Index

This paper is an Analysis of cyber attack and incident data from IBM’s worldwide security services operations.

Added: October 23, 2018
image from 2016 Threat Predictions

2016 Threat Predictions

This report deals with predicting the cyber threat landscape for 2016 through 2020. It does this by looking back 5 years, and analyzing the past, and also talking to folks who make predictions for the 5 years in the future.

(more available)
Added: October 23, 2018
image from 2017 Midyear Security Roundup: The Cost Of Compromise

2017 Midyear Security Roundup: The Cost Of Compromise

This report reviews the cyber security threats that occurred in the first half of 2017.

Added: October 23, 2018
image from 2018 Sonicwall Cyber Threat Report

2018 Sonicwall Cyber Threat Report

Subtitled, “Threat Intelligence, Industry Analysis, and Cybersecurity Guidance, for the Global Cyber Arms Race,” this report seeks to fully disclose the research done by the authors, in order to aid all of those involved in the cybersecurity realm.

(more available)
Added: October 23, 2018
image from Balancing Humans And Machines

Balancing Humans And Machines

Aaron Higbee, Co-founder and CTO, PhishMe, (now CoFense) discusses the future of phishing defence and asks which side of the fence the future of defence against phishing attacks lies: human or machine?

(more available)
Added: October 23, 2018
image from Beyond the Bottom Line: The Real Cost of Data Breaches

Beyond the Bottom Line: The Real Cost of Data Breaches

This report is based on the results of an independent survey conducted by market research specialist Vanson Bourne.

Added: October 23, 2018
image from Callisto Group

Callisto Group

This White Paper is a report regarding The Callisto Group. The Callisto Group is an advanced threat actor whose known targets include military personnel, government officials, think tanks, and journalists in Europe and the South Caucasus. Their primary interest appears to be gathering intelligence related to foreign and security policy in the Eastern Europe and South Caucasus regions.

(more available)
Added: October 23, 2018
image from Cyber Threat Landscape: The Aviation Industry

Cyber Threat Landscape: The Aviation Industry

This paper focusses completely on cybersecurity issues in the aviation industry.

Added: October 23, 2018
image from Cyber Threatscape Report 2018

Cyber Threatscape Report 2018

This report provides detailed information about Iranian Threat, Extended Supply Chain Threats, Critical Infrastructure, Advanced Persistent Threats, Miner Malware, and Ransomware.

(more available)
Added: October 23, 2018
image from ISTR Financial Threats Review 2017

ISTR Financial Threats Review 2017

This special report examines threats to the financial sector.

Added: October 23, 2018
image from Protecting Emerging Payments Technologies: New Ways To Pay Require New Ways To Secure

Protecting Emerging Payments Technologies: New Ways To Pay Require New Ways To Secure

If you are looking for insight into the growing world of mobile payments, and the security surrounding those transactions, this paper is for you.

(more available)
Added: October 23, 2018
image from Quarterly Threat Summary Q1 2016

Quarterly Threat Summary Q1 2016

This Quarterly report offers key takeaways from the first Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 23, 2018
image from Security In The Golden Age Of Cybercrime

Security In The Golden Age Of Cybercrime

This paper offers insight into an exploration of network cybersecurity in the U.S. Federal Government.

Added: October 23, 2018
image from Stacking The Odds Against The Fraud

Stacking The Odds Against The Fraud

This paper provides answers for how marketing and fraud can work together to help online gambling operators to win.

Added: October 23, 2018
image from The CIO's Guide To Mobile Threat Defense

The CIO's Guide To Mobile Threat Defense

This is a handy guide for CIO’s that seeks to provide guidance for Mobile Threat Defense.

Added: October 23, 2018
image from The Fraud Beat 2016

The Fraud Beat 2016

This report discusses the reality that everyone is susceptible to fraudulent emails. It discusses why that is the case, and offers some solutions.

(more available)
Added: October 23, 2018
image from The ROPEMAKER Email Exploit

The ROPEMAKER Email Exploit

This threat advisory offers insight into the ROPEMAKER Email Exploit.

Added: October 23, 2018
image from Threat Advisory: Tiscali App

Threat Advisory: Tiscali App

This is a threat advisory for the Tiscali App.

Added: October 23, 2018
image from Winning The War On Ransomware

Winning The War On Ransomware

This is an infographic that can help your organization understand and win the war on Ransomware.

Added: October 23, 2018
image from 2017 Annual Threat Report

2017 Annual Threat Report

The goal of the SonicWall Annual Threat Report is to define the cybersecurity battlefield in order to enable companies and individuals around the world to mount an impenetrable defense in 2017 and beyond.

(more available)
Added: October 22, 2018
  • ««
  • «
  • 18
  • 19
  • 20
  • 21
  • 22
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 04:08 UTC (build b1d7be4)