Below you will find reports with the tag of “Criminal Group” Cryptowall Report This is a report that deals with the CryptoWall Malware. The focus of this report is to study the prevalence and global impact of CryptoWall. (more available) Added: October 15, 2018 Cyber Threats To The Entertainment And Media Industries Discover why the entertainment and media industries are valuable targets for APT groups and hacktivists seeking influence. Added: October 15, 2018 DMARC Intelligence Report 2016 In this annual report, they track the progress of Domain-based Message Authentication, Reporting, and Conformance (DMARC) Added: October 15, 2018 Email Fraud Threat Report Year In Review The details in this report are compiled from Proofpoint’s specific research and experience from the events of 2017. Added: October 15, 2018 GTIC Monthly Threat Report December 2017 This monthly threat report takes a look at the month of December 2017. Specifically, it looks at insights into Coinhive, intellectual property theft via Iranian hackers, and North Korea’s new cyberattack tools. (more available) Added: October 15, 2018 Impersonation Protect: A Whale Of A Tale: How To Stop The Rising Tide Of Impersonation Attacks This report takes a look at whaling attacks and considers what can be done to stop these kinds of attacks. (more available) Added: October 15, 2018 McAfee Labs Threats Report June 2017 In this quarterly threats report, they highlight three Key Topics: They broadly examine evasion techniques and how malware authors use them to accomplish their goals. They explore the very interesting topic of steganography in the digital world. They examine Fareit, the most famous password-stealing malware. (more available) Added: October 15, 2018 The Rise And Fall OF Scan4You This is exclusive research into the cyber threat that is Scan4You. It discusses the history and current outcomes of this unique threat. (more available) Added: October 15, 2018 Threat Landscape Report Q1 2018 This report continues Fortinet’s excellent threat report. It discusses operational technology, Zero-day markets, malware, cryptojacking, the hacking event at the winter olympics, the rise of botnets, and Adromeda. Read On! (more available) Added: October 15, 2018 Threat Report Advice in this report ranges from the tactical to the strategic. Recognize the importance of solutions that can provide specific benefits yet work as part of a unified security posture. They claim that their security recommendations will provide actionable information and guidance, while taking into account the need for organizations to grow and innovate at the same time. (more available) Added: October 15, 2018 White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime According to this report, the attractions and profitability of the digital underworld are leading some security practitioners to become ‘gray hats’ and get involved in cybercrime. (more available) Added: October 15, 2018 X-Force Threat Intelligence Index 2018 In this report, IBM culled the data collected between 01 January 2017 and 31 December 2017, to deliver insightful information about the global threat landscape and apprise security professionals about the threats most relevant to their organizations. (more available) Added: October 15, 2018 2015 Internet Crime Report The 2015 Internet Crime Report highlights the IC3’s efforts over the past year, specifically focusing on their efforts regarding Business Email Compromise (BEC) and Email Account Compromise (EAC) scams and the Operation Wellspring Initiative (OWS). (more available) Added: October 14, 2018 2016 Midmarket Threat Summary Report This report provides an analysis of threats in 2016, and the necessary steps to protect your business from those threats. (more available) Added: October 14, 2018 2017 North America Online Fraud Benchamark Report Based on the results of a survey, this paper looks at key trends and challenges facing North American businesses seeking to find the right balance and discusses some of the approaches and tools that are available to help you deal with cyber-based fraud management. (more available) Added: October 14, 2018 Annual Security Roundup: The Paradox Of Cyberthreats This report reviews the significant cyber events of 2017, and discusses the paradox that occurred. Added: October 14, 2018 Behind The Hidden Conversion Of Electricity To Money: An In-Depth Analysis of XMR Cryptominer Malware This paper provides an in-depth look at current cryptominer trends and the technology behind Monero. Additionally, it explores the projected attack methods that threat actors are likely to adopt, as well as tactics and best practices that security teams can utilize to keep themselves on the right side of this emerging cat-and-mouse game. (more available) Added: October 14, 2018 Data Thieves: The Motivations Of Cyber Threat Actors And Their Use And Monetization Of Stolen Data This paper presents the Testimony of Lillian Ablon before the Committee on Financial Services Subcommittee on Terrorism and Illicit Finance United States House of Representatives on March 15, 2018 (more available) Added: October 14, 2018 How To Fight The Phishing Epidemic And Win This ebook takes a look at the Phishing Epidemic and offers some solutions to help organizations win that battle. Added: October 14, 2018 Metrics (Not Just Fun Facts!) Are Key To Driving a Business-Driven Security Strategy This blog post discusses the point that organizations need to assess cybersecurity as a business enabler, rather than a hindrance. (more available) Added: October 14, 2018 Next-Gen Biometric Authentication Much helpful information about Biometric Authentication is revealed in this interview with InAuth Chief Strategy Officer Michael Lynch. Added: October 14, 2018 «« « 24 25 26 27 28 » »»
Cryptowall Report This is a report that deals with the CryptoWall Malware. The focus of this report is to study the prevalence and global impact of CryptoWall. (more available) Added: October 15, 2018
Cyber Threats To The Entertainment And Media Industries Discover why the entertainment and media industries are valuable targets for APT groups and hacktivists seeking influence. Added: October 15, 2018
DMARC Intelligence Report 2016 In this annual report, they track the progress of Domain-based Message Authentication, Reporting, and Conformance (DMARC) Added: October 15, 2018
Email Fraud Threat Report Year In Review The details in this report are compiled from Proofpoint’s specific research and experience from the events of 2017. Added: October 15, 2018
GTIC Monthly Threat Report December 2017 This monthly threat report takes a look at the month of December 2017. Specifically, it looks at insights into Coinhive, intellectual property theft via Iranian hackers, and North Korea’s new cyberattack tools. (more available) Added: October 15, 2018
Impersonation Protect: A Whale Of A Tale: How To Stop The Rising Tide Of Impersonation Attacks This report takes a look at whaling attacks and considers what can be done to stop these kinds of attacks. (more available) Added: October 15, 2018
McAfee Labs Threats Report June 2017 In this quarterly threats report, they highlight three Key Topics: They broadly examine evasion techniques and how malware authors use them to accomplish their goals. They explore the very interesting topic of steganography in the digital world. They examine Fareit, the most famous password-stealing malware. (more available) Added: October 15, 2018
The Rise And Fall OF Scan4You This is exclusive research into the cyber threat that is Scan4You. It discusses the history and current outcomes of this unique threat. (more available) Added: October 15, 2018
Threat Landscape Report Q1 2018 This report continues Fortinet’s excellent threat report. It discusses operational technology, Zero-day markets, malware, cryptojacking, the hacking event at the winter olympics, the rise of botnets, and Adromeda. Read On! (more available) Added: October 15, 2018
Threat Report Advice in this report ranges from the tactical to the strategic. Recognize the importance of solutions that can provide specific benefits yet work as part of a unified security posture. They claim that their security recommendations will provide actionable information and guidance, while taking into account the need for organizations to grow and innovate at the same time. (more available) Added: October 15, 2018
White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime According to this report, the attractions and profitability of the digital underworld are leading some security practitioners to become ‘gray hats’ and get involved in cybercrime. (more available) Added: October 15, 2018
X-Force Threat Intelligence Index 2018 In this report, IBM culled the data collected between 01 January 2017 and 31 December 2017, to deliver insightful information about the global threat landscape and apprise security professionals about the threats most relevant to their organizations. (more available) Added: October 15, 2018
2015 Internet Crime Report The 2015 Internet Crime Report highlights the IC3’s efforts over the past year, specifically focusing on their efforts regarding Business Email Compromise (BEC) and Email Account Compromise (EAC) scams and the Operation Wellspring Initiative (OWS). (more available) Added: October 14, 2018
2016 Midmarket Threat Summary Report This report provides an analysis of threats in 2016, and the necessary steps to protect your business from those threats. (more available) Added: October 14, 2018
2017 North America Online Fraud Benchamark Report Based on the results of a survey, this paper looks at key trends and challenges facing North American businesses seeking to find the right balance and discusses some of the approaches and tools that are available to help you deal with cyber-based fraud management. (more available) Added: October 14, 2018
Annual Security Roundup: The Paradox Of Cyberthreats This report reviews the significant cyber events of 2017, and discusses the paradox that occurred. Added: October 14, 2018
Behind The Hidden Conversion Of Electricity To Money: An In-Depth Analysis of XMR Cryptominer Malware This paper provides an in-depth look at current cryptominer trends and the technology behind Monero. Additionally, it explores the projected attack methods that threat actors are likely to adopt, as well as tactics and best practices that security teams can utilize to keep themselves on the right side of this emerging cat-and-mouse game. (more available) Added: October 14, 2018
Data Thieves: The Motivations Of Cyber Threat Actors And Their Use And Monetization Of Stolen Data This paper presents the Testimony of Lillian Ablon before the Committee on Financial Services Subcommittee on Terrorism and Illicit Finance United States House of Representatives on March 15, 2018 (more available) Added: October 14, 2018
How To Fight The Phishing Epidemic And Win This ebook takes a look at the Phishing Epidemic and offers some solutions to help organizations win that battle. Added: October 14, 2018
Metrics (Not Just Fun Facts!) Are Key To Driving a Business-Driven Security Strategy This blog post discusses the point that organizations need to assess cybersecurity as a business enabler, rather than a hindrance. (more available) Added: October 14, 2018
Next-Gen Biometric Authentication Much helpful information about Biometric Authentication is revealed in this interview with InAuth Chief Strategy Officer Michael Lynch. Added: October 14, 2018