Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Criminal Group

Below you will find reports with the tag of “Criminal Group”

image from Quarterly Threats Report March 2018 Infographic

Quarterly Threats Report March 2018 Infographic

This infographic is a summary of the main points in the McAfee Labs Quarterly Threat Report from March 2018

Added: October 14, 2018
image from Security Response: How safe is your quantified self?

Security Response: How safe is your quantified self?

Fueled by technological advances and social factors, the quantified self movement has experienced rapid growth. Quantified self, also known as self-tracking, aims to improve lifestyle and achievements by measuring and analyzing key performance data across a range of activities. This report deals with the threats and vulnerabilities that are present in the devices used to provide those measurements and analysis.

(more available)
Added: October 14, 2018
image from Tech Industry Doppelgangers: Campaign Innovation In the World of Cybercrime

Tech Industry Doppelgangers: Campaign Innovation In the World of Cybercrime

This thought piece draws on the experience of 451 Networks analysts and interviews with defensive security professionals to review major trends in attackers tools, techniques, and processes (TTPs).

(more available)
Added: October 14, 2018
image from The 2016 Call Center Fraud Report

The 2016 Call Center Fraud Report

This report will provide insights about the depth and breadth of fraud activity across a variety of industries from a data set of more than half a billion calls.

(more available)
Added: October 14, 2018
image from The Explosion Of Apps: 27% Are Risky

The Explosion Of Apps: 27% Are Risky

This report seeks to outline the potential problems related to apps that are allowed to have access to corporate networks and servers.

(more available)
Added: October 14, 2018
image from The Future of Cybercrime and Security

The Future of Cybercrime and Security

From the report, “This research will present some general trends in cybercrime, as well as indicating the potential global cost of malicious software use. It will discuss specific threats to financial and device-based businesses, as well as providing analyses of the current and future trends in cybercriminal activity, alongside general advice on how to prevent and/or minimise the impact of cybercrime.”

(more available)
Added: October 14, 2018
image from Using Network Analytics To Detect PowerShell Attacks

Using Network Analytics To Detect PowerShell Attacks

This report provides an analysis of Microsoft’s PowerShell language and how it has been used by cybercriminals.

Added: October 14, 2018
image from 2014 Internet Crime Report

2014 Internet Crime Report

The 2014 Internet Crime Report highlights the IC3’s efforts to prevent and reduce the prevalence and impact of Internet crimes, and reveals at least two budding Internet crime trends. First, the increased use of social media has provided a quintessential goldmine of personal data for perpetrators. More victims are submitting complaints documenting how social media was utilized to perpetrate frauds, or indicating the perpetrator initiated a relationship through social engineering. Second, the emerging popularity of virtual currency has attracted perpetrators, who are capitalizing on the vulnerabilities of the digital currency systems.

(more available)
Added: October 13, 2018
image from 2018 Security Predictions

2018 Security Predictions

In this report, they describe major security shifts we expect in 2018. At the heart of many of these predictions is a requirement to understand the intersection of people, critical data and IP – the human point. By placing behavior and intent at the center of security, security professionals can keep up with technological innovations to come.

(more available)
Added: October 13, 2018
image from 5 Steps To Executing A Mobile Defense Strategy

5 Steps To Executing A Mobile Defense Strategy

This paper provides a simple guide to executing a mobile defense strategy.

Added: October 13, 2018
image from Annual Fraud Benchmarking Report:

Annual Fraud Benchmarking Report:

Based on the results of a survey, this paper looks at key trends and challenges facing North American businesses seeking to find the right balance and discusses some of the approaches and tools that are available to help you deal with cyber-based fraud management.

(more available)
Added: October 13, 2018
image from Annual Report 2015

Annual Report 2015

This report concludes that in 2015, cyber attacks grew at an alarming rate, and makes the prediction that Cryptolocker will continue to be a cyber threat. It also discusses the Internet of Things and how those devices can be turned into tools for cyber criminals. It also concluded that the data thefts that have occurred make it clear that businesses have a protection deficit that they need to work on immediately.

(more available)
Added: October 13, 2018
image from Cybersecurity Insights Report

Cybersecurity Insights Report

This research explores the personal impact of online crime. “Our hope is that the findings will move people from general awareness online of the threats to a clearer sense of what’s at risk and why they should care—and take action.”

(more available)
Added: October 13, 2018
image from Identifying Critical Gaps in Database Security

Identifying Critical Gaps in Database Security

This white paper provides the results of a survey that looked to understand the weaknesses in the current state of database security.

(more available)
Added: October 13, 2018
image from Machine Learning: Fraud Is Now A Competitive Issue

Machine Learning: Fraud Is Now A Competitive Issue

This paper takes a unique look at the competing issues of using machine learning techniques to fight fraud at financial institutions.

(more available)
Added: October 13, 2018
image from New Losses: Estimating the Global Cost of Cybercrime

New Losses: Estimating the Global Cost of Cybercrime

Covering a variety of regians, and industries, as well as types of cybercrime, this report gives a detailed analysis of the financial impact of cybercrime.

(more available)
Added: October 13, 2018
image from New Ransomware Installers can Infect Computers Without Users Clicking Anything

New Ransomware Installers can Infect Computers Without Users Clicking Anything

Article discussing how ransomware is becoming even more dangerous.

Added: October 13, 2018
image from New Rules:The Evolving Threat Landscape in 2016

New Rules:The Evolving Threat Landscape in 2016

These predictions will provide an historical overview of the evolving threat landscape, reveal the new trends and strategies that Fortinet researchers anticipate cyber criminals will employ in the year to come, and demonstrate how Fortinet is proactively positioned to change the way businesses look at their security strategy going into the new year.

(more available)
Added: October 13, 2018
image from Pathways into Cybercrime

Pathways into Cybercrime

There are a number of young people in the UK that are are becoming involved in cyber dependent crime. This report aims to Collate, and analyze offender briefs to identify motivations and pathways into cyber crime, as well as review academic studies in this area, to identify key intervention points that should be targeted and identify gaps in understanding and propose recommendations.

(more available)
Added: October 13, 2018
image from The Cost of Cyber Crime

The Cost of Cyber Crime

This research develops a causal model, relating different cyber crime types to their impact on the UK economy. The model provides a simple framework to assess each type of cyber crime for its various impacts on citizens, businesses and the Government.

(more available)
Added: October 13, 2018
image from The French Underground: Under A Shroud Of Extreme Caution

The French Underground: Under A Shroud Of Extreme Caution

If the North American underground had an alter ego, it would be the French underground. A deep dive into the North American underground1 revealed that it is a “glass tank,” open to not only the tech-savviest of hackers, but also visible to both cybercriminals and law enforcement. The French underground, meanwhile, is not only well-hidden in the Dark Web, its players also operate with extreme caution. Read this paper to find out more.

(more available)
Added: October 13, 2018
  • ««
  • «
  • 24
  • 25
  • 26
  • 27
  • 28
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 12:08 UTC (build b1d7be4)