Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Criminal Group

Below you will find reports with the tag of “Criminal Group”

image from Threat Advisory: CBS mobile apps & website

Threat Advisory: CBS mobile apps & website

This is a threat advisory for CBS mobile apps & website

Added: October 13, 2018
image from Tracking Down The [A]pache Fishing Kit

Tracking Down The [A]pache Fishing Kit

In our latest research into the dark and dangerous world of phishing kits, Check Point Research and CyberInt have joined forces to show you how one of the most advanced phishing kits, the [A]pache Next Generation Advanced Phishing Kit, is currently being promoted and used on the Dark Net.

(more available)
Added: October 13, 2018
image from TrendLabs 2016 Security Roundup:A Record Year for Enterprise Threats

TrendLabs 2016 Security Roundup:A Record Year for Enterprise Threats

This roundup reviews the pertinent security stories of 2016 and aims to help enterprises determine what to expect in the months ahead and what security strategies they can adopt to stay protected.

(more available)
Added: October 13, 2018
image from Will Connected Cars Crash Into The Cloud Or Accelerate Into The Fast Lane?

Will Connected Cars Crash Into The Cloud Or Accelerate Into The Fast Lane?

Connected cars are facing four fundamnetal challenges that need to be overcome. See what these automotive Ethernet industry challenges are and the solutions that are available to help overcome several of the challenges.

(more available)
Added: October 13, 2018
image from 2016 Norton Cyber Security Insights Report

2016 Norton Cyber Security Insights Report

This report finds that victims of cybercrime within the past year often continued their unsafe behavior. This report details and discusses this issue.

(more available)
Added: October 12, 2018
image from A Crypto Mining Operation Unmasked

A Crypto Mining Operation Unmasked

This article provides an insightful report on a CryptoMining Operation.

Added: October 12, 2018
image from Cybersecurity In Healthcare: The Diagnosis

Cybersecurity In Healthcare: The Diagnosis

This report was commissioned to understand whether or not the healthcare industry was prepared for the growing and evolving cybersecurity threats.

(more available)
Added: October 12, 2018
image from Cybersecurity Insights Volume 5: The CEO's Guide To Data Security

Cybersecurity Insights Volume 5: The CEO's Guide To Data Security

In this report the authors provide insight into the importance of data security.

Added: October 12, 2018
image from Don't Take The Bait

Don't Take The Bait

In this paper, we’ll dive into the evolution of phishing in recent years, how it works, and what it looks like. And as cybercriminals continue to prey on employees through their technology, we’ll make an argument for the importance of a multi-layered defense against phishing attacks: combining advanced security technologies with educated, phishing-aware employees.

(more available)
Added: October 12, 2018
image from EMV Issuance Trajectory And Impact On Account Takeover And CNP

EMV Issuance Trajectory And Impact On Account Takeover And CNP

This report is sponsored by iovation, which wanted to investigate the state of the U.S. EMV migration and the associated account takeover, CNP fraud, and application fraud trends. The research will help FI executives benchmark their EMV progress against their peers’ and better understand the rapidly shifting fraud landscape.

(more available)
Added: October 12, 2018
image from Forces Shaping The Cyber Threat Landscape For Financial Institutions

Forces Shaping The Cyber Threat Landscape For Financial Institutions

This significant WhitePaper takes a good look at what trends and developments are impacting the cyber threat landscape for specifically, financial institutions.

(more available)
Added: October 12, 2018
image from Key Findings from The Global State of Information Security Survey 2016

Key Findings from The Global State of Information Security Survey 2016

This report is discussing the rising trend of organizations properly prioritizing the risks and dangers of cyber threats.

Added: October 12, 2018
image from M-Trends 2015

M-Trends 2015

Mandiant consultants’ role as the first responders to critical security incidents gives them a unique vantage point into how attackers’ motives and tactics are changing . The insights and analysis presented here represent their combined experience over the course of hundreds of service engagements . Over the last decade, they have helped clients across more than 30 industries around the globe .

(more available)
Added: October 12, 2018
image from Panda Labs Annual Report 2017

Panda Labs Annual Report 2017

This report discusses events of 2017 and lays out trends and predictions for 2018, including the secret of how to fight malware. In this report’s conclusion, they go a little more into detail, but ultimately the secret is “forgetting about” malware. If we focus on fighting malware, the battle is lost before it has begun.

(more available)
Added: October 12, 2018
image from Regional Advanced Threat Report: Latin America 1H 2015

Regional Advanced Threat Report: Latin America 1H 2015

This report discusses trends in the cyber security environment in Latin America from January to June 2015.

Added: October 12, 2018
image from State of Mac Security 2016:Enterprise Mac Security

State of Mac Security 2016:Enterprise Mac Security

The State of Mac Security Report takes a pulse check of Mac enterprise adoption, examines the reasons behind their increased popularity and crucially, how to overcome the security risks they pose.

(more available)
Added: October 12, 2018
image from Taking The Offensive

Taking The Offensive

This paper discusses the necessary element of collaboration that is required for success fighting cybercrime.

Added: October 12, 2018
image from The Human Factor 2018: People Centered Threats Drive The Landscape

The Human Factor 2018: People Centered Threats Drive The Landscape

This report offers insight into the human factor and how cybercriminals have continued to recognize that the greatest vulnerability of an organization is the humans that run it.

(more available)
Added: October 12, 2018
image from US Cyber Market Update: 2017 US Cyber Insurance Profits And Performance

US Cyber Market Update: 2017 US Cyber Insurance Profits And Performance

The aim of this report is to provide insights for insurers that currently offer cyber insurance, as well as those seeking to offer it, to provide a performance benchmark, and to give perspective on the industry experience.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 24
  • 25
  • 26
  • 27
  • 28
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 20, 2025 16:09 UTC (build b1d7be4)