Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Criminal Group

Below you will find reports with the tag of “Criminal Group”

image from National Cyber Threat Assessment 2023-2024

National Cyber Threat Assessment 2023-2024

The National Cyber Threat Assessment 2023-2024 will help Canadians understand current cyber security trends, and how they are likely to evolve. The NCTA is especially helpful for Canadian decision-makers as the focus is on cyber threats most relevant to Canada.

(more available)
Added: February 15, 2023
image from 2023 Payments market outlook

2023 Payments market outlook

This report explores four key trends in teh payments space, and their importance to issuers, merchants and fintechs in reducing losses from fraud and unnecessary chargebacks while also delivering a next-gen customer experience.

(more available)
Added: February 15, 2023
image from Cyber Threat Report 2023

Cyber Threat Report 2023

2023 will most likely be just challenging as the previous few years, but I’m confident that the cybersecurity market has the right tools to deal with the constantly shifting cybercrime landscape and new/consolidated threats, whether we’re talking about supply chain attacks, ransomware, deepfakes or cyber espionage.

(more available)
Added: February 15, 2023
image from Leading Ransomware Variants Q3 2022

Leading Ransomware Variants Q3 2022

Intel 471 reported 27 ransomware variants were used to conduct 455 attacks from July 2022 to September 2022, a decrease of 38 attacks from the second quarter of 2022 and 134 from the first quarter of 2022. The daily average of reported LockBit breaches was two - the same trend we observed from the ransomware group in the third and fourth quarters of 2021 and the first and second quarters of 2022.

(more available)
Added: February 9, 2023
image from Gaming Cyber Threats

Gaming Cyber Threats

Intel 471 can help your organization defend against a wide variety of cyber threats by providing deep insights and comprehensive expertise into cybercriminal actors and related activity. This report provides a brief exploration of our unique insight into the cyber underground, highlighting how we can proactively help you stay ahead of the curve, enabling you to fight cybercrime and win.

(more available)
Added: February 9, 2023
image from UK Cyber Threats

UK Cyber Threats

This report provides a strategic-level overview of threats identified impacting the U.K. and U.K. based businesses, including ransomware and initial access brokers (IABs). as well as common threat actors tactics, techniques and procedures (TTPs) observed.

(more available)
Added: February 9, 2023
image from 2022 Year In Review

2022 Year In Review

Our research and collection methods largely are driven by our GIRs, however, we continue to acknowledge that new trends in our reporting, recurring requests for information (FRIs) and other significant activity from or against underground threat actors and/or services are equally important to our research into trending topics.

(more available)
Added: February 8, 2023
image from 2023 Security Service Edge Adoption Report

2023 Security Service Edge Adoption Report

The 2023 Security Service Edge Adoption Report delivers insight on the shift away from legacy access solutions and the rapidly growing SSE market in light of the modern workplace.

(more available)
Added: January 23, 2023
image from 2022 Business Impact Report

2022 Business Impact Report

Our 2022 Business Impact Report looks into what happens specifically to small businesses and solopreneurs following a data or security breach. For the report, the ITRC surveyed 447 small business owners, leaders, and employees to paint a picture of small organizations and individuals that are significantly impacted by cybercrimes, often multiple times in a short period of time.

(more available)
Added: January 4, 2023
image from Sophos 2023 Threat Report

Sophos 2023 Threat Report

In 2022 the cybercriminal economy has increasingly transformed into an industry. Information technology companies have shifted too “as-a-service” offerings, and the cybercrime ecosystem has done the same. Access brokers, ransomware, information-stealing malware, malware delivery, and other elements of cybercrime operations have lowered barriers to entry for world-be cybercriminals.

(more available)
Added: November 29, 2022
image from Microsoft Digital Defense Report 2022

Microsoft Digital Defense Report 2022

In the report’s first chapter, we focus on activities of cybercriminals, followed by nation states threats in chapter two. Both groups have greatly increased the sophistication on their attacks which has dramatically increased the impact of their actions.

(more available)
Added: November 7, 2022
image from 2021 Business Email Compromise Report

2021 Business Email Compromise Report

This report is designed to explore the state of evolving email threats and how organizations are responding to protect themselves. Business Email Compromise attacks are one of the financially most damaging cyber crimes. They typically involve phishing emails and social engineering tactics to attack organizations and trick unsuspecting employees and executives into conducting tasks under the guise of legitimate business activity, often appearing to come from a trust sender.

(more available)
Added: October 18, 2022
image from 2022 Ransomware/ Malware Report

2022 Ransomware/ Malware Report

This report is based on the results of a comprehensive online survey of 225 cybersecurity professionals, to gain more insight into the latest trends, key challenges, and solutions for malware and ransomware security. The respondents range from technical executives to managers and iT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: October 14, 2022
image from 2022 US Cybersecurity Census Report

2022 US Cybersecurity Census Report

This report, Keeper’s second annual U.S. Cybersecurity Census, maps the transforming landscape of cybersecurity based on these expert insights. It provides leaders with a forensic assessment of the threats their businesses face, and details the urgent strategies necessary to overcome them.

(more available)
Added: September 29, 2022
image from VPN Risk Report 2021

VPN Risk Report 2021

The 2021 VPN Risk Report surveyed 357 cybersecurity professionals, providing insight into the current remote access environment, the state of VPN within the enterprise, the rise in VPN vulnerabilities, and the role that zero trust will play in enabling access to apps going forward.

(more available)
Added: September 29, 2022
image from Balancing Risk & Reward

Balancing Risk & Reward

This report is based on cybercrime attacks detected by the Digital Identity Network from July-December 2021, during near real-time analysis of consumer interactions across the customer journey, from new account creations, logins, payments and other non-core transactions such as password resets and transfers.

(more available)
Added: September 28, 2022
image from VPN Risk Report

VPN Risk Report

This report is based on the results of a comprehensive online survey of 351 IT and cybersecurity professionals, conducted in June 2022 to identify the latest enterprise adoption trends, challenges, gaps, and solution preferences related to VPN risk. The respondents range from technical executives to IT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: September 26, 2022
image from Quantifying the Public Vulnerability Market: 2022 Edition

Quantifying the Public Vulnerability Market: 2022 Edition

Omdia conducted a comprehensive comparative analysis of the output of 11 organizations that disclose information security vulnerabilities. The data collected for this report stems from multiple courses, including the following: primary internal research, individual vendor interviews, open course publications and publicly disclosed reports.

(more available)
Added: September 22, 2022
image from Gaming Respawned

Gaming Respawned

This SOTI report looks at current state of online gaming. it also examines the most pervasive threats coming from online criminals. Ans to fully explore the topic of attacks on gaming, we dig deeper into the data around web application and API attacks, Distributed Denial of Service (DDoS) trends, the overarching goals of attackers, and more. This report also explored the threat landscape that has grown out of the pandemic in the gaming industry and the impact of cyberattacks on gaming companies.

(more available)
Added: September 14, 2022
image from PwC's Global Economic Crime and Fraud Survey 2022

PwC's Global Economic Crime and Fraud Survey 2022

The year’s Global Economic Crime and Fraud Survey enquired about organizations’ attitudes towards fraud and financial and economic crime in the current environment and drew responses from 1,296 respondents in 53 countries and regions. This survey, our first snapshot of 2022, homed in on fraud trends and conduct risk.

(more available)
Added: September 6, 2022
image from 2022 Cyber Attack Trends: Mid-Year Report

2022 Cyber Attack Trends: Mid-Year Report

In this report we take a closer look at how cyber warfare has intensified to become an essential part of the preparation for, and conduct of, actual military conflict. Furthermore, we uncover what the fallout of this will be for governments and enterprises all over the world, even those that are not directly involved in the conflict.

(more available)
Added: August 26, 2022
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 20, 2025 16:09 UTC (build b1d7be4)