Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cybercrime Market

Below you will find reports with the tag of “Cybercrime Market”

image from Q3 2024 Threat Landscape Report

Q3 2024 Threat Landscape Report

Nuspire has witnessed shifting trends in the ransomware, dark web and exploit sections of our report. Our research revealed that ransomware extortion publications increased by 8%, Lumma Stealer fiercely reclaimed its top spot as the leading infostealer, and threat actors are focusing heavily on exploiting VPN technology.

(more available)
Added: February 1, 2025
image from The Correlation Between Dark Web Exposure and Cybersecurity Risk

The Correlation Between Dark Web Exposure and Cybersecurity Risk

In this report, Marsh McLennan’s team demonstrated a statistically significant correlation between all of our dark web intelligence sources - including (but not limited to) dark web market listings, hacking forum chatter, and dark web traffic to and from the corporate network - and an increased likelihood of suffering a cybersecurity incident. Put simply: the presence of any dark web findings related to an organization - without exception - was associated with a higher likelihood of a breach.

(more available)
Added: November 25, 2024
image from Blame the Women

Blame the Women

Alto’s methodology employs a data-first approach with the objective of supporting experts and practitioners establish an evidence-based understanding of the complex, multivariate nature of extremism and radicalization online and its multi-layered relationship with: the vulnerabilities linked to certain narratives and ideologies that constitute a part of public discourse and can be weaponized with specific aims. this report does highlight specific domains, channels and other digital spaces to aid practitioners in understanding the mechanics of the digital spaces analyzed.

(more available)
Added: August 10, 2024
image from Internet Organized Crime Threat Assessment (IOCTA) 2024

Internet Organized Crime Threat Assessment (IOCTA) 2024

In this report, cybercriminal landscape remained diverse, comprising both lone actors and criminal networks offering a wide range of expertise and capabilities. Some cybercriminals targeting the EU were based within the EU, while others preferred to operate from abroad, concealing their illicit operations and funds in third countries. The use of deepfakes is another area of concern as this is a powerful addition to the cybercriminal toolbox.

(more available)
Added: July 25, 2024
image from Global Threat Landscape Report 2H 2023

Global Threat Landscape Report 2H 2023

In the second half of 2023, the cybersecurity landscape saw a range of significant developments that have considerably impacted the digital attack surface. Notable among these was the rise in sophisticated cyberattacks targeting large-scale entities and essential infrastructure. The findings in this report represent the collective intelligence of FortiGuard Labs, drawn from a vast array of network sensors collecting threat events each day observed in live production environments around the world from more than 600K+ environments and 10M+ sensors capturing every detail about threats that hit our detection technology.

(more available)
Added: May 14, 2024
image from 2024 Global Automotive Cybersecurity Report

2024 Global Automotive Cybersecurity Report

Connectivity is continuing to transform the Automotive and Smart Mobility ecosystem, increasing cybersecurity risks as more functionality is exposed. 2023 marked the beginning of a new era in automotive cybersecurity. Each attack carries greater significance today, and may have global financial and operational repercussions for various stakeholders. Upstream’s 2024 Global Annual Cybersecurity Report examines how cybersecurity risks have evolved from experimental hacks into large-scale risks, focusing on safety and trust, operational availability, data privacy, and financial implications.

(more available)
Added: February 14, 2024
image from H1'2023 Automotive Cyber Trend Report

H1'2023 Automotive Cyber Trend Report

In this report, we’ll discuss three automotive-related cybersecurity emerging risks we’ve identified in 2023, arising from the rapid proliferation of SDVs. Growth in backend attacks allowing access to sensitive vehicle data and controls, the ever-evolving SBOM and the critical role it plays in enhancing automotive threat intelligence and cyber are on the rise in the agriculture, construction, and heavy machinery industries that fare fast to adopt software-defined and autonomous capabilities.

(more available)
Added: December 15, 2023
image from The State of Supply Chain Defense Global Insights Report 2023

The State of Supply Chain Defense Global Insights Report 2023

In this year’s survey, they revisited questions around how organizations are developing effective third-party cyber risk management (C-TPRM) programs with robust technology and services and determining how to best collaborate with third parties on their shared security posture. They also asked some new questions related to how organizations refine their risk management approaches over time. To assure an accurate reflection of industry trends and observations, BlueVoyant commissioned its fourth annual survey undertaken by independent research organization, Opinion Matters, in October 2023. A total of 2,100 respondents represent a variety of executive roles within their organizations, but are all responsible for managing supply chain and cyber risk.

(more available)
Added: December 12, 2023
image from 2023 Identity Threat Report: The Unpatchables

2023 Identity Threat Report: The Unpatchables

The purpose of this report is to assess and summarize the current threat landscape facing organizations as a result of the digital identities that they issue to legitimate users. We called this report “The Unpatchables” because digital identities represent a source of technical risk that is impossible to completely mitigate even in theory.

(more available)
Added: November 2, 2023
image from Balancing Third-Party Risk

Balancing Third-Party Risk

This report is different in that we’re focusing on explicit relationships that are manually configured by organizations using RiskRecon’s platform. In other words, we’re examining curated portfolios of vendors and suppliers tracked as part of organizations’ third-party risk management program. We started with a dataset extracted from RiskRecon’s platform consisting of over 100,000 primary organizations and more than 300,000 monitored third-party relationships. We’re focusing on direct relationships in this report, but the data supports the analysis of indirect (fourth- to nth-party) relationships.

(more available)
Added: May 23, 2023
image from 2021 Identity Breach Report

2021 Identity Breach Report

In 2020, Constella Intelligence’s threat intelligence team detected over 8,500 breaches and leakages circulating in dark markets and underground forums, representing nearly 12 billion records. Constella analyzed a significant portion of the breaches and leakages detected in underground marketplaces in 2020, constituting a 32% increase in the total volume of breaches and leakages analyzed in 2019. Constella’s 2021 Breach Report offers insights into these cyber threats and the impact of malign activities fueled by breach data circulating on the deep and dark web.

(more available)
Added: April 25, 2023
image from Constella Intelligence 2023 Identity Breach Report

Constella Intelligence 2023 Identity Breach Report

Constella’s threat intelligence team continuously collects identity records from data breaches and leakages found in open sources, on the surface, social, deep, and dark web, to track data related company breaches and the specific personally identifiable information (PII) exposed that represents a risk to organizations and their employees and customers. In this report, we detail the implications of the proliferation of info stealers and botnet malware and what these threats mean for the security of consumers and companies.

(more available)
Added: April 25, 2023
image from Ransomware and Extortion Report

Ransomware and Extortion Report

In the 2023 Unit 42 Ransomware Threat Report explores recent incident response cases, as well as our threat intelligence analysts’ assessment of the larger threat landscape. It also offers predictions for how we believe threat actors will use ransomware and extortion tactics going forward. As of late 2022, threat actors engaged in data theft in about 70% of cases on average, Compare this to mid-2021, and we saw data theft in only about 40$ of cases on average. Threat actors often threaten to leak stolen data on dark web leak sites, which are increasingly a key component of their efforts to extort organizations.

(more available)
Added: March 27, 2023
image from The State of Secrets Sprawl 2023

The State of Secrets Sprawl 2023

This report will serve as a valuable resource for developers, security professionals, and decisions-makers committed to ensuring the security and integrity of their applications and data. We have never detected as many secrets and secrets sprawl has been accelerating yearly since 2020. Hard-coded secrets increased by 67% compared to 2021, whereas the volume of scanned commits rose by 20% (860M to 1.027B commits between 2021 and 2022).

(more available)
Added: March 11, 2023
image from Ransomware Spotlight Report 2023

Ransomware Spotlight Report 2023

In this report, we have examined the existing gaps in MITRE repositories and how they inhibit security teams from understanding their true threat context. We also introduce Securin’s Vulnerability Risk Score (VRS), an vulnerability ranking system that can help organizations prioritize vulnerabilities based on their risk factors, threat associations, exploitability, and criticality.

(more available)
Added: March 7, 2023
image from The Ransomware Ecosystem

The Ransomware Ecosystem

Our goal with this report is to help demystify the ransomware ecosystem by exploring the key players involved, as well as the techniques and tactics utilized by ransomware operations and their affiliates to infiltrate organizations and distribute ransomware payloads. We also provide a list of the most common vulnerabilities likely to be exploited as part as a ransomware attack, to help security practitioners prioritize remediation.

(more available)
Added: March 6, 2023
image from 2022 Identity Breach Report

2022 Identity Breach Report

Constella’s 2022 Breach Report offers key insights into these cyber threats and the staggering impact of malign activities fueled by breach data circulating on the deep and dark web. The following key findings represent the most significant and relevant trends for individuals, businesses, brands, and public organizations. This report also includes an extended analysis examining the ongoing conflict in Ukraine.

(more available)
Added: February 15, 2023
image from 2021 Global Automotive Cybersecurity Report

2021 Global Automotive Cybersecurity Report

As a leader in automotive cybersecurity and automotive cyber threat intelligence, Upstream Security continually monitors and analyzes worldwide cyber incidents to protect the automotive ecosystem from cyber threats and misuse. This report was created by analyzing 633 publicly reported incidents since 2010, 207 of them in 2020 as of November 25, 2020.

(more available)
Added: January 11, 2023
image from 2022 Global Automotive Cybersecurity Report

2022 Global Automotive Cybersecurity Report

This report was created by analyzing 900+ publicly reported incidents that occurred since 2010, with an increase of more than 225% in the number of incidents taking place in 2021 alone, when compared to 2018. Our researchers have carefully categorized the data we have collected, analyzing each incident’s attack methods, attack vectors, impact, target industries, and many other aspects.

(more available)
Added: January 11, 2023
image from 2023 Global Automotive Cybersecurity Report

2023 Global Automotive Cybersecurity Report

This report marks Upstream’s fifth annual report, uncovering the expanding and emerging automotive cybersecurity risks, and how they impact the entire smart mobility ecosystem.

(more available)
Added: January 11, 2023
image from Financial Trend Analysis

Financial Trend Analysis

The information in this report is based on ransomware-related information obtained from analysis of BSA data, trade publications, and commercial reporting, as well as insights from law enforcement and other partners. Trends represented in this report illustrate financial institutions’ identification and reporting of ransomware events and may not reflect the actual dates associated with ransomware incidents.

(more available)
Added: November 2, 2022
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 00:08 UTC (build b1d7be4)