Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cybercrime market

Below you will find reports with the tag of “Cybercrime market”

image from 2021 Global Automotive Cybersecurity Report

2021 Global Automotive Cybersecurity Report

As a leader in automotive cybersecurity and automotive cyber threat intelligence, Upstream Security continually monitors and analyzes worldwide cyber incidents to protect the automotive ecosystem from cyber threats and misuse. (more available)
Added: January 11, 2023
image from 2022 Global Automotive Cybersecurity Report

2022 Global Automotive Cybersecurity Report

This report was created by analyzing 900+ publicly reported incidents that occurred since 2010, with an increase of more than 225% in the number of incidents taking place in 2021 alone, when compared to 2018. (more available)
Added: January 11, 2023
image from 2023 Global Automotive Cybersecurity Report

2023 Global Automotive Cybersecurity Report

This report marks Upstream’s fifth annual report, uncovering the expanding and emerging automotive cybersecurity risks, and how they impact the entire smart mobility ecosystem. (more available)
Added: January 11, 2023
image from Financial Trend Analysis

Financial Trend Analysis

The information in this report is based on ransomware-related information obtained from analysis of BSA data, trade publications, and commercial reporting, as well as insights from law enforcement and other partners. (more available)
Added: November 2, 2022
image from 2021 Remote Workforce Security Report

2021 Remote Workforce Security Report

This Remote Workforce Security Report reveals the state of securing the new workforce. The report explores key challenges and unique security threats faced by organizations, technology gaps and preferences, investment priorities, and more. (more available)
Added: October 24, 2022
image from Media Industry Cybersecurity Challenges

Media Industry Cybersecurity Challenges

BlueVoyant performed a cyber posture analysis of the vendors in the media industry sector. The approach was to identify and analyze the most prevalent vendors in the industry, as well as look at the extended vendor ecosystem for comparison, to gain a deep understanding of the issues the industry is facing. (more available)
Added: August 31, 2022
image from The State of Password Security In The Enterprise

The State of Password Security In The Enterprise

A recent Authentication Security Strategy survey by Enzoic and Redmond magazine revealed insights into the way that passwords are currently being used in various organizations, and what the future looks like regarding this ubiquitous authentication method. (more available)
Added: May 31, 2022
image from IsaacWiper Continues Trend of Wiper Attacks Against Ukraine

IsaacWiper Continues Trend of Wiper Attacks Against Ukraine

This report is a technical overview of the IsaacWiper malware reported by ESET. The malware was primarily delivered to Ukrainian organizations coincident with the Russian invasion of Ukraine. (more available)
Added: April 14, 2022
image from Follow the Money: Understanding the money laundering techniques that support large-scale cyber-heists

Follow the Money: Understanding the money laundering techniques that support large-scale cyber-heists

This report describes how money laundering is typically performed in the context of large-scale cyber heists. It illustrates key parts of the typical processes used by cyber criminals with examples to help better inform readers on areas they should focus on to better prevent, detect and respond to money laundering. (more available)
Added: January 26, 2022
image from Trends in Cybersecurity Breaches: March 2021

Trends in Cybersecurity Breaches: March 2021

A survey of recent breaches occurring over the past year as identified and classified via AuditAnalytic’s commercial database of breach information. (more available)
Added: October 13, 2021
image from Ransomware Threat Report 2021

Ransomware Threat Report 2021

Using Unit 42’s threat intelligence and incident response teams, this report reviews the state of ransomware, focusing on the prevalence, size of payments, techniques, and firmographics of recent events. (more available)
Added: August 9, 2021
image from 2020 Year End Report: Data Breach QuickView

2020 Year End Report: Data Breach QuickView

This report looks at data breach events in 2020. It then compares key aspects and trends of these breaches to data breaches in previous years. (more available)
Added: January 21, 2021
image from Global Incident Response Threat Report 2020

Global Incident Response Threat Report 2020

This report paints a picture of the evolving threat landscape by discussing the impact of COVID-19 and the U.S. presidential election as well as providing practices for security teams looking to fight back. (more available)
Added: November 1, 2020
image from 2020 Global Financial Crime Investigations Survey Report

2020 Global Financial Crime Investigations Survey Report

This report is based on a survey of investigators from over 150 organizations. It seeks to better understand financial crime and how companies deal with it. (more available)
Added: October 25, 2020
image from State of Cybersecurity Industry Exposure at Dark Web

State of Cybersecurity Industry Exposure at Dark Web

This research purports to help better understand the emerging risks and modern threat landscape both in qualitative and quantitative aspects, and to help cybersecurity companies better prioritize and address emerging cyber risks. (more available)
Added: September 8, 2020
image from Overstimulating: CARES Act Fraud On the Deep and Dark Web

Overstimulating: CARES Act Fraud On the Deep and Dark Web

After the CARES act was passed in March of 2020, fraudsters worked towards making money off of it. This report seeks to understand all of the components of fraud happening on the dark web in relation to the CARES act. (more available)
Added: July 29, 2020
image from State of the Internet: Credential Stuffing in the Media Industry

State of the Internet: Credential Stuffing in the Media Industry

Akamai examines the attack trends in the media sector over a 24-month period. This research is based on data gathered during regular Akamai operations and is based on a large volume of real events. (more available)
Added: July 24, 2020
image from 2020 Cybersecurity Outlook Report

2020 Cybersecurity Outlook Report

An annual report using Carbon Black’s data sets of the Carbon Black Cloud customer footprint, Carbon Black User Exchange, public samples, Carbon Black Endpoint Standard data, and internal sources. (more available)
Added: July 22, 2020
image from Why consumers don’t understand card fraud…

Why consumers don’t understand card fraud…

To understand how consumers felt about card fraud against this changing landscape, we surveyed 4,000 consumers across the U.S. and the U. (more available)
Added: May 11, 2020
image from How Lucrative are Vulnerabilities? A Closer Look at the Economics of the Exploit Supply Chain

How Lucrative are Vulnerabilities? A Closer Look at the Economics of the Exploit Supply Chain

this report t explores the vulnerability-to-exploit (V2E) cybercrime and cybersecurity supply chain, outlines the players in the different market segments and provides insights into the related economic drivers. (more available)
Added: November 26, 2019
image from The Underground Economy

The Underground Economy

This report compiles information gained by the Trustwave SpiderLabs who maintain a presence in some of the more prominent recess of the online criminal underground. (more available)
Added: September 18, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 8, 2023 16:09 UTC (build 051771c)