Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cyberwar

Below you will find reports with the tag of “Cyberwar”

image from Light Upon Cyber Insurance

Light Upon Cyber Insurance

The 3rd edition of the Lucy Study builds on a four-year history of objective comprehensive and robust data. The study lacks precision on the segment of small and micro companies. The number of insured companies - and there analyzed - is not yet sufficient in relation to the number of companies listed by INSEE.

(more available)
Added: October 15, 2024
image from Threat Intelligence Report 2023

Threat Intelligence Report 2023

Our annual Threat Intelligence Report is aimed at anyone interested in cybersecurity, from the technical specialist to the senior CISO. The main focus, however, is to guide decision-makers responsible for developing strategic plans for their organization’s cybersecurity to ensure that resources are well invested. Our report last year focused on technical challenges; this year’s report will focus on real-world changes and how they can impact your organization’s cybersecurity.

(more available)
Added: October 20, 2023
image from 2022 DDoS Threat Report

2022 DDoS Threat Report

The 2022 A10 Networks DDoS Threat Report provides insights into DDoS activity during the past six months including origins of activity; the growth of DDoS weapons and botnets; the role of malware in the propagation of DDoS weapons and attacks; and the steps organizations can take to protect against such activities.

(more available)
Added: October 11, 2022
image from 10 in 10 Report 2020

10 in 10 Report 2020

This report looks at the 10 most impactful factors in cybersecurity success for the next decade.

Added: September 27, 2020
image from The Dark Side of Russia

The Dark Side of Russia

This report takes a look at how Russia’s nationalism along with new internet laws are fueling Russian cybercrime.

Added: September 18, 2019
image from Cybersecurity Outlook 2018

Cybersecurity Outlook 2018

After analyzing the activities of cyber threat actors this year, the DomainTools Research Team has identified four key cybersecurity concerns that security teams, executives, consumers and government officials can expect to encounter next year. From hacked drones with the potential to cause physical harm, to advancing activity from North Korea and Hidden Cobra, this paper connects the dots between the past, present and future to help organizations get ready for the security challenges of 2018.

(more available)
Added: December 5, 2018
image from Cyber Threat Brief: US Recognizes Jerusalem As Capital Of Israel

Cyber Threat Brief: US Recognizes Jerusalem As Capital Of Israel

This report takes a look at the cyber threats that occurred when the US recognized Jerusalem as the Capital of Israel.

(more available)
Added: November 29, 2018
image from Cybersecurity Profile: The United States Of America

Cybersecurity Profile: The United States Of America

This report offers insight into the cyber security profile of the United States Of America.

Added: November 29, 2018
image from "Cyber Conflict" Decoy Document Used In Real Cyber Conflict

"Cyber Conflict" Decoy Document Used In Real Cyber Conflict

APT28 sent out a document disguising itself as a flyer relating to the Cyber Conflict U.S. conference. The document contains a VBA macro that executes a new variant of Seduploader. This article analyzes the document and the reconnaissance malware inside.

(more available)
Added: November 12, 2018
image from Dissecting the APT28 Mac OS X Payload

Dissecting the APT28 Mac OS X Payload

This report analyzes the Mac specific malware from APT28 named Trojan.MAC.APT28

Added: November 12, 2018
image from Russian Invasion of Georgia

Russian Invasion of Georgia

The Russian invasion of Georgia was preceded by an intensive build up of cyberattacks attempting to disrupt, deface and bring down critical Georgian governmental and civilian online infrastructure. The campaign has been reported in the media, with wide coverage suggesting the campaign was a spontaneous outburst of popular feeling in Russia lead by independent hackers. However, as this report suggests, the offensive was too large, coordinated, and sophisticated to be the work of independent hackers; the evidence leads by-and large to the Russian Business Network (RBN) in St. Petersburg, Russia. Whilst only a criminal investigation can directly prove the involvement of the Kremlin, both experts and commentators have accused Moscow of sponsoring the attacks as their magnitude requires the involvement of the kind of resources only a state-sponsor can provide.

(more available)
Added: November 9, 2018
image from Building A Threat Intelligence Program

Building A Threat Intelligence Program

This report provides a detailed analysis of survey data that was gathered to provide research findings on best practices and impact.

(more available)
Added: November 6, 2018
image from China's Evolving Approach To "Integrated Strategic Deterrence"

China's Evolving Approach To "Integrated Strategic Deterrence"

This report looks at China’s evolving approach to integrated strategic deterrence. Drawing on a variety of Chinese military writings, this report explores the origins of this concept, how it relates to Chinese development of counter-intervention capabilities, and how Beijing’s assessment of its external security environment influences its requirements.

(more available)
Added: October 25, 2018
image from Retaining The Army's Cyber Expertise

Retaining The Army's Cyber Expertise

In this report, they focus on issues related to retaining cyber soldiers. They use data from the Army’s personnel files to determine how many new soldiers are likely to meet the qualifications for this new MOS, as well as their expected retention rates. Specifically, they apply 17C enlist- ment requirements to all soldiers to determine how many meet the standards. They also use data on civilian occupa- tions to determine the earnings these soldiers are likely to be offered based on their military cyber training. To do this, they use the American Community Survey (ACS) data on all workers in information technology (IT)–related occupations.

(more available)
Added: October 25, 2018
image from Lessons From Others For Future U.S. Army Operations In And Through The Information Environment

Lessons From Others For Future U.S. Army Operations In And Through The Information Environment

This project sought to draw lessons from the efforts of others (both nation-state and nonstate actors) in and through the IE for future U.S. Army force planning and investment. These case studies of other forces can help the Army (1) identify capabilities and practices that it should consider adopting and (2) identify adversary capabilities and practices that it must be prepared to counter in future operations in and through the IE.

(more available)
Added: October 24, 2018
image from Russian Federation Country Profile 2017

Russian Federation Country Profile 2017

This paper gives a profile of the Russian Federation.

Added: October 24, 2018
image from BDO 2017 Cyber Governance Survey

BDO 2017 Cyber Governance Survey

This survey was created to act as a barometer to measure the involvement of public company directors in cyber-risk management.

(more available)
Added: October 23, 2018
image from Lessons From Others For Future U.S. Army Operations In And Through The Information Environment

Lessons From Others For Future U.S. Army Operations In And Through The Information Environment

This report offers the case studies used for the official report of the same name.

Added: October 23, 2018
image from 2017 Annual Threat Report

2017 Annual Threat Report

The object of this report is to answer the question, what will happen in 2018?

Added: October 22, 2018
image from Threat Actor - APT28

Threat Actor - APT28

This report takes a look at ATP28 a recognized state sponsored threat actor operating out of Russia.

Added: October 22, 2018
image from It Takes More than Offensive Capability to Have an Effective Cyberdeterrence Posture

It Takes More than Offensive Capability to Have an Effective Cyberdeterrence Posture

This paper presents the testimony, of Martin Libicki, presented before the House Armed Services Committee on March 1, 2017.

Added: October 21, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 24, 2025 04:08 UTC (build b1d7be4)