Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Database

Below you will find reports with the tag of “Database”

image from The Gamaredon Group Toolset Evolution

The Gamaredon Group Toolset Evolution

Unit 42 threat researchers have recently observed a threat group distributing new, custom developed malware. We have labelled this threat group the Gamaredon Group and our research shows that the Gamaredon Group has been active since at least 2013.

(more available)
Added: November 15, 2018
image from Lazarus Under The Hood

Lazarus Under The Hood

This paper is the result of forensic investigations by Kaspersky Lab at banks in two countries far apart. It reveals new modules used by Lazarus group and strongly links the tools used to attack systems supporting SWIFT to the Lazarus Group’s arsenal of lateral movement tools.

(more available)
Added: November 15, 2018
image from Breaking The Weekest Link Of The Strongest Chain

Breaking The Weekest Link Of The Strongest Chain

This post regards the following event - “Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor. The attack compromised their devices and exfiltrated data to the attackers’ command and control server. In addition, the compromised devices were pushed Trojan updates, which allowed the attackers to extend their capabilities. The operation remains active at the time of writing this post, with attacks reported as recently as February 2017.”

(more available)
Added: November 15, 2018
image from Evidence Aurora Operation Still Active: Supply Chain Attack Through CCleaner

Evidence Aurora Operation Still Active: Supply Chain Attack Through CCleaner

This post provides information related to supply chain infections.

Added: November 15, 2018
image from SecurityScorecard 2018 Healthcare Report

SecurityScorecard 2018 Healthcare Report

“In this year’s report, SecurityScorecard looked at more than 1200 healthcare companies from July 2017 through the end of the year and analyzed terabytes of information to assess risk across ten risk factors.”

(more available)
Added: November 4, 2018
image from 2017 Financial Cybersecurity Report

2017 Financial Cybersecurity Report

“To take a look at the cybersecurity health of financial institutions, this September, SecurityScorecard analyzed 2,924 financial institutions in the SecurityScorecard platform to find existing vulnerabilities within banks, investment firms, and other financial firms to determine the cybersecurity performance of the financial sector, especially as compared to other industries. Our team also analyzed the cybersecurity posture of the Top 20 highest performing FDIC-insured banks to understand what security factors pose risks to these financial institutions.”

(more available)
Added: November 4, 2018
image from 15 Server Privilege Management Use Cases For Unix & Linux

15 Server Privilege Management Use Cases For Unix & Linux

This white paper explains common use cases for privilege management on Unix/Linux servers.

Added: October 26, 2018
image from 2018 State Of Vulnerability Risk Management

2018 State Of Vulnerability Risk Management

This report offers an analysis into current trends in vulnerability risk management. It examines the attributes of security vulnerabilities viewed through a variety of lenses: Attributes of vulnerabilities published since 2002 versus those only recently published, Attributes of all vulnerabilities published in the National Vulnerability Database (NVD) in contrast with only those uploaded into our platform by our clients, Vulnerabilities broken down by industry vertical, CVSS score, product vendor and active exploitation in the wild.

(more available)
Added: October 26, 2018
image from An Attack Pathway Into Your Organization? There's An App For That

An Attack Pathway Into Your Organization? There's An App For That

Recommendations for securing and managing privileged credentials used by enterprise applications

Added: October 26, 2018
image from Cloud Infrastructure In The Federal Government

Cloud Infrastructure In The Federal Government

Many federal agencies have begun adoption of modern, agile approaches to software delivery, with the goal of building higher quality services faster and more cheaply. While there are significant barriers to the adoption of this paradigm in the federal government, this paper offers specific principles and practices that have already achieved success.

(more available)
Added: October 26, 2018
image from Cloud Security Trends: February 2018

Cloud Security Trends: February 2018

This is a report on cloud security trends.

Added: October 26, 2018
image from Identifying Insider Threats Through Machine Learning and Behavioral Analysis

Identifying Insider Threats Through Machine Learning and Behavioral Analysis

Given that the most important information resides in databases, organizations are increasingly turning their focus toward databases security technologies. To defend databases from attackers using stolen credentials, the industry is beginning to adopt a new security paradigm based on machine learning and behavior analysis. This white paper discusses that paradigm shift and the issues that go along with it.

(more available)
Added: October 26, 2018
image from The State Of The Kubernetes Ecosystem

The State Of The Kubernetes Ecosystem

This eBook gives a detailed breakdown of the current state of the Kubernetes Ecosystem.

Added: October 26, 2018
image from Unsecured Firebase Databases: Exposing Sensitive Data Via Thousands Of Mobile Apps

Unsecured Firebase Databases: Exposing Sensitive Data Via Thousands Of Mobile Apps

This report focuses on the Appthority Mobile Threat Team’s latest discovery, a new variant of the HospitalGown vulnerability which occurs when app developers fail to require authentication to a Google Firebase cloud database.

(more available)
Added: October 26, 2018
image from 2015 Insider Threat Report

2015 Insider Threat Report

Based on survey responses from more than 800 senior business managers and IT professionals in major global markets, the global edition of this report provides present-day insight an opinion not the host of data breach threats that enterprise organizations face on a daily basis.

(more available)
Added: October 25, 2018
image from 2015 Trustwave Global Security Report

2015 Trustwave Global Security Report

The writers of this report invite you to use the knowledge contained in this report to become your own master battlefield tactician, by getting to know your enemies in the cyber universe.

(more available)
Added: October 25, 2018
image from 2016 Hacked Website Report Q3

2016 Hacked Website Report Q3

This is an annual report that discusses the latest malware and hacking trends in compromised websites.

Added: October 25, 2018
image from 2016 State of Vulnerability Risk Management

2016 State of Vulnerability Risk Management

The goal of this report is to shed some light on the current threat landscape for organizations, assess the strengths and weaknesses of current vulnerability evaluation systems such as CVSS, (Common Vulnerability Scoring System) and explore additional metrics for determining the risk of a vulnerability.

(more available)
Added: October 25, 2018
image from Cloud Security Trends: October 2017

Cloud Security Trends: October 2017

This is a report on cloud security trends.

Added: October 25, 2018
image from Crowdstrike Services Casebook Report 2017

Crowdstrike Services Casebook Report 2017

This report provides key takeaways that can inform both executive stakeholders and security professionals how to respond to intrusions more effectively. Most importantly, it offers recommendations that organizations can implement proactively — right now — to improve their ability to prevent, detect and respond to attacks.

(more available)
Added: October 25, 2018
image from Cyber Insurance and Cybersecurity: The Convergence

Cyber Insurance and Cybersecurity: The Convergence

This 81 page report first highlights a few trends shaping the cyber insurance market and profiles 35 vendors that are catering to cyber insurers, brokers, and reinsurers. It is based on over 60 Aite Group interviews conducted between January and June 2016 with cybersecurity vendors, insurers, brokers, actuarial consultants, attorneys, and insureds’ risk managers and information security officers.

(more available)
Added: October 25, 2018
  • ««
  • «
  • 7
  • 8
  • 9
  • 10
  • 11
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 08:08 UTC (build b1d7be4)