Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Deep/Dark web

Below you will find reports with the tag of “Deep/Dark web”

image from 2021 Global Automotive Cybersecurity Report

2021 Global Automotive Cybersecurity Report

As a leader in automotive cybersecurity and automotive cyber threat intelligence, Upstream Security continually monitors and analyzes worldwide cyber incidents to protect the automotive ecosystem from cyber threats and misuse. (more available)
Added: January 11, 2023
image from 2022 Global Automotive Cybersecurity Report

2022 Global Automotive Cybersecurity Report

This report was created by analyzing 900+ publicly reported incidents that occurred since 2010, with an increase of more than 225% in the number of incidents taking place in 2021 alone, when compared to 2018. (more available)
Added: January 11, 2023
image from 2023 Global Automotive Cybersecurity Report

2023 Global Automotive Cybersecurity Report

This report marks Upstream’s fifth annual report, uncovering the expanding and emerging automotive cybersecurity risks, and how they impact the entire smart mobility ecosystem. (more available)
Added: January 11, 2023
image from 2021 Remote Workforce Security Report

2021 Remote Workforce Security Report

This Remote Workforce Security Report reveals the state of securing the new workforce. The report explores key challenges and unique security threats faced by organizations, technology gaps and preferences, investment priorities, and more. (more available)
Added: October 24, 2022
image from Trends in Cybersecurity Breaches: March 2021

Trends in Cybersecurity Breaches: March 2021

A survey of recent breaches occurring over the past year as identified and classified via AuditAnalytic’s commercial database of breach information. (more available)
Added: October 13, 2021
image from Ransomware Threat Report 2021

Ransomware Threat Report 2021

Using Unit 42’s threat intelligence and incident response teams, this report reviews the state of ransomware, focusing on the prevalence, size of payments, techniques, and firmographics of recent events. (more available)
Added: August 9, 2021
image from Global Incident Response Threat Report 2020

Global Incident Response Threat Report 2020

This report paints a picture of the evolving threat landscape by discussing the impact of COVID-19 and the U.S. presidential election as well as providing practices for security teams looking to fight back. (more available)
Added: November 1, 2020
image from 2020 Global Financial Crime Investigations Survey Report

2020 Global Financial Crime Investigations Survey Report

This report is based on a survey of investigators from over 150 organizations. It seeks to better understand financial crime and how companies deal with it. (more available)
Added: October 25, 2020
image from State of Cybersecurity Industry Exposure at Dark Web

State of Cybersecurity Industry Exposure at Dark Web

This research purports to help better understand the emerging risks and modern threat landscape both in qualitative and quantitative aspects, and to help cybersecurity companies better prioritize and address emerging cyber risks. (more available)
Added: September 8, 2020
image from Overstimulating: CARES Act Fraud On the Deep and Dark Web

Overstimulating: CARES Act Fraud On the Deep and Dark Web

After the CARES act was passed in March of 2020, fraudsters worked towards making money off of it. This report seeks to understand all of the components of fraud happening on the dark web in relation to the CARES act. (more available)
Added: July 29, 2020
image from The Underground Economy

The Underground Economy

This report compiles information gained by the Trustwave SpiderLabs who maintain a presence in some of the more prominent recess of the online criminal underground. (more available)
Added: September 18, 2019
image from The Dark Side of Russia

The Dark Side of Russia

This report takes a look at how Russia’s nationalism along with new internet laws are fueling Russian cybercrime.
Added: September 18, 2019
image from Dark Web 201: How to Leverage External Threat Hunting to Prevent Cyberattacks

Dark Web 201: How to Leverage External Threat Hunting to Prevent Cyberattacks

A necessary pillar of an effective cyber defense strategy is the capability to detect and mitigate threats at the earliest stages of the cyber kill chain. (more available)
Added: September 18, 2019
image from Predictive Prioritization: Data Science Lets You Focus On the 3% Of Vulnerabilities Likely To Be Exploited

Predictive Prioritization: Data Science Lets You Focus On the 3% Of Vulnerabilities Likely To Be Exploited

This technical whitepaper explains the challenges cybersecurity professionals face, how they’re prioritizing vulnerabilities today and how they can dramatically improve cyber risk management with Predictive Prioritization – the process of re-prioritizing vulnerabilities based on the probability that they will be leveraged in an attack. (more available)
Added: July 10, 2019
image from Healthcare Cyber Heists in 2019

Healthcare Cyber Heists in 2019

20 Leading CISO’s from the healthcare industry offer their perspective on evolving cyberattacks, ransomware & the biggest concerns to their organizations. (more available)
Added: July 10, 2019
image from SSL/TLS Certificates and Their Prevalence on the Dark Web (First Report)

SSL/TLS Certificates and Their Prevalence on the Dark Web (First Report)

To shine a light on the availability of SSL/TLS certificates on the dark web, the Evidence-based Cybersecurity Research Group at the Andrew Young School of Policy Studies at Georgia State University and the University of Surrey spearheaded a research program, sponsored by Venafi. (more available)
Added: May 3, 2019
image from The Threat Intelligence Handbook

The Threat Intelligence Handbook

This e-book provides a practical guide for security teams to “unlock” the power of intelligence.
Added: April 23, 2019
image from Rating Companies on Third-Party Cyber Risk

Rating Companies on Third-Party Cyber Risk

This report offers insight into the need for a cyber risk ratings system.
Added: March 26, 2019
image from The Anatomy of Account Takeover Fraud

The Anatomy of Account Takeover Fraud

This report offers an inside look into how accounts are hacked and taken over.
Added: February 16, 2019
image from "Anonymous Slovakia" Targets NATO and EU Sites

"Anonymous Slovakia" Targets NATO and EU Sites

From the report, “On November 26th, Slovakian Anonymous leader ‘Abaddon’ posted in the deep web message board ‘Hidden Answers’, looking to recruit accomplices for an operation targeting NATO and EU websites. (more available)
Added: January 31, 2019
image from The Changing Face of Online Banking and Financial Fraud

The Changing Face of Online Banking and Financial Fraud

This report seeks to review the dramatic changes that took place in the banking industry in 2018, and lay out a strategy for those institutions in 2019. (more available)
Added: January 31, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 8, 2023 20:08 UTC (build 051771c)