Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Email and web

Below you will find reports with the tag of “Email and web”

image from Threat Spotlight: Spear-phishing Attacks Targeting Education Sector

Threat Spotlight: Spear-phishing Attacks Targeting Education Sector

This report looks into spear-phishing attacks as the education sector has moved to be remote. It looks at trends in ways they are targeting schools, as well as solutions organizations can use to defend against these attacks. (more available)
Added: October 29, 2020
image from Phishing Attack Landscape Report 2020

Phishing Attack Landscape Report 2020

This report shows the latest trends, challenges, and best practices for email security, designed to help organizations better protect against today’s threats. (more available)
Added: October 20, 2020
image from 2020 End User Phishing Report: Business Beware

2020 End User Phishing Report: Business Beware

This report is based on the results of a comprehensive interactive survey of 1,123 users in the United States, conducted in September 2020, who received 10 emails and were asked to identify whether each email was authentic or a phishing attack. (more available)
Added: October 20, 2020
image from H2 2020 Email Fraud & Identity Deception Trends

H2 2020 Email Fraud & Identity Deception Trends

This biannual report from Agari goes in-depth on changes and trends in email and identity fraud for the second half of 2020. (more available)
Added: September 2, 2020
image from Threat Spotlight: Lateral Phishing

Threat Spotlight: Lateral Phishing

Teaming up with leading researchers at UC Berkeley and UC San Diego, Barracuda researchers uncovered a new and growing type of account takeover attack: lateral phishing. (more available)
Added: September 1, 2020
image from Abnormal Quarterly BEC Report Q2 2020

Abnormal Quarterly BEC Report Q2 2020

The second Abnormal Security Quarterly BEC Report examines the business email compromise (BEC) threat landscape during what may be the most tumultuous quarter in modern business history: the first full quarter of the COVID-19 pandemic. (more available)
Added: September 1, 2020
image from 2018 Global Security Report

2018 Global Security Report

Year end report from AppRiver using telemetry from the AppRiver security products and events observed by the AppRiver Security Analysts.
Added: June 13, 2020
image from 2019 Email Threat Survey Report Europe Under Siege

2019 Email Threat Survey Report Europe Under Siege

Agari recently surveyed 305 senior European IT security professionals to better understand the region’s email threat landscape from the perspective of those fighting on the front lines against business email compromise (BEC), spear phishing, and other targeted email attacks. (more available)
Added: February 9, 2020
image from 2020 Cyber Trendscape report

2020 Cyber Trendscape report

The goal of this initiative was to identify trends impacting cyber security decisions, the top cyber security priorities for 2020 and beyond, the focus of risk mitigation strategies, and to highlight the overall beliefs and perceptions held by senior executives regarding the state of the cyber threat landscape and how the cyber security industry, governments and regulatory agencies are responding to their needs. (more available)
Added: November 25, 2019
image from 2019 Security Technology Spend Insights Report

2019 Security Technology Spend Insights Report

This paper discusses the top five Cybersecurity Technology Buying Trends.
Added: September 18, 2019
image from Email: Click with Caution

Email: Click with Caution

This report offers insights into the 40 year history of spam. It discusses what this means for business, and how the new spam has surpassed the spam of 40 years ago. (more available)
Added: July 10, 2019
image from The Future Of Email Security In The Cloud

The Future Of Email Security In The Cloud

This white paper will guide security teams as they reexamine their approach to cloud-based email.
Added: April 19, 2019
image from Beyond Uncle Sam: Analyzing The Security Posture Of U.S. Government Contractors And Subcontrators

Beyond Uncle Sam: Analyzing The Security Posture Of U.S. Government Contractors And Subcontrators

From the report, “A growing list of contractors and subcontractors have disclosed that they have been victims of data breaches resulting in the compromise of sensitive government information. (more available)
Added: February 17, 2019
image from Can Lightning Strike US Elections Twice?: Email Spoofing Threat To The 2018 US Midterm Elections

Can Lightning Strike US Elections Twice?: Email Spoofing Threat To The 2018 US Midterm Elections

As the November 2018 US midterm elections looms, Anomali Labs set forth to answer the cyber version of the old myth “lightning never strikes the same place twice” — replaced with “can email spoofing attacks really strike the US elections twice”. (more available)
Added: November 29, 2018
image from Whaling Anatomy Of An Attack: Protecting Your Organization From CEO Email Scams

Whaling Anatomy Of An Attack: Protecting Your Organization From CEO Email Scams

This book takes a look at “whaling” scams. Or largescale phishing attacks. It offers some analysis and insight into how these scams can be avoided. (more available)
Added: October 24, 2018
image from The ROPEMAKER Email Exploit

The ROPEMAKER Email Exploit

This threat advisory offers insight into the ROPEMAKER Email Exploit.
Added: October 23, 2018
image from Winning The War On Ransomware

Winning The War On Ransomware

This is an infographic that can help your organization understand and win the war on Ransomware.
Added: October 23, 2018
image from Five Phishing Predictions 2018

Five Phishing Predictions 2018

This report offers some significant predictions of phishing attacks in 2018.
Added: October 22, 2018
image from The Nervous, The Vigilant, And The Battle-Scarred: IT Security Personas Revealed

The Nervous, The Vigilant, And The Battle-Scarred: IT Security Personas Revealed

This book offers some insight into email cybersecurity issues. It posits that email doesn’t have to be scary.
Added: October 22, 2018
image from Email Impersonation Attacks: A Clear And Present Danger

Email Impersonation Attacks: A Clear And Present Danger

Sponsored by Valimail, Email Impersonation Attacks: A Clear & Present Danger, was conducted by Ponemon Institute to understand the challenges organizations face to protect end-users from email threats, such as impersonation attacks. (more available)
Added: October 21, 2018
image from Email Archiving: It's Time For An Update

Email Archiving: It's Time For An Update

This report offers a guide to understanding the importance of email archiving.
Added: October 20, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2021
Library updated: February 27, 2021 04:06 UTC (build 7e736b2)