Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from 2020 End User Phishing Report: Business Beware

2020 End User Phishing Report: Business Beware

This report is based on the results of a comprehensive interactive survey of 1,123 users in the United States, conducted in September 2020, who received 10 emails and were asked to identify whether each email was authentic or a phishing attack. The results provide insights into the latest trends in user behavior, challenges and gaps related to phishing attacks.

(more available)
Added: October 20, 2020
image from Looking Into the Eye of the Interplanetary Storm

Looking Into the Eye of the Interplanetary Storm

This article offers a glimpse into the inner workings of the Interplanetary Storm botnet, provides an exhaustive technical analysis of the Golang-written binaries along with an overview of the protocol internals and finally, some attribution information.

(more available)
Added: October 18, 2020
image from New Vulnerability Found: Executive Overconfidence

New Vulnerability Found: Executive Overconfidence

This report attempts to understand the theory and practice of web application security in organizations worldwide.

Added: October 14, 2020
image from Cybersecurity: The Human Challenge

Cybersecurity: The Human Challenge

This study provides new insights into the state of cybersecurity skills and resources across the globe.

Added: October 14, 2020
image from 2020 SMB IT Security Report

2020 SMB IT Security Report

This report focuses on cybersecurity for small and medium sized businesses for 2020. It goes over how cyber attacks have changed, how remote work has an effect, and more.

(more available)
Added: October 7, 2020
image from 2020 State of Malware Report

2020 State of Malware Report

This report goes in-depth into the changes in malware attacks for 2020, using data collected from honey pots, telemetry, and research conducted by threat analysts and reporters in 2019.

(more available)
Added: September 28, 2020
image from What's Lurking in the Shadows 2020?

What's Lurking in the Shadows 2020?

This report provides recommendations on how companies can manage the threat posed by shadow IoT devices.

Added: September 27, 2020
image from When the World Stayed Home

When the World Stayed Home

This report was compiled from interviews with 1,004 company leaders in order to find the effect of remote work on their companies.

(more available)
Added: September 27, 2020
image from 2020 State of Hybrid Cloud Security

2020 State of Hybrid Cloud Security

FireMon’s second annual State of Hybrid Cloud Security report dives into how the proliferation of cloud environments is impacting enterprises and their ability to scale and protect them.

(more available)
Added: September 25, 2020
image from Threat Landscape for Industrial Automation Systems H1 2020

Threat Landscape for Industrial Automation Systems H1 2020

This report from Kaspersky explains changes in the threat landscape for industrial automation systems for the first half of 2020. It goes in detail on the variety of malware, the main threat sources, regional differences, and more.

(more available)
Added: September 25, 2020
image from What Decision Makers Can Do About Data Protection

What Decision Makers Can Do About Data Protection

Protecting data to ensure appropriate usage and avoid unauthorized or inappropriate usage is a major task for decision makers with responsibility for protecting the integrity of corporate data assets. This report tries to show decision makers how to go about this.

(more available)
Added: September 25, 2020
image from DDoS Threat Report Q2 2019

DDoS Threat Report Q2 2019

This quarterly threat report offers insight into the DDoS attacks that occurred in the 2nd quarter of 2019.

Added: September 16, 2020
image from DDoS Threat Report Q1 2019

DDoS Threat Report Q1 2019

This quarterly threat report offers insight into the DDoS attacks that occurred in the 1st quarter of 2019.

Added: September 16, 2020
image from DDoS Threat Report Q3 2019

DDoS Threat Report Q3 2019

This report takes a look at the DDoS threats that occurred in the third quarter of 2019.

Added: September 16, 2020
image from State of Cybersecurity Industry Exposure at Dark Web

State of Cybersecurity Industry Exposure at Dark Web

This research purports to help better understand the emerging risks and modern threat landscape both in qualitative and quantitative aspects, and to help cybersecurity companies better prioritize and address emerging cyber risks.

(more available)
Added: September 8, 2020
image from Third-Party Security Signals: Exposing the reality of unsafe network services

Third-Party Security Signals: Exposing the reality of unsafe network services

Using RiskRecon’s telemetry of the public risk surface of thousands of organizations, this report takes a look at services which are commonly viewed as unsafe. The prevalence and co-occurrence of these services is used as a indicator of other hygiene and risk indicators at firms.

(more available)
Added: September 2, 2020
image from Under the Hoodie 2019

Under the Hoodie 2019

A review of 180 engagements performed by Rapid7 consulting, supplemented by a survey of questions given to all Rapid7 consulting customers. Addresses lessons learned from this events.

(more available)
Added: August 28, 2020
image from Under the Hoodie 2020

Under the Hoodie 2020

A review of lessons learned over the past year from Rapid7’s penetration testing services. Combined with survey day on social engineering and red team simulations of 206 engagements.

(more available)
Added: August 28, 2020
image from Enduring from home

Enduring from home

A survey of 200 IT professionals on the readiness and impact of COVID-19 upon cyber security.

Added: August 20, 2020
image from The CISO Current Report, Q2 2020

The CISO Current Report, Q2 2020

This paper compiles observations as well as predictions on the state of cybersecurity in 2020.

Added: August 17, 2020
image from Upstream Security's Global Automotive Cybersecurity Report 2020

Upstream Security's Global Automotive Cybersecurity Report 2020

This report highlights research into cyber-attack trends in the smart mobility ecosystem.

Added: July 31, 2020
  • ««
  • «
  • 10
  • 11
  • 12
  • 13
  • 14
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 22, 2025 12:09 UTC (build b1d7be4)