Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Extortion

Below you will find reports with the tag of “Extortion”

image from Five lessons from 1,000 destructive ransomware events

Five lessons from 1,000 destructive ransomware events

RiskRecon studied 1,000 publicly reported destructive ransomware events that occurred between January 2016 and November 2022. These publicly reported events were identifies through internet keyword searches, monitoring of event disclosure sites, dark web sites, and 8K SEC filings. Events in which the impact was limited to data theft were excluded.

(more available)
Added: January 19, 2023
image from Global Cybersecurity Outlook 2022

Global Cybersecurity Outlook 2022

The Global Cybersecurity Outlook flagship report identifies the trends and analyzes the near-term future cybersecurity challenges. The accelerated shift to remote working during the COVID-19 pandemic coupled the recent high-profile cyberattacks have resulted in bringing cybersecurity top of mind among key decision-makers in organizations and nations.

(more available)
Added: January 19, 2023
image from 2022 Securonix Threat Report

2022 Securonix Threat Report

The 2022 Securonix Threat Report highlights the trends, required data, and detection summaries for key trends. Additionally, our report covers the techniques we’ve seen from the trenches across insider threat, cloud infrastructure misuse/abuse, and preemptive ransomware detection. Finally, we added a new section in this report covering loT/OT.

(more available)
Added: January 11, 2023
image from January 2023 Threat Horizon Report

January 2023 Threat Horizon Report

The Google Cloud Threat Horizons Report brings decision-makers strategic intelligence on threats to cloud enterprise users and the best original cloud-relevant research and security recommendations from throughout Google’s intelligence and security teams.

(more available)
Added: January 11, 2023
image from 2021 Global Automotive Cybersecurity Report

2021 Global Automotive Cybersecurity Report

As a leader in automotive cybersecurity and automotive cyber threat intelligence, Upstream Security continually monitors and analyzes worldwide cyber incidents to protect the automotive ecosystem from cyber threats and misuse. This report was created by analyzing 633 publicly reported incidents since 2010, 207 of them in 2020 as of November 25, 2020.

(more available)
Added: January 11, 2023
image from 2023 Global Automotive Cybersecurity Report

2023 Global Automotive Cybersecurity Report

This report marks Upstream’s fifth annual report, uncovering the expanding and emerging automotive cybersecurity risks, and how they impact the entire smart mobility ecosystem.

(more available)
Added: January 11, 2023
image from Deepwatch SecOps Pulse Survey Q4 2022

Deepwatch SecOps Pulse Survey Q4 2022

The Deepwatch SecOps Pulse Survey research shows that security teams are more focused on improving response capabilities over detection improvements. This speaks to rising threats and an expanding attack surface that makes attacks nearly inevitable, forcing teams to prioritize limited resources.

(more available)
Added: December 22, 2022
image from Threat Intelligence Report -Q2 2022

Threat Intelligence Report -Q2 2022

This report leveraged the Fortinet service to provide a deep dive into what adversaries are seeing, doing, and planning, enabling organizations to better understand the threats posed by the growth of criminal forums and markets operating on the darknet. The report covers global, regional, and industry/sector threat landscape perspective as well as protection recommendations for IT and OT organizations for darknet activity observed during Q2 2022.

(more available)
Added: December 22, 2022
image from 2022 Falcon OverWatch Threat Hunting Report

2022 Falcon OverWatch Threat Hunting Report

This year’s report starts with a close look at OverWatch’s extensive dataset covering observed interactive threat actor behaviors, which we will refer to in this report as “intrusion activity.” It uses this data to examine how and where adversaries are operating to provide a comprehensive overview of the threat landscape.

(more available)
Added: December 20, 2022
image from Tenable's 2021 Threat Landscape Retrospective

Tenable's 2021 Threat Landscape Retrospective

The goal of this report is to help defenders understand the fulls cope of today’s modern attack surface so they can continue to refine their cybersecurity strategies and reduce risk. In this report, we explore the most notable vulnerabilities of the year and how they were used in attack chains, with specific focus on the value of Active Directory to threat actors.

(more available)
Added: December 16, 2022
image from Cyber Insurance Research Report

Cyber Insurance Research Report

Our hope is the results of the survey report and our expert analysis helps you prepare for obtaining and renewing cyber insurance, with coverage and rates that accurately reflect your risk profile.

(more available)
Added: December 9, 2022
image from Automotive Cybersecurity in 2022

Automotive Cybersecurity in 2022

In our report, we investigate the cyberthreats that have been launched on the automotive industry in 2021 and 2022. We dig into the most prominent attacks, point out high-risk areas that could be targeted in the future, and give our security recommendations and predictions for 2023.

(more available)
Added: November 29, 2022
image from Managing Human Risk

Managing Human Risk

The SANS 2022 Security Awareness Report analyzes data provided by more than a thousand security awareness professionals from around the world to identify and benchmark how organizations are managing their human risk. The goal of this data-driven report is to provide actionable steps and resources to enable organizations to mature their awareness programs and benchmark them against others.

(more available)
Added: November 29, 2022
image from Sophos 2023 Threat Report

Sophos 2023 Threat Report

In 2022 the cybercriminal economy has increasingly transformed into an industry. Information technology companies have shifted too “as-a-service” offerings, and the cybercrime ecosystem has done the same. Access brokers, ransomware, information-stealing malware, malware delivery, and other elements of cybercrime operations have lowered barriers to entry for world-be cybercriminals.

(more available)
Added: November 29, 2022
image from Trust Services Security Incidents 2021

Trust Services Security Incidents 2021

This report, the Annual Report Trust Services Security Incidents 2021, analyzing root causes, statistics and trends. This report marks the sixth round of security incident reporting for the for the EU’s trust services sector. In this round of annual summary reporting a total of 27 EU countries and 3 EEA countries took part. They reported a total of 46 incidents.

(more available)
Added: November 9, 2022
image from Microsoft Digital Defense Report 2022

Microsoft Digital Defense Report 2022

In the report’s first chapter, we focus on activities of cybercriminals, followed by nation states threats in chapter two. Both groups have greatly increased the sophistication on their attacks which has dramatically increased the impact of their actions.

(more available)
Added: November 7, 2022
image from Cyber Security Forecast 2023

Cyber Security Forecast 2023

Threats evolve, attackers constantly change their tactics, techniques and procedures, and defenders must adapt and stay relentless if they want to keep ip. This forecast aims to help they cyber security industry frame its fight against cyber adversaries in 2023.

(more available)
Added: November 2, 2022
image from Financial Trend Analysis

Financial Trend Analysis

The information in this report is based on ransomware-related information obtained from analysis of BSA data, trade publications, and commercial reporting, as well as insights from law enforcement and other partners. Trends represented in this report illustrate financial institutions’ identification and reporting of ransomware events and may not reflect the actual dates associated with ransomware incidents.

(more available)
Added: November 2, 2022
image from 2020 Cyber Threats Report

2020 Cyber Threats Report

The study revealed that every fourth organization believes they are at greater cybersecurity risk now than before the pandemic. The most common incidents reported since transition to remote work were dependent on the human factor and included phishing, admin mistakes and improper data sharing by employees.

(more available)
Added: October 31, 2022
image from 2022 Cloud Data Security Report

2022 Cloud Data Security Report

This report will help organizations concentrate their security efforts on what really matters and highlight the main obstacles on their way to safe cloud computing.

(more available)
Added: October 31, 2022
image from Cyber Trends and Credit Risks

Cyber Trends and Credit Risks

This report underscores the challenge facing corporate, government and not-for-profit debt issuers: rising cybersecurity incidents, higher costs to combat them, and an imbalance in the executive and risk management experience needed to manage them properly. In an ever-more-connected world, the risk of systemic attacks resulting in damaging financial and repetitional consequences keeps increasing.

(more available)
Added: October 26, 2022
  • ««
  • «
  • 12
  • 13
  • 14
  • 15
  • 16
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 13, 2025 04:08 UTC (build b1d7be4)