Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Extortion

Below you will find reports with the tag of “Extortion”

image from Threat Intelligence Executive Report 2020 Vol. 5

Threat Intelligence Executive Report 2020 Vol. 5

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During July and August 2020, CTU researchers observed notable development in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.

(more available)
Added: April 20, 2022
image from Threat Intelligence Executive Report 2020 Vol. 4

Threat Intelligence Executive Report 2020 Vol. 4

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2020, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.

(more available)
Added: April 20, 2022
image from Threat Intelligence Executive Report 2022 Vol. 1

Threat Intelligence Executive Report 2022 Vol. 1

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During November and December 2021, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.

(more available)
Added: April 20, 2022
image from 2021 Global Threat Report

2021 Global Threat Report

This annual report offers important lessons and recommendations for security teams operating in today’s environment, where visibility and speed are more critical than ever.

(more available)
Added: April 19, 2022
image from 2022 Global Threat Report

2022 Global Threat Report

The CrowdStrike 2022 Global Threat Report provides crucial insights into what security teams need to know about to stay ahead of today’s threats in an increasingly ominous threat landscape.

(more available)
Added: April 19, 2022
image from Cloud Automation is the Key to Future-Proofing Cybersecurity

Cloud Automation is the Key to Future-Proofing Cybersecurity

This report reveals the challenges we face as a security industry and points towards a balanced path of expertise and automation to guide our work.

(more available)
Added: April 14, 2022
image from The State of Stalkerware in 2021

The State of Stalkerware in 2021

This report shows data from 2021 that was affected by stalkerware globally.

Added: April 13, 2022
image from Claroty Biannual ICS Risk & Vulnerability Report: 1H 2021

Claroty Biannual ICS Risk & Vulnerability Report: 1H 2021

This report is the Claroty Biannual ICS Risk & Vulnerability Report: 1H 2021. This report is a resource for OT security managers and operations, delivering not only data about vulnerabilities that are prevalent in industrial devices, but also the necessary context around them to assess risk within their respective environments.

(more available)
Added: April 12, 2022
image from 2022 Data Security Incident Response Report

2022 Data Security Incident Response Report

This is the Data Security Incident Response Report which features insight and metrics from the response to more than 1,250 incidents the firm helped client manage in 2020.

(more available)
Added: April 11, 2022
image from Claroty Biannual ICS Risk & Vulnerability Report: 2H 2021

Claroty Biannual ICS Risk & Vulnerability Report: 2H 2021

This is the Claroty Biannual ICS Risk & Vulnerability Report: 2H 2021. This report brings important context to the unique discipline of ICS vulnerability research and managing that risk.

(more available)
Added: April 11, 2022
image from 2022 BrightCloud Threat Report

2022 BrightCloud Threat Report

This is the 2022 BrightCloud Threat Report.

Added: April 8, 2022
image from European Industrial Infrastructure Cyber Threat Perspective

European Industrial Infrastructure Cyber Threat Perspective

A review of the threat landscape (actors, actions, etc._ affecting industrial infrastructure in Europe.

Added: April 7, 2022
image from 2021 Threat Detection Report

2021 Threat Detection Report

This report is based on in-depth analysis of roughly 20,000 confirmed threats detected across our customers’ environments, this research arms security leaders and their teams with actionable insights into the malicious activity and techniques we observe most frequently.

(more available)
Added: April 5, 2022
image from 2022 Threat Detection Report

2022 Threat Detection Report

This is the 2022 Red Canary Threat Detection Report. This report goes in-depth with over 30,000 confirmed threats detected across our customers environments, this research arms security leaders and their teams with actionable insight into the threats we observed, techniques adversaries most commonly leverage, and trends that help you understand what is changing and why.

(more available)
Added: April 5, 2022
image from Global Threat Landscape Report - 2022 Q1

Global Threat Landscape Report - 2022 Q1

The first update to the Fortinet regular Threat Landscape Report for 2022. Covers major trends in threats as determined by Fortinet’s global sensor network.

(more available)
Added: March 8, 2022
image from The Power of Purple Teaming

The Power of Purple Teaming

PlexTrac sponsored research with CyberRisk Alliance to better understand how cybersecurity teams are using emerging strategies like adversary emulation and purple teaming to combat growing ransomware threats. This report details the findings of a survey of 315 IT and cybersecurity decision-makers and influencers.

(more available)
Added: February 9, 2022
image from Cyber Signals

Cyber Signals

A cyberthreat intelligence brief informed by the latest Microsoft threat data and research. This content offers an expert perspective into the current threat landscape, discussing trending tactics, techniques and strategies used by the world’s most prolific threat actors.

(more available)
Added: February 9, 2022
image from Cyber Insurance: Changing Dynamics in a Maturing Market

Cyber Insurance: Changing Dynamics in a Maturing Market

In the face of non-stop cyber attacks affecting all firms large and small, the market has matured and skills levels have improved across the board. Importantly, insurers are paying back, but dynamics are changing and increasingly insurers are also demanding evidence of cyber robustness from their clients. The market is fast becoming less and less favorable to negligent buyers looking for silver bullets.

(more available)
Added: January 26, 2022
image from McAfee Labs Threats Report, April 2021

McAfee Labs Threats Report, April 2021

This report incorporates not only the malware zoo, but new analysis for what is being detected in the wild. Also added: statistics detailing the top MITRE ATT&CK techniques observed in Q4 2020 from Criminal/APT groups.

(more available)
Added: January 14, 2022
image from Cloud and Threat Report - January 2022

Cloud and Threat Report - January 2022

Takes a look back at the top trends in cloud attacker activities and cloud data risks from 2021 compared to 2020.

(more available)
Added: January 13, 2022
image from Cybersecurity is Shifting: 8 Essential Trends for 2022

Cybersecurity is Shifting: 8 Essential Trends for 2022

The pandemic has changed everything. What strategies are CISOs and other security leaders implementing to ensure their organizations are secure in today’s uncertain environment? This report contains the 8 trends worth following to more effectively mitigate human risk in 2022.

(more available)
Added: January 12, 2022
  • ««
  • «
  • 17
  • 18
  • 19
  • 20
  • 21
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 13, 2025 16:08 UTC (build b1d7be4)