Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Extortion

Below you will find reports with the tag of “Extortion”

image from Cybersecurity Challenges in Financial Services - Marker Survey Report

Cybersecurity Challenges in Financial Services - Marker Survey Report

This report is based on a survey of 250 cybersecurity and IT decision-makers. It aims to provide insight on cybersecurity challenges in financial services in the age of COVID-19.

(more available)
Added: November 6, 2020
image from Global Incident Response Threat Report 2020

Global Incident Response Threat Report 2020

This report paints a picture of the evolving threat landscape by discussing the impact of COVID-19 and the U.S. presidential election as well as providing practices for security teams looking to fight back.

(more available)
Added: November 1, 2020
image from Connected Medical Device Security: A Deep Dive into Healthcare Networks

Connected Medical Device Security: A Deep Dive into Healthcare Networks

This report analyzes the security of healthcare delivery organizations. It looks at the risks the industry faces and provides effective strategies to reduce cybersecurity risks and defend healthcare networks.

(more available)
Added: October 30, 2020
image from 2020 Q3 Report: Data Breach QuickView

2020 Q3 Report: Data Breach QuickView

This report examines publicly disclosed data breach events, and describes trends and key changes for Q3 2020.

Added: October 29, 2020
image from Information Security and Cyber Risk Management Report 2020

Information Security and Cyber Risk Management Report 2020

The tenth annual survey of risk managers, insurance buyers and other risk professionals. This covers the results of over 400 responses on attitudes and behaviors to cyber insurance and perceptions of risk.

(more available)
Added: October 22, 2020
image from 2020 SMB Cybersecurity Survey

2020 SMB Cybersecurity Survey

Presenting the results of a survey conducted on 2,055 small and medium-sized US businesses. Focuses on the chief cybersecurity concerns expressed by organizations, their planning pre- and post-COVID-19, approaches to remote work, and recovery planning. Cyber insurance attitudes are included.

(more available)
Added: October 21, 2020
image from Bulletproof Annual Cyber Security Report 2019

Bulletproof Annual Cyber Security Report 2019

Drawing from their managed SIEM, vulnerability scanning, and penetration testing services, this report reviews the key trends from the 2018 calendar year.

(more available)
Added: October 19, 2020
image from 2020 Deloitte-NASCIO Cybersecurity Study

2020 Deloitte-NASCIO Cybersecurity Study

This report reflects insights from 51 state and territory respondents on the CISO’s role, as well as budget, governance, reporting, workforce, and operations.

(more available)
Added: October 18, 2020
image from FIN11: A Widespread Ransomware and Extortion Operation

FIN11: A Widespread Ransomware and Extortion Operation

This report provides a look into FIN11, a financially motivated threat group that has conducted some of the largest and longest running malware distribution campaigns to date.

(more available)
Added: October 18, 2020
image from 2020 Midyear Cybersecurity Report: Securing the Pandemic-Disrupted Workplace

2020 Midyear Cybersecurity Report: Securing the Pandemic-Disrupted Workplace

This report takes a look at the most significant stories and trends in order to determine what has changed and what to expect for the second half of 2020 in the cybersecurity industry.

(more available)
Added: October 18, 2020
image from Cybersecurity: The Human Challenge

Cybersecurity: The Human Challenge

This study provides new insights into the state of cybersecurity skills and resources across the globe.

Added: October 14, 2020
image from Cyber Insurance - The Market's View

Cyber Insurance - The Market's View

A survey of 260 cyber insurance brokers and 190 cyber insurers, on the challenges and opportunities in the cyber insurance space. Includes perspectives on aggregation risks, GDPR impact, and third part risk management.

(more available)
Added: October 6, 2020
image from 2020 State of Malware Report

2020 State of Malware Report

This report goes in-depth into the changes in malware attacks for 2020, using data collected from honey pots, telemetry, and research conducted by threat analysts and reporters in 2019.

(more available)
Added: September 28, 2020
image from ACSC Annual Cyber Threat Report: July 2019 to June 2020

ACSC Annual Cyber Threat Report: July 2019 to June 2020

This report outlines key cyber threats and statistics over the period 1 July 2019 to 30 June 2020. Over this period, the ACSC responded to 2,266 cyber security incidents and received 59,806 cybercrime reports at an average of 164 cybercrime reports per day, or one report every 10 minutes.

(more available)
Added: September 28, 2020
image from ECSO Barometer 2020: "Cybersecurity In Light of COVID-19"

ECSO Barometer 2020: "Cybersecurity In Light of COVID-19"

This is a report on a survey conducted by the ECSO from March 2020 to May 2020, with members of the cybersecurity community. It found many shifts in European cybersecurity interests after the impact of the COVID-19 pandemic.

(more available)
Added: September 28, 2020
image from Fraud in the Wake of COVID-19: September 2020 Edition

Fraud in the Wake of COVID-19: September 2020 Edition

This report aims to help anti-fraud practitioners, business leaders, and the general public in understanding the evolution of fraud in the wake of the coronavirus, as well as the importance of heightening anti-fraud measures to protect against fraudulent activity during this unprecedented time.

(more available)
Added: September 28, 2020
image from McAfee Labs COVID-19 Threats Report July 2020

McAfee Labs COVID-19 Threats Report July 2020

A deep dive threat report into COVID-19 related attacks.

Added: September 27, 2020
image from 10 in 10 Report 2020

10 in 10 Report 2020

This report looks at the 10 most impactful factors in cybersecurity success for the next decade.

Added: September 27, 2020
image from 2020 State of Hybrid Cloud Security

2020 State of Hybrid Cloud Security

FireMon’s second annual State of Hybrid Cloud Security report dives into how the proliferation of cloud environments is impacting enterprises and their ability to scale and protect them.

(more available)
Added: September 25, 2020
image from Threat Landscape for Industrial Automation Systems H1 2020

Threat Landscape for Industrial Automation Systems H1 2020

This report from Kaspersky explains changes in the threat landscape for industrial automation systems for the first half of 2020. It goes in detail on the variety of malware, the main threat sources, regional differences, and more.

(more available)
Added: September 25, 2020
image from What Decision Makers Can Do About Data Protection

What Decision Makers Can Do About Data Protection

Protecting data to ensure appropriate usage and avoid unauthorized or inappropriate usage is a major task for decision makers with responsibility for protecting the integrity of corporate data assets. This report tries to show decision makers how to go about this.

(more available)
Added: September 25, 2020
  • ««
  • «
  • 20
  • 21
  • 22
  • 23
  • 24
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 14, 2025 08:09 UTC (build b1d7be4)