Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Extortion

Below you will find reports with the tag of “Extortion”

image from 2019 Endpoint Security Survey Report

2019 Endpoint Security Survey Report

The 2019 Endpoint Security Survey Report reveals the latest endpoint security trends and challenges, why and how organizations invest in endpoint security, and the security capabilities companies are prioritizing.

(more available)
Added: February 17, 2019
image from Lloyd's City Risk Index: Executive Summary

Lloyd's City Risk Index: Executive Summary

From the report, “The second Lloyd’s City Risk Index, based on original research by the Centre for Risk Studies at Cambridge University’s Judge Business School, details the risk landscape in the world’s leading 279 cities, responsible for 41% of global economic output in 2018. The data contained in this report will help policymakers, businesses and insurers make cities more resilient. Risk is managed most effectively by societies who anticipate and learn from each disruptive event, making the next generation safer.” Read on to find out more.

(more available)
Added: February 13, 2019
image from Lloyds City Risk Index: Europe

Lloyds City Risk Index: Europe

This report summarizes Lloyd’s City Risk Index report for the cities of Europe.

Added: February 13, 2019
image from Bashe Attack: Global Infection By Contagious Malware

Bashe Attack: Global Infection By Contagious Malware

This report explores how a ransomware attack might take place and what the impacts would be on governments, businesses, and the insurance sector. In the scenario, the malware enters company networks through a malicious email, which, once opened, encrypts all the data on every device connected to the network. The email is forwarded to all contacts automatically to infect the greatest number of devices. Companies of all sizes and in all sectors are forced to pay a ransom to decrypt their data or to replace their infected devices.

(more available)
Added: February 13, 2019
image from Vulnerability And Threat Trends 2018 Mid-Year Update

Vulnerability And Threat Trends 2018 Mid-Year Update

This report examines trends in vulnerabilities, exploits and threats in order to better align your security strategy with the current threat landscape. Incorporating such intelligence to vulnerability management programs begins to put vulnerabilities in risk–based context and helps to focus remediation on vulnerabilities most likely to be used in an attack. This is an update to a report published in January 2018 to reflect mid–year trends. All statistics for 2018 reflect data from the first half of the year — January 1, 2018 through June 30, 2018.

(more available)
Added: February 12, 2019
image from 2019 Vulnerability And Threat Trends

2019 Vulnerability And Threat Trends

The 2019 Vulnerability and Threat Trends Report examines new vulnerabilities published in 2018, newly developed exploits, new exploit–based malware and attacks, current threat tactics and more. Such analysis helps to provide much needed context to the more than 16,000 vulnerabilities published in the previous year. The insights and recommendations provided are there to help align security strategies to effectively counter the current threat landscape. Incorporating such intelligence in vulnerability management programs will help put vulnerabilities in a risk based context and focus remediation on the small subset of vulnerabilities most likely to be used in an attack.

(more available)
Added: February 12, 2019
image from Quantifying The Attacker's First-Mover Advantage

Quantifying The Attacker's First-Mover Advantage

This report measures the difference in days between when an exploit for a vulnerability becomes publicly available (Time to Exploit Availability) and when a vulnerability is first assessed (Time to Assess). A negative delta indicates that the attacker has an opportunity to exploit a vulnerability before the defender is even aware of the risk. The sample set used for this analysis is based on the 50 most prevalent vulnerabilities from nearly 200,000 unique vulnerability assessment scans.

(more available)
Added: February 12, 2019
image from How The Vulnerability And Threat Landscape Changed in 2018

How The Vulnerability And Threat Landscape Changed in 2018

This infographic provides brief insight into the corresponding 2019 Threat and Vulnerability Trends report.

Added: February 12, 2019
image from The Black Report: Decoding The Minds Of Hackers

The Black Report: Decoding The Minds Of Hackers

This unique report offers insight into the world of hackers. It seeks to stand apart from other annuals and quarterlies by presenting information other reports are not discussing.

(more available)
Added: February 9, 2019
image from The State Of The Federal IT Landscape

The State Of The Federal IT Landscape

From the report, “For the State of the Federal IT Landscape report, OneLogin commissioned CITE Research to conduct an online, in-depth survey of 150 federal IT professionals in the United States. The goal of the survey was to understand: The current federal IT landscape, Security concerns and challenges facing federal agencies, IT plans with regard to the cloud, Technologies in use or being considered to address concerns. This survey was conducted in late October of 2018.” Read on to find out more.

(more available)
Added: February 8, 2019
image from The Year Of The Defender

The Year Of The Defender

From the report, “What does 2018 hold in store for the defenders? Unfortunately, more of the same security drama, according to Cybereason’s researchers and analysts. Specifically, they identified the following as some of the bigger security trends in the new year: 01. Supply Chain Attacks Increase & Remain Underreported 02. Destructive Attacks Do Not Let Up 03. The Line Blurs Between APT Actors & Cybercriminals 04. Fileless Malware Attacks Become Ubiquitous” Read on to find out more.

(more available)
Added: February 8, 2019
image from Enterprise Cyber Awareness and Simulation Training Guide

Enterprise Cyber Awareness and Simulation Training Guide

“The people, not just tools, are the key to enterprise cyber security. It’s time to devise an actionable plan to make sure every member of your organization is cyber-ready. In this guide, we will present a basic framework for optimizing the types, frequency and costs of security simulation training for the entire enterprise.”

(more available)
Added: February 8, 2019
image from Post Grams Not Scams: Detecting Money Flipping Scams On Instagram Using Machine Learning

Post Grams Not Scams: Detecting Money Flipping Scams On Instagram Using Machine Learning

As more people become connected on social platforms, cyber criminals find themselves with more numerous and accessible potential targets than ever before. Over a 4 month period in 2015, the ZeroFOX Research Team built a machine learning classifier and identified thousands scams targeting major financial institutions and their customers across Instagram. The results of the study shine a light on a growing problem with serious impacts on financial institutions’ bottom lines.

(more available)
Added: February 7, 2019
image from Brand Protection For Modern Enterprsies

Brand Protection For Modern Enterprsies

This report offers insights into brand protection in the modern age of social media threats. It offers insights into brand protection, why you need to protect your brand, risks to a brand, the benefits of brand protection, the current state of brand protection and how to build a brand protection program.

(more available)
Added: February 7, 2019
image from Under The Hood Of Cyber Crime

Under The Hood Of Cyber Crime

From the report, “In the first installment of the 2019 Security Report ‘CyberAttack Trends Analysis’, we reviewed the latest trends and threats facing the IT security industry today. We assessed the major incidents that impacted organizations over the past year along with our commentary and insights regarding them. These trends fell into the categories of Cryptominers, Ransomware, Malware Methodology, Data Breaches, Mobile and Nation State Cyber Attacks. In this installment we zone in on an underlying trend that lies behind all of the above categories, the democratization of cyber crime.” Read on to find out more.

(more available)
Added: February 7, 2019
image from The Biggest Cyber Threat To Health Insurance Companies in 2019

The Biggest Cyber Threat To Health Insurance Companies in 2019

This White Paper attempts to paint a comprehensive picture of the file-borne threat crisis facing health insurance companies due to the tight connection with medical institutions and the immense number of files shared and transferred between the two sectors, as well as explain why current security systems and industry regulations fail to adequately meet this sophisticated threat, and what measures can be taken to guard against it without investing in security infrastructure.

(more available)
Added: February 7, 2019
image from Health Care Cyber Breach Research Report for 2016

Health Care Cyber Breach Research Report for 2016

This report offers insight into Cyber Breaches and the health industry for 2016. It provides information on the important trends of 2016, medical device hijacks and the top ten health care cyber attacks of 2016.

(more available)
Added: February 6, 2019
image from The State of Endpoint Security: Past, Present and Future

The State of Endpoint Security: Past, Present and Future

From the report, “With endpoint security products continuing to be at the tip of the spear of cyber defenses for years to come, the question is how to ensure the best possible security posture. No matter which way an endpoint security buyer turns, there is no one magic bullet. It is likely that a layered approach with multiple different technologies working together is required.” Read on to find out why.

(more available)
Added: February 6, 2019
image from MEDJACK.4 Medical Device Hijacking

MEDJACK.4 Medical Device Hijacking

This report takes an inside look at the Cyber Security challenge for healthcare today and more specifically looks at the medical device security challenge.

(more available)
Added: February 6, 2019
image from Six Phishing Predictions

Six Phishing Predictions

To stop phishing attacks, it helps to see them coming. So we asked an array of CofenseTM experts for 2019 predictions. What trends in phishing and malware threats should you anticipate? To be better prepared to defend your organization, read on.

(more available)
Added: February 6, 2019
image from MEDJACK.2 Hospitals Under Siege

MEDJACK.2 Hospitals Under Siege

This report offers a variety of case studies that highlight the challenges in the Healthcare Network.

Added: February 6, 2019
  • ««
  • «
  • 27
  • 28
  • 29
  • 30
  • 31
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 14, 2025 04:08 UTC (build b1d7be4)