Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Extortion

Below you will find reports with the tag of “Extortion”

image from BlueVector Threat Report Q1 2018

BlueVector Threat Report Q1 2018

From the report, “To put the relentlessness of attacks and the attackers perpetrating them into perspective, it has been reported that the global cybercrime economy generates an annual profit of $1.5 trillion or roughly the same as Russia’s GDP. To use an old cybersecurity adage, attackers only need to succeed once to compromise your network, defenders need to succeed every time. These facts and the events of Q1 2018 reinforce the reality that threat actors have no intention of scaling back their attacks. It is important not to be distracted by coverage given to one attack vector or class of attack – distraction has been a powerful tool in the arsenals of attackers for centuries… just think about why malware trojans are so named.”

(more available)
Added: February 5, 2019
image from Minerva Labs 2018 Year In Review: The Year Fileless Malware Became The Norm

Minerva Labs 2018 Year In Review: The Year Fileless Malware Became The Norm

By the end of this report, you’ll have a better understanding of today’s approaches to evading detection tools and the trajectory of evasion into the next year. This way, you’ll have a better sense regarding your endpoint security architecture and your plans for maintaining or improving its effectiveness.

(more available)
Added: February 5, 2019
image from BluVector Threat Report Q3 2018

BluVector Threat Report Q3 2018

From the report, “Trojans are still winning. Out of the 12 Threat Reports over Q3, six were trojans. While the results from the Threat Report quarterly from Q2 2018 were pretty even in terms of the volume of threats being spread out between APTs, ransomware and trojans, Q3 2018 showcased the depth and breadth of trojan diversity and malicious innovation.”

(more available)
Added: February 5, 2019
image from The Rising Threat Of Fileless Malware

The Rising Threat Of Fileless Malware

From the report, “Threat actors are increasing their use of fileless malware for one simple reason: most organizations aren’t prepared to detect it. Education is the first step in determining what threat these new attacks pose and what IT and security teams can do to detect and stop fileless malware attacks. READ THIS PAPER to understand how fileless malware is quickly evolving to avoid detection, the techniques currently employed to prevent infection and the strategies security teams need to consider when determining how to stop future fileless breaches.”

(more available)
Added: February 5, 2019
image from Assault On Healthcare

Assault On Healthcare

This report offers some insight into Health Information Technology and the cybersecurity issues that plague that area.

Added: February 5, 2019
image from Will EU Regulation Aid Cyber Criminals?

Will EU Regulation Aid Cyber Criminals?

From the report, “During the last few months, global corporations have been extremely busy with implementing the needed changes in order to be compliant with the upcoming GDPR regulation. While this happens, cyber-threat actors are preparing themselves for the possible consequences, without a clear picture of whether GDPR will hurt them or benefit them. According to the General Data Protection Regulation (GDPR) any company that handles European Union consumer personal data is obligated to take tangible steps to ensure the information’s security. This means the EU sees any organization that uses EU citizens’ data of any kind, responsible to protect it, whether the organization is headquartered inside EU territory or not. It will, of course, affect the way global corporations handle consumer data encryption, but in even more basic terms, it will affect what kind of information is permitted to be stored and passed along to other users.”

(more available)
Added: January 31, 2019
image from The Future Of Cybercrime & Security

The Future Of Cybercrime & Security

This report offers insight into both Cybercrime and Cybersecurity. It discusses IoT botnets and DDoS, Rising Ransomware, File-less Attacks, and on the security side, it discusses Talent 7 Budget Shortage, Government opinions, Pervasive Threat Intelligence and Market Consolidation.

(more available)
Added: January 31, 2019
image from 2018 Webroot Threat Report

2018 Webroot Threat Report

The 2018 edition of Webroot’s annual Threat Report shares a glimpse into their discoveries and analysis of threat activity throughout 2017, to equip you with the knowledge you need to overcome modern cybercrime.

(more available)
Added: January 31, 2019
image from 2018 Webroot Threat Report: Mid-Year Update

2018 Webroot Threat Report: Mid-Year Update

The Webroot Threat Research Team has analyzed the data from our customer base during the first half of 2018. This mid-year threat report not only shows the stats, but also tells the story behind the headlines. The bottom line from our observations: it has never been more important to implement a robust, effective, multi-layered and continuously evolving security approach to keep valuable data and systems secure.

(more available)
Added: January 31, 2019
image from AppSession: Is Our Appetite For Mobile Apps Putting Us At Risk

AppSession: Is Our Appetite For Mobile Apps Putting Us At Risk

From the report, “With so much of our personal information now flowing through mobile applications, has our security awareness kept pace? Have consumers adopted best practice behaviors or are they leaving themselves vulnerable to cyber attacks? To better understand consumer behavior, RiskIQ commissioned Ginger Comms² to survey 1,000 US and 1,000 UK consumers aged 16 to 60+, specifically focusing on smartphone apps. The survey was conducted between February and March 2017.”

(more available)
Added: January 25, 2019
image from 2017 Most Notable Hackers

2017 Most Notable Hackers

In 2017 we saw a measurable increase in cyber attacks executed by State sponsored hacking groups and APT’s. The Top 5 Threat Actors highlighted in this report carried out some of the most notable and financially devastating attacks of 2017 and are likely sponsored by nation-states. Cyber-attacks have become, and will continue to be, key elements of twenty-first century political warfare and terrorism. We believe that the use of cyber terror and other state sponsored attacks will increase in 2018 after it’s success in 2017.

(more available)
Added: January 25, 2019
image from Chronic [Cyber] Pain: Exposed & Misconfigured Databases in the Healthcare Industry

Chronic [Cyber] Pain: Exposed & Misconfigured Databases in the Healthcare Industry

A first hand account of using open source intelligence techniques to discover publicly exposed data stores of healthcare information.

Added: January 25, 2019
image from Cyber Attack Trends Analysis

Cyber Attack Trends Analysis

From the report, “With data drawn from our ThreatCloud World Cyber Threat Map and our experience within the cyber research community, we will give a comprehensive overview of the trends observed in the categories of Cryptominers, Ransomware, Malware techniques, Data Breaches, Mobile and Nation State cyber attacks. We will then conclude with a review of the predictions made in our 2018 Security Report and assess to what extent these proved accurate. Along the way we will also provide cutting edge analysis from our in-house experts to arrive at a better understanding of today’s threat landscape.”

(more available)
Added: January 24, 2019
image from The Trust Factor: Cybersecurity's Role in Sustaining Business Momentum

The Trust Factor: Cybersecurity's Role in Sustaining Business Momentum

To provide insights into the complex challenges faced by organizations as they fight to protect their brands, Radware produces an annual Global Application & Network Security Report. This eighth annual version of the report combines Radware’s organic research, real attack data and analyses of developing trends and technologies with the findings from a global industry survey.

(more available)
Added: January 16, 2019
image from SophosLabs 2019 Threat Report

SophosLabs 2019 Threat Report

From the report, “As the report that follows describes, SophosLabs has been observing a small but growing number of criminals forced to resort to a variety of manual hacking techniques – previously the purview of esoteric, targeted attackers – just to maintain their dishonorable income streams. The downside is that it’s much more challenging to halt these hybridized threats using conventional methods, but it also means there are fewer criminals competent enough to conduct them, and we keep driving up the cost of their operations. It’s a Darwinian process, and the sort of shift in attacker/defender economics we’ve been striving to achieve for a long time. We consider that a victory, and the start of a trend of attacker disruption that we intend to continue driving.”

(more available)
Added: January 15, 2019
image from Mapping The Future: Trend Micro Security Predictions For 2019

Mapping The Future: Trend Micro Security Predictions For 2019

From the report, “In 2019 and beyond, the biggest trends expected to have an impact on technology and security are the advances in artificial intelligence and machine learning brought about by the ever-growing volume of data that can be processed and analyzed; the continued adoption of cloud computing by enterprises the world over; and the developments in smart devices, homes, and factories — to say nothing of the looming 2020 rollout of 5G, the latest phase of mobile communications geared toward further increasing internet speeds. Furthermore, 2019 will be an important year for political developments including the finalization of Brexit and the holding of landmark elections in several countries. These technological and sociopolitical changes will have a direct impact on security issues in 2019.”

(more available)
Added: January 15, 2019
image from Cyber Pulse:The State of Cybersecurity in Healthcare

Cyber Pulse:The State of Cybersecurity in Healthcare

To gain insight into what’s happening in the healthcare industry when it comes to cybersecurity, Kaspersky Lab issued a survey. The research provides insight into the perceptions of healthcare employees in North America regarding cybersecurity in their workplace, including awareness of cybersecurity breaches, protection of sensitive information, cybersecurity awareness and training, and more. Kaspersky Lab commissioned the research firm Opinion Matters to conduct a survey of 1,758 employees based in healthcare organizations in the United States and Canada. Through this research, the company aims to create a dialogue among businesses and IT staff in healthcare about the current state of awareness of cybersecurity among their employees, along with providing suggested proactive steps that can be taken to prioritize cybersecurity awareness through trainings and consistent education, aiming to prevent or minimize the next cybersecurity issue.

(more available)
Added: January 15, 2019
image from Morphisec Labs Threat Report: December 2018

Morphisec Labs Threat Report: December 2018

This Morphisec Labs Threat Report is based on anonymized threat data collected from approximately 2,000,000 installed Morphisec endpoint agents as well as in-depth investigations conducted by Morphisec researchers. It includes observations about trends in the wider security landscape together with analyses of the tactics and techniques used by malicious actors.

(more available)
Added: January 15, 2019
image from Cyber Intrusion Services Casebook 2018

Cyber Intrusion Services Casebook 2018

From the report, “This casebook presents some of the findings and recommendations we’ve made in key engagements across a representative sample of the work we performed last year. We dig into: Emerging and notable trends, Examples of ill-prepared organizations and the devastating effects of the breaches they suffered, Essential recommendations to prevent companies from becoming another statistic of poor security planning and execution. This casebook also underscores the expertise of our team and the important work we’re doing at CrowdStrike® Services. As you read the case studies, you will see that CrowdStrike stands shoulder-to-shoulder with our clients as we work together to stop adversaries and repair damage. But this casebook is not just for CrowdStrike clients — we want everyone to become better prepared to overcome their adversaries in 2019.”

(more available)
Added: January 15, 2019
image from 2017 State Of The Software Supply Chain

2017 State Of The Software Supply Chain

This 2017 report has similarities to previous years, but there are three differences worth noting. First, the analysis in this year’s report extends beyond Java and includes supply chain findings for JavaScript, NuGet, Python, and Docker. Second, this year’s paper includes a stronger emphasis on the emergence of DevOps and reflects on the evolution of modern IT organizations as they seek to transform from waterfall-native to DevOps-native software development. Lastly, this year’s research delves deeper into the rapidly evolving role of regulation, legislation, and litigation with respect to open source governance and software supply chain management.

(more available)
Added: January 15, 2019
image from Ransomware A Growing Enterprise Threat

Ransomware A Growing Enterprise Threat

This report offers insight into Ransomware and explains the growing threat that impacts enterprise security.

Added: January 1, 2019
  • ««
  • «
  • 28
  • 29
  • 30
  • 31
  • 32
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 14, 2025 00:08 UTC (build b1d7be4)