Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Extortion

Below you will find reports with the tag of “Extortion”

image from Impact Of DDoS On Enterprise Infographic

Impact Of DDoS On Enterprise Infographic

This Infographic provides some very quick results of a survey conducted in 2018.

Added: October 26, 2018
image from Industry Threat Report: Healthcare

Industry Threat Report: Healthcare

This report was produced with a goal of raising awareness and educating senior decision makers about the cybersecurity issues facing the healthcare industry.

(more available)
Added: October 26, 2018
image from Internet Organized Crime Threat Assessment 2017

Internet Organized Crime Threat Assessment 2017

This is the fourth annual presentation of the cybercrim threat landscape by Europol’s European Cybercrime Centre.

Added: October 26, 2018
image from Internet Security Report Quarter 1

Internet Security Report Quarter 1

Have you ever wondered what 0 types of cyber attacks affect small to midsize businesses (SMBs) and distributed enterprises (DEs)? Well, you’ve come to the right place.

(more available)
Added: October 26, 2018
image from Microsoft Security Intelligence Report Volume 22

Microsoft Security Intelligence Report Volume 22

This is the 22nd edition of the Microsoft Security Intelligence Report. In this report, they have organized data sets into two categories, cloud and endpoint. They are sharing data about a shorter time period, one quarter.

(more available)
Added: October 26, 2018
image from Phishing Confessions From Security Professionals

Phishing Confessions From Security Professionals

This report is the results of a survey conducted among security professionals to analyze their experiences with phishing.

Added: October 26, 2018
image from Quarterly Threat Report Q2 2018

Quarterly Threat Report Q2 2018

This Quarterly report continues Rapid7’s excellent work of providing insight to the threats they have witnessed during the 2nd Quarter of 2018.

(more available)
Added: October 26, 2018
image from Ransomware: How Consumers And Businesses Value Their Data

Ransomware: How Consumers And Businesses Value Their Data

IBM fielded a US-based consumer and business research study to determine the value people place on data and their awareness and knowledge about ransomware. The results are alarming.

(more available)
Added: October 26, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report April 2016

SecureWorks Threat Intelligence Executive Monthly Report April 2016

This report from April 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 26, 2018
image from Securing Smart Cities:Moving Toward Utopia With Security In Mind

Securing Smart Cities:Moving Toward Utopia With Security In Mind

This paper surveys some of the existing smart technologies currently used in smart cities worldwide. Much like our previous reports on exposed smart devices and the hacking of robots in smart factories, this paper will discuss the risks of using smart technologies in critical sectors and will provide actionable steps to help local governments and urban developers design more secure smart cities.

(more available)
Added: October 26, 2018
image from State of Malware

State of Malware

This report discusess malware attacks and data from the year 2016 and makes predictions for 2017.

Added: October 26, 2018
image from State of the Internet Security 4th Quarter 2017

State of the Internet Security 4th Quarter 2017

This is Akamai’s State of The Internet Security report from the fourth quarter of 2017

Added: October 26, 2018
image from The 2017 Ransomware Survival Guide

The 2017 Ransomware Survival Guide

This guide offers help for surviving ransomware attacks.

Added: October 26, 2018
image from The Rise of Ransomware

The Rise of Ransomware

From the report, “We are pleased to present the findings of The Rise of Ransomware, sponsored by Carbonite, a report on how organizations are preparing for and dealing with ransomware infections. We surveyed 618 individuals in small to medium-sized organizations who have responsibility for containing ransomware infections within their organization.”

(more available)
Added: October 26, 2018
image from Threat Intelligence Executive Report 2018: Volume 2

Threat Intelligence Executive Report 2018: Volume 2

This Threat report details some early 2018 threats like ransomware, North Korean hacking, the leveraging of newly exposed vulns.

Added: October 26, 2018
image from Threats Report - December 2016

Threats Report - December 2016

An interview-based report, drawing from interviews of 400 security professionals. Covers topics such as the current state of SOC design, ransomware, and the rise of malware in otherwise legitimate software.

(more available)
Added: October 26, 2018
image from 2015 Threats Report

2015 Threats Report

In this report, McAfee looks back on the past 5 years of cyber threats. They then breakdown two key points, 1) How do attackers enter a malware infected system and exfiltrate information and 2) Cyber attacks on graphic processing units and (GPU) devices.

(more available)
Added: October 25, 2018
image from 2015 Trustwave Global Security Report

2015 Trustwave Global Security Report

The writers of this report invite you to use the knowledge contained in this report to become your own master battlefield tactician, by getting to know your enemies in the cyber universe.

(more available)
Added: October 25, 2018
image from 2016 Mining for Database Gold: Findings from 2016 Breach Level Index

2016 Mining for Database Gold: Findings from 2016 Breach Level Index

From the report, “Following are some of the most notable data breaches in 2016, including the number of compromised records, type of breach, and the BLI risk assessment score. The score is calculated based on factors such as the number of records breached, the source of the breach, and how the stolen information was used.”

(more available)
Added: October 25, 2018
image from 2017 Annual Security Report

2017 Annual Security Report

The Annual Cybersecurity Report highlights the relentless push-and-pull dynamic between cyber attackers and cyber defenders. It is intended to help organizations respond effectively to today’s rapidly evolving and sophisticated threats.

(more available)
Added: October 25, 2018
image from 2018 Incident Response Insights Report

2018 Incident Response Insights Report

This report shares insights and valuable lessons from an examination of the threats in 2017.

Added: October 25, 2018
  • ««
  • «
  • 32
  • 33
  • 34
  • 35
  • 36
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 13, 2025 08:09 UTC (build b1d7be4)