Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Extortion

Below you will find reports with the tag of “Extortion”

image from Concentrated Cyber Risk in a Global Economy

Concentrated Cyber Risk in a Global Economy

In the wake of the Change Healthcare incident, companies are doubling down on efforts to bolster supplier oversight and cybersecurity measures. Every organization must scrutinize its data security practices, assess third- and fourth-party access to sensitive data, and identify critical vendors essential to revenue.

(more available)
Added: May 7, 2024
image from CISA KEV Catalog: Prevalence and Remediation

CISA KEV Catalog: Prevalence and Remediation

CISA created the KEV catalog in part because of challenges that organizations have historically faced in prioritizing vulnerabilities. In any given year, there are tens of thousands of new vulnerabilities. But according to CISA, a study of historical vulnerability data dating back to 2019 shows that less than 4% of all known vulnerabilities were being used by attackers in the wild.

(more available)
Added: May 3, 2024
image from 2024 Data Breach Investigations Report

2024 Data Breach Investigations Report

This year, the report is delving deeper into the pathway to breaches in an effort to identify the most likely Action and vector groupings that lead to breaches given the current threat landscape. The cracked doorway on the cover is meant to represent the various ways attackers can make their way inside. The opening in the door shows the pattern of our combined “ways-in” percentages, and it lets out a band of light displaying a pattern of the Action vector quantities. The inner cover highlights and labels the quantities in a less abstract way.

(more available)
Added: May 2, 2024
image from ReliaQuest Annual Cyber-Threat Report

ReliaQuest Annual Cyber-Threat Report

This report provides strategic recommendations to bolster your security posture. But our mission extends beyond immediate threat mitigation. A preventative approach to cybersecurity—focusing on proactive measures and cost-effectiveness—embodies the ReliaQuest core principles. This report charts threat actors’ evolution, but also anticipates potential shifts in their TTPs as we look to the future. We offer a forward-looking perspective to prepare organizations for emerging challenges they are likely to face.

(more available)
Added: April 26, 2024
image from 2024 Cyber Claims Report

2024 Cyber Claims Report

Coalition’s 2024 Cyber Claims Report features data and case studies from organizations across the United States. Cyber risk is global, and we believe this report’s trends and risk mitigation strategies are applicable regardless of location. As an active partner in protecting organizations from digital risk, we’re proud to share these insights to help policyholders, brokers, and others in our industry stay informed about the ever-changing threat landscape.

(more available)
Added: April 26, 2024
image from M-Trends 2024 Special Report

M-Trends 2024 Special Report

In the M-Trends 2024 report it features data and other security metrics that readers have come to expect, highlights zero-day use by espionage and financially-motivated attackers, and dives deep into evasive actions conducted particularly by Chinese espionage groups. we share our learnings with the greater security community, building on our dedication to providing critical knowledge to those tasked with defending organizations. The information in this report has been sanitized to protect the identities of victims and their data.

(more available)
Added: April 23, 2024
image from Utilizing counterfactual analysis to understand cyber risk

Utilizing counterfactual analysis to understand cyber risk

This paper explores the benefits of counterfactual analysis for cyber (re)insurers and provides a framework that can help exposure risk managers, actuaries, and catastrophe modelers incorporate it into their standard suite of risk assessment tools. The paper also contains some worked examples of cyber counterfactual analysis that Gallagher Re has conducted in collaboration with CyberCube.

(more available)
Added: April 18, 2024
image from 2021 Vulnerability Statistics Report

2021 Vulnerability Statistics Report

The Edgescan Vulnerability Stats Report aims to demonstrate the state of full stack security based on thousands of security assessments performed globally, as delivered by the Edgescan SaaS during 2020. This report has also become a reliable source for representing the global state of cyber security vulnerability management.

(more available)
Added: April 17, 2024
image from 2024 Data Threat Report

2024 Data Threat Report

The 2024 Data Threat Report (DTR) analyzes how core security practices have changed in response to or in anticipation of changing threats. This report also offers perspectives on what organizations can do to leverage data assets to expand opportunities to make their businesses more agile and build trust with their customers. This report also considers both securing the use of GenAI and using GenAI to better secure the enterprise. Differing priorities from different functional leaders and external stakeholders will require security and risk management leaders to build stronger relationships.

(more available)
Added: April 16, 2024
image from The State of Email & Collaboration Security 2024

The State of Email & Collaboration Security 2024

The State of Email & Collaboration Security 2024 report is based on an in-depth global survey of 1,100 information technology and cybersecurity professionals. Mimecast commissioned UK-based research firm Vanson Bourne to conduct the survey, which took place during October and November 2023.Survey participants worked at organizations ranging from 250 to 500 employees to more than 10,000 employees.

(more available)
Added: April 12, 2024
image from The 2024 Vulnerability Statistics Report

The 2024 Vulnerability Statistics Report

The 9th edition of the Edgescan Vulnerability Stats Report 2024. This report demonstrates the state of full stack security based on thousands of security assessments and penetration tests on millions of assets that were performed globally from the Edgescan Cybersecurity Platform in 2023. This is an analysis of vulnerabilities detected in the systems of hundreds of organizations across a wide range of industries – from the Fortune 500 to medium and small businesses. The report provides a statistical model of the most common weaknesses faced by organizations to enable data-driven decisions for managing risks and exposures more effectively.

(more available)
Added: April 8, 2024
image from A Year in Review of Zero-Days Exploited In-the-Wild in 2023

A Year in Review of Zero-Days Exploited In-the-Wild in 2023

This report presents a combined look at what Google knows about zero-day exploitation, bringing together analysis from TAG and Mandiant holistically for the first time. The goal of this report is not to detail each individual exploit or exploitation incident, but look for trends, gaps, lessons learned, and successes across the year as a whole. As always, research in this space is dynamic and the numbers may adjust due to the ongoing discovery of past incidents through digital forensic investigations.

(more available)
Added: April 6, 2024
image from NetDiligence Cyber Claims Study 2023

NetDiligence Cyber Claims Study 2023

The NetDiligence Cyber Claims Study presents findings from a five-year dataset of over 9,000 real-world cyber insurance claims. In this spotlight, we focus on the subset of BEC incidents: 17% of claims reported (N=1,480) between 2018 and 2022. BEC starts with human error and ends with high crisis services costs. Educating and training the workforce is a continual and incremental process. Preventing BEC is the endless task of cybersecurity

(more available)
Added: April 3, 2024
image from NetDiligence Cyber Claims Study 2023

NetDiligence Cyber Claims Study 2023

The Professional Services sector includes a broad array of organizations. Although there are no strict criteria for considering a company to be in this sector, there is general agreement that inclusion requires specialized training and experience, and, in many cases, qualification by exam and licensing managed by either national or state authorities. Using our 5-year dataset, we have analyzed 1,500 Professional Services claims dated 2017 through 2021. Professional Services sector incidents account for 20% of all claims in the dataset.

(more available)
Added: April 3, 2024
image from Threat Landscape for Industrial Automation Systems: Statistics for H2 2023

Threat Landscape for Industrial Automation Systems: Statistics for H2 2023

In the second half of 2023, the percentage of ICS computers on which malicious objects were blocked decreased from the first half of the year. Most of the statistical indicators dropped accordingly. Yet, there are subtleties we would like to draw attention to, as they highlight dangerous spots on the cyberthreat landscape.

(more available)
Added: April 3, 2024
image from Flashpoint 2024 Global Threat Intelligence Report

Flashpoint 2024 Global Threat Intelligence Report

The Flashpoint 2024 Global Threat Intelligence Report offers a critical examination of the current threat environment. This year’s analysis goes beyond traditional threat intelligence, incorporating Flashpoint’s unparalleled data and insights to shed light on cyber threats, geopolitical turmoil, and escalating physical conflicts around the world. The goal: help your organization to strengthen its defenses, ensure operational resilience, and proactively confront multifaceted threats—thereby safeguarding critical assets, preventing financial losses, and protecting lives.

(more available)
Added: April 3, 2024
image from Zayo’s DDoS Insights Report – 2023 End of Year Review

Zayo’s DDoS Insights Report – 2023 End of Year Review

Attackers continue to gain ground. In 2023, the average duration of attacks increased by 403%. Read about DDoS trends and what you can do about them in Zayo’s DDoS Insights Report. This report contains insights, analysis, and conclusions about each industry under attack. Further, it provides you the steps to take to ensure your business isn’t harmed by the DDoS attacks heading your way.

(more available)
Added: March 25, 2024
image from Black Kite Third Party Breach Report 2024

Black Kite Third Party Breach Report 2024

The report sheds light on the sectors most at risk, with technical services vendors leading the breach statistics for the fourth consecutive year. Despite this, a silver lining emerges as a significant portion of these vendors demonstrated improvements in their cyber ratings postbreach. The healthcare sector continues to bear the brunt of these incidents, reinforcing the need for heightened security measures within this critical industry.

(more available)
Added: March 25, 2024
image from 2024 Annual Report

2024 Annual Report

The report presents the industry’s most comprehensive analysis of intelligence from 2023. It covers threat actors and their playbook of targets, methods, and attacks to help you eliminate blind spots in your current security posture. groups, and more for the year ahead. Wherever you are in your threat intelligence journey, you can use this report as a roadmap. It will help you strengthen your operations, create a forward looking strategy, and protect your organization’s data, intellectual property, and brand reputation.

(more available)
Added: March 23, 2024
image from WatchTower Intelligence-Drive Threat Hunting

WatchTower Intelligence-Drive Threat Hunting

In this special year-end edition of the WatchTower Digest, we discuss the threats we observed and investigated in 2023, and look ahead to the 2024 threat landscape. Our findings are based on SentinelOne’s Singularity telemetry across tens of millions of endpoints, operating across a diverse number of industries and global geographies.

(more available)
Added: March 19, 2024
image from The 2024 State of Threat Hunting

The 2024 State of Threat Hunting

The report raises a number of interesting findings, which you’ll read about in the pages to come. However, one through line that emerges is the need for reliable threat intelligence and its impact on threat hunters’ ability to do their jobs well. Threat intelligence, or lack thereof, is a commonality across the top challenges respondents identified. Access to threat intelligence also affects nearly every aspect of how respondents say they do their jobs.

(more available)
Added: March 19, 2024
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 20, 2025 08:08 UTC (build b1d7be4)