Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Extortion

Below you will find reports with the tag of “Extortion”

image from Stonedrill - Shamoon & Shamoon 2.0 Variant

Stonedrill - Shamoon & Shamoon 2.0 Variant

It would appear that a new variant titled ‘StoneDrill‘ has now hit the wild and conducts operations very similar to that of Shamoon 2.0 and Shamoon malware. Here is a brief analysis of StoneDrill,

(more available)
Added: October 19, 2018
image from Strengthen Your Defenses Against Cybercrime

Strengthen Your Defenses Against Cybercrime

This ebook provides insight based on a survey that sought to understand the state of email cybersecurity.

Added: October 19, 2018
image from The CISO's Dilemma: Security Versus Productivity

The CISO's Dilemma: Security Versus Productivity

This study looks at what today’s organizations are doing to prevent endpoint breaches targeting employees, the success of those efforts, and the associated costs that make this whole approach rather frustrating.

(more available)
Added: October 19, 2018
image from The Hacker-Powered Security Report 2018

The Hacker-Powered Security Report 2018

As we approach critical mass of hacker-powered security, read on to learn more about best practices of starting and running effective disclosure and bug bounty programs, and get to know some of the stories and stats about the hackers themselves.

(more available)
Added: October 19, 2018
image from Threat Landscape Report Q4 2017

Threat Landscape Report Q4 2017

This is a quarterly report that looks at the current cubery security threats from each quarter.

Added: October 19, 2018
image from 2017 Bitdefender Ransomware Reprot

2017 Bitdefender Ransomware Reprot

This is a solid breakdown of the Ransomware issues as seen in 2017.

Added: October 18, 2018
image from 2017 Ransomware Report

2017 Ransomware Report

From The Report, “With global ransomware damages predicted to exceed $5 billion this year, it is no surprise that ransomware is the fastest growing security threat. As this year’s global attacks have made national news, businesses of all sizes have become increasingly aware of the looming ransomware threat and the challenge of staying protected. Infected companies race the clock to minimize data loss, downtime, and reputation damage. With the seemingly endless profitability, anonymity and ease of execution it doesn’t appear cybercriminals will be turning their back on ransomware anytime soon. Companies are right to expect another year filled with attacks and new variants. The question is how can companies block these attacks before ransom is demanded, and their data along with their reputation is put at risk.”

(more available)
Added: October 18, 2018
image from 2018 Malware Forecast

2018 Malware Forecast

In this report, they review malicious activity that SophosLabs analyzed and protected their clients from in 2017. They take that data and project what can be expected from 2018.

(more available)
Added: October 18, 2018
image from 2018 Security Pressures Report

2018 Security Pressures Report

Based on a survey of 1,600 information security decision-makers and influencers in six countries, the 2018 Security Pressures Report delves into keeping businesses safeguarded against cyber threats, attacks and compromises.

(more available)
Added: October 18, 2018
image from ASEC Report Volume 87 Q2 2017

ASEC Report Volume 87 Q2 2017

This report from the Ahn Lab Security Emergency Response Center provides a review of various Cyber events that took place in the 2nd Qtr. of 2017.

(more available)
Added: October 18, 2018
image from CISOs Investigate:Endpoint Security

CISOs Investigate:Endpoint Security

The value of peer input cannot be overstated. Authored by leading Chief Information Security Officers, CISOs Investigate is an ongoing series that offers first-hand insights to security leaders as they make business-driven risk and technology decisions.

(more available)
Added: October 18, 2018
image from Compromised Credentials: Learn from the exposure of the world's 1000 biggest companies

Compromised Credentials: Learn from the exposure of the world's 1000 biggest companies

The article uses the world’s 1,000 largest companies as a sample to help us better understand the extent to which organizations are effected by cyber threats and how threat actors my be looking to exploit these credentials.

(more available)
Added: October 18, 2018
image from Cyber Incident And Breach Trends Report

Cyber Incident And Breach Trends Report

This report takes a look at the major incidents that took place in 2017.

Added: October 18, 2018
image from Cyber Risk Report 2016

Cyber Risk Report 2016

From the report, “In this report we provide a broad view of the 2015 threat landscape, ranging from industry-wide data to a focused look at different technologies, including open source, mobile, and the Internet of Things. The goal of this report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.”

(more available)
Added: October 18, 2018
image from Espionage As A Service

Espionage As A Service

This brief takes a look at the espionage as a service industry and how it can help businesses become secure.

(more available)
Added: October 18, 2018
image from Getting To Yes With China In Cyberspace

Getting To Yes With China In Cyberspace

This report is a response to the absence of a formal dialogue and explores U.S. policy options for managing relations with China over this critical policy area. It looks at two basic questions: Can the United States and China return to meaningful formal negotiations over norms and rules in cyberspace? And, if so, what areas are most likely to yield agreement, and what might be exchanged for what?

(more available)
Added: October 18, 2018
image from How To Mitigate Five IT Problems Affecting The Financial Industry

How To Mitigate Five IT Problems Affecting The Financial Industry

Read this whitepaper to see how you can mitigate the following five financial services industry IT challenges. Minimize breaches, reduce cyber theft, use technology to improve network performance, improve compliance, and leverage technology to provide a competitive advantage.

(more available)
Added: October 18, 2018
image from Into The Web Of Profit

Into The Web Of Profit

This book provides excellent research and an in-depth study of cybercrime criminals and money.

Added: October 18, 2018
image from Mobile Threat Detection Through Machine Learning

Mobile Threat Detection Through Machine Learning

This paper is subtitled “Discover the ideal technology dor detecting unknown, zero-day mobile threats.

Added: October 18, 2018
image from Protected Health Information Data Breach Report

Protected Health Information Data Breach Report

Here are some quick facts about this report and what they tell us about the issues that the healthcare industry as a whole needs to address: 58% of incidents involved insiders—healthcare is the only industry in which internal actors are the biggest threat to an organization. Medical device hacking may create media hype but the assets most often affected in breaches are databases and paper documents. Ransomware is the top malware variety by a wide margin. 70% of incidents involving malicious code were ransomware infections. Basic security measures are still not being implemented. Lost and stolen laptops with unencrypted PHI continue to be the cause of breach notifications.

(more available)
Added: October 18, 2018
image from Quarterly Threat Report Q1 2018

Quarterly Threat Report Q1 2018

This Quarterly report offers key takeaways from the first Quarter of 2018. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 18, 2018
  • ««
  • «
  • 40
  • 41
  • 42
  • 43
  • 44
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 12:08 UTC (build b1d7be4)