Below you will find reports with the tag of “Extortion” Cryptowall Report This is a report that deals with the CryptoWall Malware. The focus of this report is to study the prevalence and global impact of CryptoWall. (more available) Added: October 15, 2018 Cyberattacks Against Intelligent Transportation Systems There is currently very little published research discussing the cybersecurity threats against ITS. In this paper, we first explored real-world ITS cyberattacks and their impact. As cyberattacks and attackers go hand-in-hand, we discussed the most likely perpetrators and their goals and motivations for attacking ITS. We then applied our knowledge of current cyberattacks to develop and analyze future cyberattack scenarios against ITS and Smart Roads. (more available) Added: October 15, 2018 Global Application and Network Security Report From the report, “This research provides a comprehensive and objective review of 2015 cyber-attacks from both a business and a technical perspective. It offers best practice advice for organizations to consider when planning for cyber-attack protection in 2016." (more available) Added: October 15, 2018 GTIC Monthly Threat Report December 2017 This monthly threat report takes a look at the month of December 2017. Specifically, it looks at insights into Coinhive, intellectual property theft via Iranian hackers, and North Korea’s new cyberattack tools. (more available) Added: October 15, 2018 McAfee Labs Threats Report June 2017 In this quarterly threats report, they highlight three Key Topics: They broadly examine evasion techniques and how malware authors use them to accomplish their goals. They explore the very interesting topic of steganography in the digital world. They examine Fareit, the most famous password-stealing malware. (more available) Added: October 15, 2018 SecureWorks Threat Intelligence Executive Monthly Report May 2016 This report from May 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues. (more available) Added: October 15, 2018 The Cloud Balancing Act for IT: Between Promise and Peril This paper is put together by a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. (more available) Added: October 15, 2018 Threat Landscape Report Q1 2018 This report continues Fortinet’s excellent threat report. It discusses operational technology, Zero-day markets, malware, cryptojacking, the hacking event at the winter olympics, the rise of botnets, and Adromeda. Read On! (more available) Added: October 15, 2018 White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime According to this report, the attractions and profitability of the digital underworld are leading some security practitioners to become ‘gray hats’ and get involved in cybercrime. (more available) Added: October 15, 2018 X-Force Threat Intelligence Index 2018 In this report, IBM culled the data collected between 01 January 2017 and 31 December 2017, to deliver insightful information about the global threat landscape and apprise security professionals about the threats most relevant to their organizations. (more available) Added: October 15, 2018 2015 Internet Crime Report The 2015 Internet Crime Report highlights the IC3’s efforts over the past year, specifically focusing on their efforts regarding Business Email Compromise (BEC) and Email Account Compromise (EAC) scams and the Operation Wellspring Initiative (OWS). (more available) Added: October 14, 2018 2016 Midmarket Threat Summary Report This report provides an analysis of threats in 2016, and the necessary steps to protect your business from those threats. (more available) Added: October 14, 2018 2017 Fintech Security Analysis Report This very thorough report is based on a survey that sought to understand the security status of China’s Fintech Enterprises. (more available) Added: October 14, 2018 Annual Security Roundup: The Paradox Of Cyberthreats This report reviews the significant cyber events of 2017, and discusses the paradox that occurred. Added: October 14, 2018 Behind The Hidden Conversion Of Electricity To Money: An In-Depth Analysis of XMR Cryptominer Malware This paper provides an in-depth look at current cryptominer trends and the technology behind Monero. Additionally, it explores the projected attack methods that threat actors are likely to adopt, as well as tactics and best practices that security teams can utilize to keep themselves on the right side of this emerging cat-and-mouse game. (more available) Added: October 14, 2018 Cloud Security Report 2017 This report includes research on the evolving state of cloud security. Added: October 14, 2018 Cyber Security Breaches Survey From the UK, this report was commissioned by the Department for Culture, Media and Sport (DCMS) and it details the findings from a quantitative and qualitative survey with UK businesses on cyber security. (more available) Added: October 14, 2018 Cyber Vulnerability: Where do you Stand This report focusses on the analysis of the cyber security posture of three industries: Finance and Insurance, Healthcare and Social Assistance, and Public Administration. The study looks into the number of event types by year from 2012 to 2016, the security ratings for cyber insurance by industry, and many other key data. (more available) Added: October 14, 2018 Enhancing Resilience through Cyber Incident Data Sharing and Analysis This document enumerates and evaluates consensus data categories that enterprise risk owners and insurers could use to assess risks, identify effective controls, and improve cybersecurity culture and practice. It is the second in a series of white papers. (more available) Added: October 14, 2018 Fortinet Threat Landscape Report Q1 2017 In this report, you’ll find a few highlights of what FortiGuard Labs analysts gleaned from Q1 intelligence collections. After that, they hope you’ll hang around while they dig deep into the threat landscape to unearth nuggets of insight you definitely won’t want to miss. (more available) Added: October 14, 2018 FSecure 2017 State Of Cyber Security This report gives detailed ideas behind having the proper plans for how to deal with Cybersecurity breaches. Added: October 14, 2018 «« « 44 45 46 47 48 » »»
Cryptowall Report This is a report that deals with the CryptoWall Malware. The focus of this report is to study the prevalence and global impact of CryptoWall. (more available) Added: October 15, 2018
Cyberattacks Against Intelligent Transportation Systems There is currently very little published research discussing the cybersecurity threats against ITS. In this paper, we first explored real-world ITS cyberattacks and their impact. As cyberattacks and attackers go hand-in-hand, we discussed the most likely perpetrators and their goals and motivations for attacking ITS. We then applied our knowledge of current cyberattacks to develop and analyze future cyberattack scenarios against ITS and Smart Roads. (more available) Added: October 15, 2018
Global Application and Network Security Report From the report, “This research provides a comprehensive and objective review of 2015 cyber-attacks from both a business and a technical perspective. It offers best practice advice for organizations to consider when planning for cyber-attack protection in 2016." (more available) Added: October 15, 2018
GTIC Monthly Threat Report December 2017 This monthly threat report takes a look at the month of December 2017. Specifically, it looks at insights into Coinhive, intellectual property theft via Iranian hackers, and North Korea’s new cyberattack tools. (more available) Added: October 15, 2018
McAfee Labs Threats Report June 2017 In this quarterly threats report, they highlight three Key Topics: They broadly examine evasion techniques and how malware authors use them to accomplish their goals. They explore the very interesting topic of steganography in the digital world. They examine Fareit, the most famous password-stealing malware. (more available) Added: October 15, 2018
SecureWorks Threat Intelligence Executive Monthly Report May 2016 This report from May 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues. (more available) Added: October 15, 2018
The Cloud Balancing Act for IT: Between Promise and Peril This paper is put together by a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. (more available) Added: October 15, 2018
Threat Landscape Report Q1 2018 This report continues Fortinet’s excellent threat report. It discusses operational technology, Zero-day markets, malware, cryptojacking, the hacking event at the winter olympics, the rise of botnets, and Adromeda. Read On! (more available) Added: October 15, 2018
White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime According to this report, the attractions and profitability of the digital underworld are leading some security practitioners to become ‘gray hats’ and get involved in cybercrime. (more available) Added: October 15, 2018
X-Force Threat Intelligence Index 2018 In this report, IBM culled the data collected between 01 January 2017 and 31 December 2017, to deliver insightful information about the global threat landscape and apprise security professionals about the threats most relevant to their organizations. (more available) Added: October 15, 2018
2015 Internet Crime Report The 2015 Internet Crime Report highlights the IC3’s efforts over the past year, specifically focusing on their efforts regarding Business Email Compromise (BEC) and Email Account Compromise (EAC) scams and the Operation Wellspring Initiative (OWS). (more available) Added: October 14, 2018
2016 Midmarket Threat Summary Report This report provides an analysis of threats in 2016, and the necessary steps to protect your business from those threats. (more available) Added: October 14, 2018
2017 Fintech Security Analysis Report This very thorough report is based on a survey that sought to understand the security status of China’s Fintech Enterprises. (more available) Added: October 14, 2018
Annual Security Roundup: The Paradox Of Cyberthreats This report reviews the significant cyber events of 2017, and discusses the paradox that occurred. Added: October 14, 2018
Behind The Hidden Conversion Of Electricity To Money: An In-Depth Analysis of XMR Cryptominer Malware This paper provides an in-depth look at current cryptominer trends and the technology behind Monero. Additionally, it explores the projected attack methods that threat actors are likely to adopt, as well as tactics and best practices that security teams can utilize to keep themselves on the right side of this emerging cat-and-mouse game. (more available) Added: October 14, 2018
Cloud Security Report 2017 This report includes research on the evolving state of cloud security. Added: October 14, 2018
Cyber Security Breaches Survey From the UK, this report was commissioned by the Department for Culture, Media and Sport (DCMS) and it details the findings from a quantitative and qualitative survey with UK businesses on cyber security. (more available) Added: October 14, 2018
Cyber Vulnerability: Where do you Stand This report focusses on the analysis of the cyber security posture of three industries: Finance and Insurance, Healthcare and Social Assistance, and Public Administration. The study looks into the number of event types by year from 2012 to 2016, the security ratings for cyber insurance by industry, and many other key data. (more available) Added: October 14, 2018
Enhancing Resilience through Cyber Incident Data Sharing and Analysis This document enumerates and evaluates consensus data categories that enterprise risk owners and insurers could use to assess risks, identify effective controls, and improve cybersecurity culture and practice. It is the second in a series of white papers. (more available) Added: October 14, 2018
Fortinet Threat Landscape Report Q1 2017 In this report, you’ll find a few highlights of what FortiGuard Labs analysts gleaned from Q1 intelligence collections. After that, they hope you’ll hang around while they dig deep into the threat landscape to unearth nuggets of insight you definitely won’t want to miss. (more available) Added: October 14, 2018
FSecure 2017 State Of Cyber Security This report gives detailed ideas behind having the proper plans for how to deal with Cybersecurity breaches. Added: October 14, 2018