Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Extortion

Below you will find reports with the tag of “Extortion”

image from Cryptowall Report

Cryptowall Report

This is a report that deals with the CryptoWall Malware. The focus of this report is to study the prevalence and global impact of CryptoWall.

(more available)
Added: October 15, 2018
image from Cyberattacks Against Intelligent Transportation Systems

Cyberattacks Against Intelligent Transportation Systems

There is currently very little published research discussing the cybersecurity threats against ITS. In this paper, we first explored real-world ITS cyberattacks and their impact. As cyberattacks and attackers go hand-in-hand, we discussed the most likely perpetrators and their goals and motivations for attacking ITS. We then applied our knowledge of current cyberattacks to develop and analyze future cyberattack scenarios against ITS and Smart Roads.

(more available)
Added: October 15, 2018
image from Global Application and Network Security Report

Global Application and Network Security Report

From the report, “This research provides a comprehensive and objective review of 2015 cyber-attacks from both a business and a technical perspective. It offers best practice advice for organizations to consider when planning for cyber-attack protection in 2016."

(more available)
Added: October 15, 2018
image from GTIC Monthly Threat Report December 2017

GTIC Monthly Threat Report December 2017

This monthly threat report takes a look at the month of December 2017. Specifically, it looks at insights into Coinhive, intellectual property theft via Iranian hackers, and North Korea’s new cyberattack tools.

(more available)
Added: October 15, 2018
image from McAfee Labs Threats Report June 2017

McAfee Labs Threats Report June 2017

In this quarterly threats report, they highlight three Key Topics: They broadly examine evasion techniques and how malware authors use them to accomplish their goals. They explore the very interesting topic of steganography in the digital world. They examine Fareit, the most famous password-stealing malware.

(more available)
Added: October 15, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report May 2016

SecureWorks Threat Intelligence Executive Monthly Report May 2016

This report from May 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 15, 2018
image from The Cloud Balancing Act for IT: Between Promise and Peril

The Cloud Balancing Act for IT: Between Promise and Peril

This paper is put together by a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.

(more available)
Added: October 15, 2018
image from Threat Landscape Report Q1 2018

Threat Landscape Report Q1 2018

This report continues Fortinet’s excellent threat report. It discusses operational technology, Zero-day markets, malware, cryptojacking, the hacking event at the winter olympics, the rise of botnets, and Adromeda. Read On!

(more available)
Added: October 15, 2018
image from White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime

White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime

According to this report, the attractions and profitability of the digital underworld are leading some security practitioners to become ‘gray hats’ and get involved in cybercrime.

(more available)
Added: October 15, 2018
image from X-Force Threat Intelligence Index 2018

X-Force Threat Intelligence Index 2018

In this report, IBM culled the data collected between 01 January 2017 and 31 December 2017, to deliver insightful information about the global threat landscape and apprise security professionals about the threats most relevant to their organizations.

(more available)
Added: October 15, 2018
image from 2015 Internet Crime Report

2015 Internet Crime Report

The 2015 Internet Crime Report highlights the IC3’s efforts over the past year, specifically focusing on their efforts regarding Business Email Compromise (BEC) and Email Account Compromise (EAC) scams and the Operation Wellspring Initiative (OWS).

(more available)
Added: October 14, 2018
image from 2016 Midmarket Threat Summary Report

2016 Midmarket Threat Summary Report

This report provides an analysis of threats in 2016, and the necessary steps to protect your business from those threats.

(more available)
Added: October 14, 2018
image from 2017 Fintech Security Analysis Report

2017 Fintech Security Analysis Report

This very thorough report is based on a survey that sought to understand the security status of China’s Fintech Enterprises.

(more available)
Added: October 14, 2018
image from Annual Security Roundup: The Paradox Of Cyberthreats

Annual Security Roundup: The Paradox Of Cyberthreats

This report reviews the significant cyber events of 2017, and discusses the paradox that occurred.

Added: October 14, 2018
image from Behind The Hidden Conversion Of Electricity To Money: An In-Depth Analysis of XMR Cryptominer Malware

Behind The Hidden Conversion Of Electricity To Money: An In-Depth Analysis of XMR Cryptominer Malware

This paper provides an in-depth look at current cryptominer trends and the technology behind Monero. Additionally, it explores the projected attack methods that threat actors are likely to adopt, as well as tactics and best practices that security teams can utilize to keep themselves on the right side of this emerging cat-and-mouse game.

(more available)
Added: October 14, 2018
image from Cloud Security Report 2017

Cloud Security Report 2017

This report includes research on the evolving state of cloud security.

Added: October 14, 2018
image from Cyber Security Breaches Survey

Cyber Security Breaches Survey

From the UK, this report was commissioned by the Department for Culture, Media and Sport (DCMS) and it details the findings from a quantitative and qualitative survey with UK businesses on cyber security.

(more available)
Added: October 14, 2018
image from Cyber Vulnerability: Where do you Stand

Cyber Vulnerability: Where do you Stand

This report focusses on the analysis of the cyber security posture of three industries: Finance and Insurance, Healthcare and Social Assistance, and Public Administration. The study looks into the number of event types by year from 2012 to 2016, the security ratings for cyber insurance by industry, and many other key data.

(more available)
Added: October 14, 2018
image from Enhancing Resilience through Cyber Incident Data Sharing and Analysis

Enhancing Resilience through Cyber Incident Data Sharing and Analysis

This document enumerates and evaluates consensus data categories that enterprise risk owners and insurers could use to assess risks, identify effective controls, and improve cybersecurity culture and practice. It is the second in a series of white papers.

(more available)
Added: October 14, 2018
image from Fortinet Threat Landscape Report Q1 2017

Fortinet Threat Landscape Report Q1 2017

In this report, you’ll find a few highlights of what FortiGuard Labs analysts gleaned from Q1 intelligence collections. After that, they hope you’ll hang around while they dig deep into the threat landscape to unearth nuggets of insight you definitely won’t want to miss.

(more available)
Added: October 14, 2018
image from FSecure 2017 State Of Cyber Security

FSecure 2017 State Of Cyber Security

This report gives detailed ideas behind having the proper plans for how to deal with Cybersecurity breaches.

Added: October 14, 2018
  • ««
  • «
  • 44
  • 45
  • 46
  • 47
  • 48
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 04:08 UTC (build b1d7be4)