Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Extortion

Below you will find reports with the tag of “Extortion”

image from GTIC Monthly Threat Report April 2018

GTIC Monthly Threat Report April 2018

This monthly threat report takes a look at the month of April 2018. Specifically it looks at Ransomware and Cryptojacking battling for top threat spot, Russia Nation-State targeting network infrastructure, and supply chain attacks.

(more available)
Added: October 14, 2018
image from H2 2017 Global Cyber Attack Trends Report

H2 2017 Global Cyber Attack Trends Report

This report takes a look back at the events of the last year and ponders what might occur in 2018.

(more available)
Added: October 14, 2018
image from Healthcare Cyber Research Report For 2017 A CryptoniteNXT Special Report

Healthcare Cyber Research Report For 2017 A CryptoniteNXT Special Report

This Health Care Cyber Research Report for 2017 shares very recent research on cyberattacker activity in 2017 and the virtual explosion in the reported use of ransomware in attacking health care institutions. 2017 has been a very challenging year for health care institutions. They remain under sustained attack by cyberattackers that continue to target their networks through the use of well understood vulnerabilities.

(more available)
Added: October 14, 2018
image from How To Fight The Phishing Epidemic And Win

How To Fight The Phishing Epidemic And Win

This ebook takes a look at the Phishing Epidemic and offers some solutions to help organizations win that battle.

Added: October 14, 2018
image from Quarterly Threat Report:Second Quarter 2017

Quarterly Threat Report:Second Quarter 2017

This is Rapid7’s Quarterly Threat Report, in this report they sought to include composite and industry-level views of events across many industries.

(more available)
Added: October 14, 2018
image from Quarterly Threats Report March 2018 Infographic

Quarterly Threats Report March 2018 Infographic

This infographic is a summary of the main points in the McAfee Labs Quarterly Threat Report from March 2018

Added: October 14, 2018
image from Report Q1 2015 (January - March 2015)

Report Q1 2015 (January - March 2015)

A breakdown of the data, and types of, cyber attacks that occurred in the first quarter of 2015.

Added: October 14, 2018
image from Second Annual State of Ransomware Report: US Survey Results

Second Annual State of Ransomware Report: US Survey Results

The title of the article details what it discusses. Ransware attacks caused 22 percent of small to medium size organizations to cease business operations immediately.

(more available)
Added: October 14, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report June 2016

SecureWorks Threat Intelligence Executive Monthly Report June 2016

This report from June 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 14, 2018
image from Tech Industry Doppelgangers: Campaign Innovation In the World of Cybercrime

Tech Industry Doppelgangers: Campaign Innovation In the World of Cybercrime

This thought piece draws on the experience of 451 Networks analysts and interviews with defensive security professionals to review major trends in attackers tools, techniques, and processes (TTPs).

(more available)
Added: October 14, 2018
image from The Reign Of Ransomware

The Reign Of Ransomware

In this report, we round up all the significant security stories during the first half of 2016 to encourage businesses to check for vulnerabilities cybercriminals may abuse. Our report also aims to highlight the need for enterprises to be vigilant in finding solutions that would stop cybercriminals from winning and letting our prediction become their reality.

(more available)
Added: October 14, 2018
image from The State Of Endpoint Security Today

The State Of Endpoint Security Today

This paper delivers insights into the prevalent cybersecurity issues facing organizations today: from ransomware to exploits and machine learning, it shares the experiences and future plans of IT managers across the globe. It’s an illuminating read, providing insight into where the field stands on these issues.

(more available)
Added: October 14, 2018
image from Webroot Threat Report 2017

Webroot Threat Report 2017

The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users over the past year.

(more available)
Added: October 14, 2018
image from X-Force Threat Intelligence Index 2017

X-Force Threat Intelligence Index 2017

The Threat Intelligence Index outlines the security threat landscape based on data gathered for the entire year of 2016. It uses data developed by analyzing “billions" of events, monitored by IBM security services, in more than 100 countries.

(more available)
Added: October 14, 2018
image from 2014 Internet Crime Report

2014 Internet Crime Report

The 2014 Internet Crime Report highlights the IC3’s efforts to prevent and reduce the prevalence and impact of Internet crimes, and reveals at least two budding Internet crime trends. First, the increased use of social media has provided a quintessential goldmine of personal data for perpetrators. More victims are submitting complaints documenting how social media was utilized to perpetrate frauds, or indicating the perpetrator initiated a relationship through social engineering. Second, the emerging popularity of virtual currency has attracted perpetrators, who are capitalizing on the vulnerabilities of the digital currency systems.

(more available)
Added: October 13, 2018
image from 2015 Internet Security Threat Report, Volume 20

2015 Internet Security Threat Report, Volume 20

This annual Threat Report, gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future.

(more available)
Added: October 13, 2018
image from 2018 Security Predictions

2018 Security Predictions

In this report, they describe major security shifts we expect in 2018. At the heart of many of these predictions is a requirement to understand the intersection of people, critical data and IP – the human point. By placing behavior and intent at the center of security, security professionals can keep up with technological innovations to come.

(more available)
Added: October 13, 2018
image from Android Security: 2015 Year In Review

Android Security: 2015 Year In Review

From the report, “We consider transparency to be critical, so our second annual Android Security Year in Review is intended to share the progress we’ve made with regards to security in the last year, as well as provide our view of the state of security in the Android ecosystem.”

(more available)
Added: October 13, 2018
image from Annual Report 2015

Annual Report 2015

This report concludes that in 2015, cyber attacks grew at an alarming rate, and makes the prediction that Cryptolocker will continue to be a cyber threat. It also discusses the Internet of Things and how those devices can be turned into tools for cyber criminals. It also concluded that the data thefts that have occurred make it clear that businesses have a protection deficit that they need to work on immediately.

(more available)
Added: October 13, 2018
image from Conversational Office 365 Risk Mitigation: A Conversational Geek Book

Conversational Office 365 Risk Mitigation: A Conversational Geek Book

This ebook provides a casual approach to cloud mitigation. It offers information in a conversational method, allowing for the reader to be able to more effectively communicate with those in his organization who need the information.

(more available)
Added: October 13, 2018
image from Cyber Threats continue to Escalate

Cyber Threats continue to Escalate

This simple, but effective, infographic displays the trends of cyber threats, impacts and ransomware.

Added: October 13, 2018
  • ««
  • «
  • 45
  • 46
  • 47
  • 48
  • 49
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 04:08 UTC (build b1d7be4)