Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Extortion

Below you will find reports with the tag of “Extortion”

image from 2022 Healthcare Cybersecurity Year in Review, and a 2023 Look-Ahead

2022 Healthcare Cybersecurity Year in Review, and a 2023 Look-Ahead

As health care delivery organizations have increased their reliance on health information technology, they have also increased their exposure to new cybersecurity risks, such as ransomware attacks.

(more available)
Added: July 5, 2023
image from The State of Email Security 2023

The State of Email Security 2023

Mimecast’s seventh annual State of Email Security report comes as organizations all over the world grow more skittish over rising economic volatility and intensifying geopolitical tensions. Now is definitely not the time to become lax on cybersecurity.

(more available)
Added: July 5, 2023
image from Enisa Threat Landscape 2022

Enisa Threat Landscape 2022

This is the tenth edition of the ENISA Threat Landscape (ETL) report, an annual report on the status of the cybersecurity threat landscape. It identifies the top threats, major trends observed with respect to threats, threat actors and attack techniques, as well as impact and motivation analysis. It also describes relevant mitigation measures.

(more available)
Added: July 5, 2023
image from A CISO's Guide to Email Security in 2023

A CISO's Guide to Email Security in 2023

CISOs are facing increased challenges in an escalating threat landscape, with email as the primary target for attacks. This white paper breaks down the requirements for modern email security in protecting organizations from advanced and novel threats – moving from historically-trained tools to a behavioral, AI-driven approach.

(more available)
Added: June 29, 2023
image from 2021 ForgeRock Consumer Identity Breach Report

2021 ForgeRock Consumer Identity Breach Report

This report shares detailed insights and data on the breaches impacting consumers in 2020 and provides year-over-year comparisons to breaches affecting consumers in the U.S. in 2019. It clearly demonstrates the need for organizations to adopt a comprehensive identity and access management (IAM) solution to help prevent identity-related data breaches, protect their brands, and preserve customer relationships.

(more available)
Added: June 29, 2023
image from 2022 Forgerock Consumer Identity Breach Report

2022 Forgerock Consumer Identity Breach Report

Our report focuses on confirmed breaches in which confidential data is exposed and/or stolen. A confirmed breach can refer to a single record being stolen — and such a breach must be analyzed and remediated to determine the source — but because most breaches are financially driven, attackers target large caches of data that they can hold for ransom or sell on the dark web.

(more available)
Added: June 29, 2023
image from 2023 ForgeRock Identity Breach Report

2023 ForgeRock Identity Breach Report

This report focuses on confirmed breaches in which confidential data has been exposed and/or stolen, ranging from very small breaches to large caches of data that provide financial incentives to hackers to hold for ransom, sell on the dark web, or both. . Many breaches that occurred as a result of third parties (vendors, suppliers, contractors, or other organizations) were researched to determine the root causes.

(more available)
Added: June 29, 2023
image from Managing Security Risk: Cybersecurity Solutions for Mid-Sized Businesses

Managing Security Risk: Cybersecurity Solutions for Mid-Sized Businesses

There is a new security reality facing mid-sized business leaders and security professionals today. In this guide, you’ll find answers to these challenges and how an MDR solution can help you efficiently maximize security investments and effectively manage security risks to your business.

(more available)
Added: June 28, 2023
image from 2023 Annual Threat Report

2023 Annual Threat Report

In our annual Threat Report, the Deepwatch Adversary Tactics and Intelligence (ATI) team provides data on the leading cybersecurity threats that SOC security analysts faced in 2022, and offers predictions of what teams will likely face in 2023. With analysis from ATI research and Deepwatch customer engagements, we review the types of volumes of threats, look at the challenges in visualization and identification, and consider what lingering or growing threats SOC teams should prioritize.

(more available)
Added: June 28, 2023
image from 2023 OpenText Cybersecurity Email Threat Report

2023 OpenText Cybersecurity Email Threat Report

Attackers persistently adapted their email-based techniques throughout 2022, cycling through new and old tactics in the hopes of evading human and cyber security measures.

(more available)
Added: June 27, 2023
image from SANS 2023 SOC Survey

SANS 2023 SOC Survey

In this, our seventh annual survey, we added many questions but didn’t really take any away. Our new areas of focus include operational threat hunting, threat intelligence, data ingestion into the SIEM, and SOAR, as well as more detailed questions relevant to staff hiring and retention.

(more available)
Added: June 27, 2023
image from Cybersecurity for Rail Transportation Networks

Cybersecurity for Rail Transportation Networks

In this eBook, we will discuss the challenges of securing today’s rail networks in the face of increasingly frequent and severe cyber threats, the impact of intensifying regulatory requirements and the potential damage that malicious actors could leave behind. Finally, we will explore the most critical things to look for in a security solution for rail transportation networks.

(more available)
Added: June 27, 2023
image from 2023 Cyberthreat Defense Report

2023 Cyberthreat Defense Report

CyberEdge’s annual Cyberthreat Defense Report (CDR) plays a unique role in the IT security industry. Other surveys do a great job of collecting statistic on cyberattacks and data breaches and exploring the techniques of cybercriminals and other bad actors. Our mission is to provide deep insight into the minds of IT security professionals.

(more available)
Added: June 13, 2023
image from Cyber Resilience Report 2023

Cyber Resilience Report 2023

In this report you’ll gain valuable insights into the current state of cyber resilience, understand the latest threats, trends, and best practices to protect your organization effectively. Discover proactive strategies and technological solutions to bolster your organization’s cyber defenses, mitigating risks and minimizing the financial impact of potential cyber attacks.

(more available)
Added: June 13, 2023
image from 2023 Data Breach Investigations Report

2023 Data Breach Investigations Report

This report aims to take a look at the times when things did not work as intended—not to point fingers but to help us all learn and improve. In a time where almost everyone, corporations and individuals alike, is looking at ways to do more with less, we believe a close analysis of when our defenses failed can be very beneficial. While times of great change are always challenging, they often also prompt us to take stock of our situation and, if necessary, refocus both our viewpoint and our energies. Such is the case with the DBIR this year. As a team, we decided to take a step back toward the fundamental things that got us where we are, an intense focus on actual data breaches analyzed using our own VERIS Framework. And speaking of VERIS, one of the new goodies this refocusing brings is an even better mapping between VERIS and MITRE ATT&CK through a collaboration with MITRE Ingenuity and the Center for Threat Informed Defense (CTID).

(more available)
Added: June 6, 2023
image from The State of Ransomware 2023

The State of Ransomware 2023

The research revealed that the rate of ransomware attacks has remained level, with 66% of respondents reporting that their organization was hit by ransomware in the previous year, the same as in our 2022 survey. With adversaries now able to consistently execute attacks at scale, ransomware is arguably the biggest cyber risk facing organizations today.

(more available)
Added: May 23, 2023
image from Cyber Workforce Resilience Trend Report 2023

Cyber Workforce Resilience Trend Report 2023

With a steady increase in cyberattacks each year and a constantly evolving threat landscape, more organizations are turning their attention to building long-term cyber resilience: the ability of the workforce to adapt, respond, and recover from cybersecurity incidents, not merely the ability to detect and prevent them. To learn more about the state of cyber resilience, we surveyed senior security and risk leaders and found that cyber resilience indeed tops their list of strategic and spending priorities for organizations in 2023, driven largely by concerns about ransomware, supply chain and third-party attacks, and coding vulnerabilities.

(more available)
Added: May 23, 2023
image from 2023 State of the Phish

2023 State of the Phish

Our annual State of the Phish report explores end-user security awareness, resilience and risk across 15 countries (eight more than in previous years). The report benchmarks understanding of common cyber threats and defensive tactics and reveals how potential gaps in knowledge and cyber hygiene enable the real-world attack landscape. Most attacks target people before they target systems. That’s why helping users build sustainable security habits is crucial.

(more available)
Added: May 19, 2023
image from What Decision - Makers Need to Know About Ransomware Risk

What Decision - Makers Need to Know About Ransomware Risk

The goal of this paper is to help decision-makers and entities who can protect systems from ransomware at scale, such as the security industry, governments, and policymakers, to form defensive strategies on how best to make an impact on the ransomware ecosystem. While this paper does not focus on hands-on technical defenses that an enterprise would look to for deployment, it does aim to provide decision-makers with methods for understanding the level of risk that an organization faces from this threat.

(more available)
Added: May 18, 2023
image from 2023 Ransomware Insights

2023 Ransomware Insights

Our international survey explored the experience of ransomware attacks on organizations over the last 12 months. The findings show that almost three-quarters (73%) of respondents report being hit with at least one successful ransomware attack in 2022 — and 38% say they were hit twice or more.

(more available)
Added: May 15, 2023
image from 2022 ThreatLabz Data Loss Report

2022 ThreatLabz Data Loss Report

The basis of this report is the Zscaler ThreatLabz research team’s analysis of nearly 6 billion data loss policy violations from November 2021 through July 2022. We’ll look at what and how enterprise data is being shared, where it’s going, which malicious actors are targeting it, and how you can improve your datasharing hygiene so as to mitigate risk without stifling productivity.

(more available)
Added: May 5, 2023
  • ««
  • «
  • 7
  • 8
  • 9
  • 10
  • 11
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 08:08 UTC (build b1d7be4)