Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Financial Gain

Below you will find reports with the tag of “Financial Gain”

image from Gaming Cyber Threats

Gaming Cyber Threats

Intel 471 can help your organization defend against a wide variety of cyber threats by providing deep insights and comprehensive expertise into cybercriminal actors and related activity. This report provides a brief exploration of our unique insight into the cyber underground, highlighting how we can proactively help you stay ahead of the curve, enabling you to fight cybercrime and win.

(more available)
Added: February 9, 2023
image from UK Cyber Threats

UK Cyber Threats

This report provides a strategic-level overview of threats identified impacting the U.K. and U.K. based businesses, including ransomware and initial access brokers (IABs). as well as common threat actors tactics, techniques and procedures (TTPs) observed.

(more available)
Added: February 9, 2023
image from 2022 Year In Review

2022 Year In Review

Our research and collection methods largely are driven by our GIRs, however, we continue to acknowledge that new trends in our reporting, recurring requests for information (FRIs) and other significant activity from or against underground threat actors and/or services are equally important to our research into trending topics.

(more available)
Added: February 8, 2023
image from Cyber Threat Index 2023

Cyber Threat Index 2023

This report includes insights on internet security, cyber risk, and security trends that organizations have face over the last year and what they need to prepare for in 2023. We’re sharing the critical information and our insights to help decision-makers in the information security community and insurtech sectors better understand the cyber risk landscape. Coalition’s data set includes internet scans of 5.2 billion IP addresses-an impressive number that comprises the entire IPv4 address space and relevant IPv6 addresses.

(more available)
Added: February 3, 2023
image from 2022 Blackberry Threat Report Highlights

2022 Blackberry Threat Report Highlights

The cyber events of the past year included unprecedented supply chain attacks, assaults on critical infrastructure, and widespread vulnerabilities likely to haunt organizations for years. These events, among many others, are detailed in Blackberry 2022 Threat Report. However, reading the entire report can prove challenging for security professionals with little time to spare.

(more available)
Added: February 1, 2023
image from Five lessons from 1,000 destructive ransomware events

Five lessons from 1,000 destructive ransomware events

RiskRecon studied 1,000 publicly reported destructive ransomware events that occurred between January 2016 and November 2022. These publicly reported events were identifies through internet keyword searches, monitoring of event disclosure sites, dark web sites, and 8K SEC filings. Events in which the impact was limited to data theft were excluded.

(more available)
Added: January 19, 2023
image from Global Cybersecurity Outlook 2022

Global Cybersecurity Outlook 2022

The Global Cybersecurity Outlook flagship report identifies the trends and analyzes the near-term future cybersecurity challenges. The accelerated shift to remote working during the COVID-19 pandemic coupled the recent high-profile cyberattacks have resulted in bringing cybersecurity top of mind among key decision-makers in organizations and nations.

(more available)
Added: January 19, 2023
image from 2022 Securonix Threat Report

2022 Securonix Threat Report

The 2022 Securonix Threat Report highlights the trends, required data, and detection summaries for key trends. Additionally, our report covers the techniques we’ve seen from the trenches across insider threat, cloud infrastructure misuse/abuse, and preemptive ransomware detection. Finally, we added a new section in this report covering loT/OT.

(more available)
Added: January 11, 2023
image from January 2023 Threat Horizon Report

January 2023 Threat Horizon Report

The Google Cloud Threat Horizons Report brings decision-makers strategic intelligence on threats to cloud enterprise users and the best original cloud-relevant research and security recommendations from throughout Google’s intelligence and security teams.

(more available)
Added: January 11, 2023
image from 2023 Global Automotive Cybersecurity Report

2023 Global Automotive Cybersecurity Report

This report marks Upstream’s fifth annual report, uncovering the expanding and emerging automotive cybersecurity risks, and how they impact the entire smart mobility ecosystem.

(more available)
Added: January 11, 2023
image from Deepwatch SecOps Pulse Survey Q4 2022

Deepwatch SecOps Pulse Survey Q4 2022

The Deepwatch SecOps Pulse Survey research shows that security teams are more focused on improving response capabilities over detection improvements. This speaks to rising threats and an expanding attack surface that makes attacks nearly inevitable, forcing teams to prioritize limited resources.

(more available)
Added: December 22, 2022
image from Threat Intelligence Report -Q2 2022

Threat Intelligence Report -Q2 2022

This report leveraged the Fortinet service to provide a deep dive into what adversaries are seeing, doing, and planning, enabling organizations to better understand the threats posed by the growth of criminal forums and markets operating on the darknet. The report covers global, regional, and industry/sector threat landscape perspective as well as protection recommendations for IT and OT organizations for darknet activity observed during Q2 2022.

(more available)
Added: December 22, 2022
image from 2022 Falcon OverWatch Threat Hunting Report

2022 Falcon OverWatch Threat Hunting Report

This year’s report starts with a close look at OverWatch’s extensive dataset covering observed interactive threat actor behaviors, which we will refer to in this report as “intrusion activity.” It uses this data to examine how and where adversaries are operating to provide a comprehensive overview of the threat landscape.

(more available)
Added: December 20, 2022
image from Tenable's 2021 Threat Landscape Retrospective

Tenable's 2021 Threat Landscape Retrospective

The goal of this report is to help defenders understand the fulls cope of today’s modern attack surface so they can continue to refine their cybersecurity strategies and reduce risk. In this report, we explore the most notable vulnerabilities of the year and how they were used in attack chains, with specific focus on the value of Active Directory to threat actors.

(more available)
Added: December 16, 2022
image from Cyber Insurance Research Report

Cyber Insurance Research Report

Our hope is the results of the survey report and our expert analysis helps you prepare for obtaining and renewing cyber insurance, with coverage and rates that accurately reflect your risk profile.

(more available)
Added: December 9, 2022
image from Managing Human Risk

Managing Human Risk

The SANS 2022 Security Awareness Report analyzes data provided by more than a thousand security awareness professionals from around the world to identify and benchmark how organizations are managing their human risk. The goal of this data-driven report is to provide actionable steps and resources to enable organizations to mature their awareness programs and benchmark them against others.

(more available)
Added: November 29, 2022
image from Sophos 2023 Threat Report

Sophos 2023 Threat Report

In 2022 the cybercriminal economy has increasingly transformed into an industry. Information technology companies have shifted too “as-a-service” offerings, and the cybercrime ecosystem has done the same. Access brokers, ransomware, information-stealing malware, malware delivery, and other elements of cybercrime operations have lowered barriers to entry for world-be cybercriminals.

(more available)
Added: November 29, 2022
image from Trust Services Security Incidents 2021

Trust Services Security Incidents 2021

This report, the Annual Report Trust Services Security Incidents 2021, analyzing root causes, statistics and trends. This report marks the sixth round of security incident reporting for the for the EU’s trust services sector. In this round of annual summary reporting a total of 27 EU countries and 3 EEA countries took part. They reported a total of 46 incidents.

(more available)
Added: November 9, 2022
image from Cyber Security Forecast 2023

Cyber Security Forecast 2023

Threats evolve, attackers constantly change their tactics, techniques and procedures, and defenders must adapt and stay relentless if they want to keep ip. This forecast aims to help they cyber security industry frame its fight against cyber adversaries in 2023.

(more available)
Added: November 2, 2022
image from Financial Trend Analysis

Financial Trend Analysis

The information in this report is based on ransomware-related information obtained from analysis of BSA data, trade publications, and commercial reporting, as well as insights from law enforcement and other partners. Trends represented in this report illustrate financial institutions’ identification and reporting of ransomware events and may not reflect the actual dates associated with ransomware incidents.

(more available)
Added: November 2, 2022
image from 2022 Cloud Data Security Report

2022 Cloud Data Security Report

This report will help organizations concentrate their security efforts on what really matters and highlight the main obstacles on their way to safe cloud computing.

(more available)
Added: October 31, 2022
  • ««
  • «
  • 9
  • 10
  • 11
  • 12
  • 13
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 5, 2025 08:08 UTC (build b1d7be4)