Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Financial Gain

Below you will find reports with the tag of “Financial Gain”

image from 2017 Cybercrime Report

2017 Cybercrime Report

This report goes in depth on Cybercrime in 2017.

Added: May 18, 2020
image from 2020 Data Security Incident Response Report

2020 Data Security Incident Response Report

The 2020 data breach report from the events managed by the BakerHosteltler incident response team. Trends, timelines, and losses are covered.

(more available)
Added: May 18, 2020
image from M-Trends 2019

M-Trends 2019

Mandiant’s 2019 edition of their threat intel report. Focusing on significant trends in attack TTPs over the past calendar year.

(more available)
Added: May 14, 2020
image from Global DDoS Threat Landscape 2019

Global DDoS Threat Landscape 2019

This is a report put out by Impervia based on their 2019 DDoS attack study. Their analysis of attacks is based on data from 3,643 network layer DDoS attacks on websites using Imperva services from January 1, 2019 through December 31, 2019, and on 42,390 application layer attacks on websites using Imperva services from May 1, 2019 through December 31, 2019,

(more available)
Added: May 11, 2020
image from 2020 User Risk Report: Exploring Vulnerability and Behavior in a People-Centric Threat Landscape

2020 User Risk Report: Exploring Vulnerability and Behavior in a People-Centric Threat Landscape

This survey of 3500 people (conducted by a 3rd party survey research company) examines attitudes and knowledge of various security concepts. The survey is mainly focused on the Western World, the US, Western Europe, and Australia, with Japan being the only Asian country included.

(more available)
Added: May 6, 2020
image from Mind the Gap: The Underinsurance of Cyber Risk

Mind the Gap: The Underinsurance of Cyber Risk

Discusses systemic cyber risk, catastrophic losses, and the implications upon cyber insurance policies.

Added: April 24, 2020
image from Dark Commerce: Exploring the Cybercrime Industry and it's Business Models

Dark Commerce: Exploring the Cybercrime Industry and it's Business Models

This report, the first in a series from Blueliv offering an overview of cybercrimeindustry, detailed some features of a rapidly growing cybercriminal serviceseconomy. We first covered the first elements in a process, from acquiringand preparing malicious code for use in a campaign, prior to setting upthe infrastructure to deliver the ‘product’ to its victims.

(more available)
Added: April 5, 2020
image from Double Dragon: APT41, a dual espionage and cyber crime operation

Double Dragon: APT41, a dual espionage and cyber crime operation

FireEye Threat Intelligence assesses with high confidence that APT41 is a prolific cyber threat group that carries out Chinese state-sponsored espionage activity in addition to financially motivated activity potentially outside of state control. Activity traces back to 2012 when individual members of APT41 conducted primarily financially motivated operations focused on the video game industry before expanding into likely statesponsored activity. This is remarkable because explicit financially motivated targeting is unusual among Chinese state-sponsored threat groups, and evidence suggests these two motivations were balanced concurrently from 2014 onward.

(more available)
Added: April 5, 2020
image from Cyber Insurance Purchasing Grows Again in 2019

Cyber Insurance Purchasing Grows Again in 2019

The number of companies purchasing cyber insurance continued to increase in 2019, driven by growing recognition of cyber threats as a critical business risk and appreciation for cyber insurance’s role in mitigating its economic impact.

(more available)
Added: March 29, 2020
image from Q4 2019 Malware Trends

Q4 2019 Malware Trends

This report outlines happenings in malware attacks for the last 3 months of 2019. In general, it says malware attacks died down this quarter.

(more available)
Added: March 29, 2020
image from Resilience360 Annual Risk Report 2020

Resilience360 Annual Risk Report 2020

The insights presented in this report will help guide your supply chainmonitoring and risk mitigation strategy, enable better informed decision-making processes, and aid the formulationof responses that create more resilient and sustainablebusiness operations.

(more available)
Added: March 29, 2020
image from 2020 Global Threat Report

2020 Global Threat Report

If there’s one thing this year’s Global Threat Report really brings home, it’s that there’s never been a better time to get involved in cybersecurity. The stakes are high, and rising every day. Those that read and share this report are helping to educate themselves and others to better protect themselves and their communities, both at work and at home.

(more available)
Added: March 29, 2020
image from Threat Landscape Report Q4 2019

Threat Landscape Report Q4 2019

This is the threat landscape report from Fortinet for the 4th quarter of 2019. It goes into changes in this quarter, including threat detection changes and attack changes.

(more available)
Added: March 15, 2020
image from M-Trends 2020

M-Trends 2020

FireEye has been detecting and responding to cyber attacks every day for over 15 years. The release of M-Trends® 2020 marks 11 years of providing the cyber security community with insights gained from the frontlines of those attacks.

(more available)
Added: March 1, 2020
image from CISO Media Consumption

CISO Media Consumption

In this, our launch issue of CyberTheory, we will explore the current and future state of cybersecurity, the key issues driving the shift in the corporate board room perception of cyber-risk and add substantive analysis to what we believe are the most engaging topics in the space.

(more available)
Added: March 1, 2020
image from Securing industrial Control Systems- 2017

Securing industrial Control Systems- 2017

We annually gather and analyze raw data from hundreds of IT and industrial control systems (ICS) security practitioners across a variety of industries, people whose work places them in positions of responsibility to identify risks and safeguard control systems and networks from malicious and accidental actions. It is our mission to turn these inputs into actionable intelligence that can be used to support new developments and address ongoing trends in the field, to inform the crucial business decisions that determine allocation of resources, prioritization of protective measures on critical assets and systems, and planning of new initiatives.

(more available)
Added: February 18, 2020
image from The New Mafia: Gangs and Vigilantes

The New Mafia: Gangs and Vigilantes

This guide was constructed with insight from a global panel of Malwarebytes experts and external experts from a variety of disciplines. It also features a brief review of cybercrime history, the emergence of new participants and the impact on businesses and individuals.

(more available)
Added: February 18, 2020
image from 2019 Cyber Threatscape Report

2019 Cyber Threatscape Report

Accenture details trends in cyber threats in 2019. It narrows it down to five key features of the 2019 Trendscape: 1. New threats are occuring from technology evolution and disinformation. 2:Cybercriminals adapt, hustle, diversify, and are looking more like states. 3: hybrid motives pose new dangers of ransomware defense and response 4:Improved ecosystem hygiene is pushing threats to the supply chain

(more available)
Added: February 17, 2020
image from Global DDoS Threat Landscape Q4 2017

Global DDoS Threat Landscape Q4 2017

Imperva outlines trends in the DDoS threat landscape in 2017, including that the number of attacks has doubled, that crypto-currency continues to be targeted, and that persistent attacks are growing more common.

(more available)
Added: February 17, 2020
image from 2019 Internet Crime Report

2019 Internet Crime Report

This year’s Internet Crime Report highlights the IC3’s efforts to monitor trending scams such as Business Email Compromise (BEC), Ransomware, Elder Fraud, and Tech Support Fraud. As the report indicates, in 2019, IC3 received a total of 467,361 complaints with reported losses exceeding $3.5 billion. The most prevalent crime types reported were Phishing/Vishing/Smishing/Pharming, Non-Payment/Non-Delivery, Extortion, and Personal Data Breach. The top three crime types with the highest reported losses were BEC, Confidence/Romance Fraud, and Spoofing. More details on each of these scams can be found in this report.

(more available)
Added: February 17, 2020
image from X-Force Threat Intelligence Index

X-Force Threat Intelligence Index

X-Force Incident Response and Intelligence Services (IRIS) compiled IBM Security software and security services analyses from the past year, which show that 2019 was a year of reemerging old threats being used in new ways.

(more available)
Added: February 14, 2020
  • ««
  • «
  • 18
  • 19
  • 20
  • 21
  • 22
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 08:08 UTC (build b1d7be4)