Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Financial Gain

Below you will find reports with the tag of “Financial Gain”

image from Investigation: WannaCry Cyber Attack And The NHS

Investigation: WannaCry Cyber Attack And The NHS

This report, out of Great Britain, focuses on the WannaCry Cyber Attack and what they learned in their investigation.

Added: October 25, 2018
image from IT Security at SMBs: 2017 Benchmarking Survey

IT Security at SMBs: 2017 Benchmarking Survey

This report presents the results of an in-depth primary market research survey of cyber security decision-makers in small to mid-sized businesses in the United States, conducted during August and September 2017. The goal of their research was to understand how SMBs, undertake decision-making in the context of their internet security, how they evaluate security solutions, and their budgetary concerns.

(more available)
Added: October 25, 2018
image from Malware Review 2018

Malware Review 2018

This report takes a look back at 2017 and a look forward to 2018. It focuses specifically on malware attacks.

(more available)
Added: October 25, 2018
image from Minerva's 2016 Year In Review

Minerva's 2016 Year In Review

Released in 2017, this report details the cyberthreats that Minerva dealt with in 2016.

Added: October 25, 2018
image from Protecting Against Tomorrow's Malware Attacks Today

Protecting Against Tomorrow's Malware Attacks Today

This article from the UK discusses ways that organizations can protect themselves from future Malware attacks.

Added: October 25, 2018
image from Ransomware and Businesses 2016

Ransomware and Businesses 2016

This report from Symantec gives a variety of information about ransomware. It gives an overview, discusses the factors driving the growth and persistence of ransomware, infection vectors, platforms affected, the major ransomware families and finally, how businesses are going to be impacted.

(more available)
Added: October 25, 2018
image from Ransomware: Past, Present and Future

Ransomware: Past, Present and Future

This paper details the history and abilities of Ransomware, and where it is headed in the coming years.

Added: October 25, 2018
image from SilverTerrier: Rise Of Nigerian Business Email Compromise

SilverTerrier: Rise Of Nigerian Business Email Compromise

With unique and specialized analysis, this paper discusses Nigerian cyber crime actors, their growth, collaboration, and the direction they are headed.

(more available)
Added: October 25, 2018
image from The CIO's Triple Threat Guide To Care Team Communication

The CIO's Triple Threat Guide To Care Team Communication

This report seeks to discuss the issues related to archaic communication devices in the hospital setting. It hopes to provide assistance for the security issues related to updating communication systems.

(more available)
Added: October 25, 2018
image from Threat Intelligence: Cyberattacks And The Utility Industry

Threat Intelligence: Cyberattacks And The Utility Industry

This report takes a look at how cyberattacks impact the utility industry.

Added: October 25, 2018
image from Understanding the Depth of the Global Ransomware Problem

Understanding the Depth of the Global Ransomware Problem

This report presents the results of a survey undertaken in the United States, Canada, Germany and the United Kingdom on ransomware and related issues. The survey was conducted during June 2016 with 165 organizations in the United States, and 125 each in the other nations for a total of 540 surveys completed.

(more available)
Added: October 25, 2018
image from University of Kent Computing Survey

University of Kent Computing Survey

This is a report from Kent University in Canterbury, UK. It details the findings from their online survey which gives a better picture of the prevalence and impact of cybercrime victimization, cyber security practices, and risks as seen by a sample of the UK population.

(more available)
Added: October 25, 2018
image from 2018 Global Threat Report:Blurring The Lines Between Statecraft and Tradecraft

2018 Global Threat Report:Blurring The Lines Between Statecraft and Tradecraft

The issues presented in this 2018 report are Targeted Intrusions, Criminal and Hacktivist Activity, and 2018 Predictions

Added: October 24, 2018
image from 2018 Phishing Trends And Intelligence Report: Hacking The Human

2018 Phishing Trends And Intelligence Report: Hacking The Human

The purpose of this report is to provide insight on significant industry trends, tools, and techniques being used by threat actors to carry out phishing attacks. It also sheds light on why shifts are occurring and what to expect in the coming year.

(more available)
Added: October 24, 2018
image from 2018 Security Report: Five Important Trends To Watch

2018 Security Report: Five Important Trends To Watch

This infographic provides a brief glimpse at the security report of the same name.

Added: October 24, 2018
image from Cybercrime Tactics And Techniques Q1 2017

Cybercrime Tactics And Techniques Q1 2017

The second edition of this report, looking at noteable threats during the first three months of the year.

Added: October 24, 2018
image from Cybersecurity Threatscape 2017

Cybersecurity Threatscape 2017

This annual report details the cybersecurity trends and threats of 2017.

Added: October 24, 2018
image from Evaluating The Customer Journey Of Crypto-Ransomware And The Paradox Behind It

Evaluating The Customer Journey Of Crypto-Ransomware And The Paradox Behind It

From the report, “We found the paradox of illicit, malicious activity juxtaposed with helpful customer service so interesting that we decided to evaluate the customer journeys of fi ve current ransomware families. From the fi rst ransom message to communicating with the criminals via their support channels, we wanted to see just how these gangs are doing with their customer journey – and whose is the best (or rather, least loathsome).”

(more available)
Added: October 24, 2018
image from FDA Should Further Integrate Its Review of Cybersecurity Into the Premarket Review Process for Medical Devices

FDA Should Further Integrate Its Review of Cybersecurity Into the Premarket Review Process for Medical Devices

This report from the U.S. Department of Health And Human Services, offers insight into how the FDA has taken steps to address emerging cybersecurity concerns in networked medical devices by issuing guidance, reviewing cybersecurity information in submissions, and—when needed—obtaining additional information from manufacturers. It also discusses how the FDA could take additional steps to more fully integrate cybersecurity into its premarket review process.

(more available)
Added: October 24, 2018
image from ISTR Ransomware 2017

ISTR Ransomware 2017

This special report takes a specific look at Ransomware.

Added: October 24, 2018
image from McAfee Labs Threats Report June 2018

McAfee Labs Threats Report June 2018

In this report, they highlight the notable investigative research and threat trend statistics gathered by the McAfee Advanced Threat Research and McAfee Labs teams in Q1 of 2018.

(more available)
Added: October 24, 2018
  • ««
  • «
  • 27
  • 28
  • 29
  • 30
  • 31
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 08:08 UTC (build b1d7be4)