Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Financial Gain

Below you will find reports with the tag of “Financial Gain”

image from The 2017 Global Threat Landscape Report

The 2017 Global Threat Landscape Report

“This report is based exclusively on information collected via a wide range of security services within GravityZone: Security for Virtualized Environments, Security for Endpoints, Security for Mobile and Security for Exchange, consumer-oriented products such as Bitdefender Antivirus, Bitdefender Internet Security or Bitdefender Total Security, as well as from Bitdefender BOX, the innovative solution for protecting devices in the IoT space.”

(more available)
Added: October 20, 2018
image from The Ransomware Economy

The Ransomware Economy

This paper discusses the How and Why the Dark Web Marketplace for Ransomware Is Growing at a Rate of More Than 2,500% Per Year

(more available)
Added: October 20, 2018
image from 2018 Threat Predictions

2018 Threat Predictions

This is a helpful infographic that reveals threat predictions for 2018.

Added: October 19, 2018
image from Advanced Threat Report: Europe, the Middle East and Africa

Advanced Threat Report: Europe, the Middle East and Africa

This report provides you with unique insights into Europe, Middle East and Africa’s (EMEA’s) threat landscape for the second half of 2015.

(more available)
Added: October 19, 2018
image from ASEC Report Volume 88 Q3 2017

ASEC Report Volume 88 Q3 2017

This report from the Ahn Lab Security Emergency Response Center provides a review of various Cyber events that took place in the 3rd Qtr. of 2017.

(more available)
Added: October 19, 2018
image from Business Perception Of IT Security: In The Face of An Inevitable Compromise

Business Perception Of IT Security: In The Face of An Inevitable Compromise

From The Report, “Evaluation of the business threat landscape can be broken down into two major areas: financial and technical. The former we covered extensively in our previous report, by measuring security budgets and recovery costs from typical threats. The next step is to take a closer look at real incidents that businesses have to deal with, and measures they take to prevent them.”

(more available)
Added: October 19, 2018
image from Cyber Threats to the Nordic Region

Cyber Threats to the Nordic Region

This report details some of cyber threat activity that has been observed against Denmark, Finland, Iceland, Norway, and Sweden. It explores motivations of the cyber threat and factors that could trigger future activity in the region.

(more available)
Added: October 19, 2018
image from DDoS Threat Report Q2 2017

DDoS Threat Report Q2 2017

This report takes a look at the DDoS threats that occurred in the second quarter of 2017.

Added: October 19, 2018
image from GTIC Monthly Threat Report June 2017

GTIC Monthly Threat Report June 2017

This monthly threat report takes a look at the month of June 2017. More specifically, it takes a look at the Trickbot ‘mac1’ Phishing campaign.

(more available)
Added: October 19, 2018
image from Hospital Network Security Requirements:5 Steps Beyond Compliance

Hospital Network Security Requirements:5 Steps Beyond Compliance

As this report states, you can be compliant, but still not be secure. Read the 5 steps that can help make your hospital secure beyond the requirements for compliance.

(more available)
Added: October 19, 2018
image from Identifying Law Enforcement Needs for Access to Digital Evidence in Remote Data Centers

Identifying Law Enforcement Needs for Access to Digital Evidence in Remote Data Centers

On behalf of the National Institute of Justice (NIJ) and as part of the Priority Criminal Justice Needs Initia- tive, the RAND Corporation, in partnership with the Police Executive Research Forum, organized a workshop in May 2017 on Challenges with Law Enforcement Access to Digital Evidence Held in Remote Data Centers. Discussions focused on ambiguities in U.S. law and procedure, challenges associated with using the Mutual Legal Assistance Treaty (MLAT) process, issues stemming from inadequate cooperation between law enforcement and service providers (the companies and organizations providing remote storage, communication, and computing services), and technical issues related to evidence residing in the cloud.

(more available)
Added: October 19, 2018
image from McAfee Labs Threat Report December 2017

McAfee Labs Threat Report December 2017

In this report, they highlight the statistics gathered by McAfee Labs in Q3 of 2017.

Added: October 19, 2018
image from Ok Panic: Newly Evolved Ransomware Is Bad News For Everyone

Ok Panic: Newly Evolved Ransomware Is Bad News For Everyone

A quick and effecient article discussing why the new ransomware is dangerous.

Added: October 19, 2018
image from Preparing For NGAV At Scale

Preparing For NGAV At Scale

This Paper is subtitled “Stopping Attacks In Progress Starts With Asking The Right Questions” The paper tries to discuss and reveal the questions that should be asked.

(more available)
Added: October 19, 2018
image from Quarterly Threat Report Q2 2017

Quarterly Threat Report Q2 2017

This Quarterly report offers key takeaways from the second Quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 19, 2018
image from Ransomware Survey Infographic

Ransomware Survey Infographic

To get a more complete sense of the impact of ransomware beyond the headlines and statistics, we surveyed IT professionals who have had to deal with it firsthand.

(more available)
Added: October 19, 2018
image from Security Strategies To Prepare For 5G & IoT

Security Strategies To Prepare For 5G & IoT

In the third quarter of 2017, Heavy Reading, in conjunction with A10 Networks, undertook the creation and execution of a global survey designed to assess cloud, premises, and hybrid network security concerns and evaluate CSPs’ strategies to mitigate the risks of a threat curve on an upward trajectory. The key findings from the survey are documented in this white paper.

(more available)
Added: October 19, 2018
image from Stonedrill - Shamoon & Shamoon 2.0 Variant

Stonedrill - Shamoon & Shamoon 2.0 Variant

It would appear that a new variant titled ‘StoneDrill‘ has now hit the wild and conducts operations very similar to that of Shamoon 2.0 and Shamoon malware. Here is a brief analysis of StoneDrill,

(more available)
Added: October 19, 2018
image from Threat Landscape Report Q4 2017

Threat Landscape Report Q4 2017

This is a quarterly report that looks at the current cubery security threats from each quarter.

Added: October 19, 2018
image from 2017 Bitdefender Ransomware Reprot

2017 Bitdefender Ransomware Reprot

This is a solid breakdown of the Ransomware issues as seen in 2017.

Added: October 18, 2018
image from 2017 Ransomware Report

2017 Ransomware Report

From The Report, “With global ransomware damages predicted to exceed $5 billion this year, it is no surprise that ransomware is the fastest growing security threat. As this year’s global attacks have made national news, businesses of all sizes have become increasingly aware of the looming ransomware threat and the challenge of staying protected. Infected companies race the clock to minimize data loss, downtime, and reputation damage. With the seemingly endless profitability, anonymity and ease of execution it doesn’t appear cybercriminals will be turning their back on ransomware anytime soon. Companies are right to expect another year filled with attacks and new variants. The question is how can companies block these attacks before ransom is demanded, and their data along with their reputation is put at risk.”

(more available)
Added: October 18, 2018
  • ««
  • «
  • 31
  • 32
  • 33
  • 34
  • 35
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 04:08 UTC (build b1d7be4)