Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Financial Gain

Below you will find reports with the tag of “Financial Gain”

image from Crypto-Ransomware Survey Results 2016

Crypto-Ransomware Survey Results 2016

Researchscape surveyed 275 IT experts from January 15 to January 30, 2016. This report is based on the findings of that survey.

(more available)
Added: October 17, 2018
image from Cybersecurity For Risk Mitigation In Financial Services

Cybersecurity For Risk Mitigation In Financial Services

From the paper, “The financial industry is no stranger to hacks and data breaches, but recently, the sector has been targeted more aggressively, leaving consumers wondering if their accounts and data are safe. As hackers and attacks become more sophisticated, it is crucial the financial services industry take appropriate actions to safeguard their systems, as well as their customers.”

(more available)
Added: October 17, 2018
image from Looking ahead: SophosLabs 2017 malware forecast

Looking ahead: SophosLabs 2017 malware forecast

In this report, they review malicious activity SophosLabs analyzed and protected customers against last year and use the findings to paint a picture for 2017.

(more available)
Added: October 17, 2018
image from Mcafee Labs Threats Report September 2017

Mcafee Labs Threats Report September 2017

In this quarterly threats report, they highlight three Key Topics: In the lead story, they analyze the recent WannaCry and Petya attacks, the perpetrators’ likely motives, and the business impact. The second Key Topic departs from their usual threat analysis stories. Because threat hunting is becoming increasingly important, in this story they offer detailed advice and recommendations for using certain types of indicators of compromise when hunting for threats. In the final Key Topic, they explore script-based malware—why it is used, how authors obfuscate scripts, how it propagates, and its growth in popularity.

(more available)
Added: October 17, 2018
image from Qaurterly Threat Report Q! 2017

Qaurterly Threat Report Q! 2017

The Proofpoint Quarterly Threat Report captures threats, trends and transformations we see within our customer base and in the wider security market.

(more available)
Added: October 17, 2018
image from Ransomware: A Victims perspective

Ransomware: A Victims perspective

This paper seeks to answer the following questions, “What motivates victims to pay up? How much do they value their data? What role does antivirus protection play in the problem-solving equation?"

(more available)
Added: October 17, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report October 2016

SecureWorks Threat Intelligence Executive Monthly Report October 2016

This report from October 2016 takes a look at the Mirai botnet, VULNS, breach responses, and some new security initiatives.

(more available)
Added: October 17, 2018
image from Security Response: The Evolution of Ransomware

Security Response: The Evolution of Ransomware

This report takes a look at how the ransomware types work, not just from a technological point of view but also from a psychological viewpoint. They also look at how these threats evolved, what factors are at play to make ransomware the major problem that it is today, and where ransomware is likely to surface next.

(more available)
Added: October 17, 2018
image from The Rising Face of Cybercrime: Ransomware

The Rising Face of Cybercrime: Ransomware

In this Report, researchers analyzed the growing trend of ransomware across nearly 20,000 companies to identify common forms of ransomware, and identify which industries are most susceptible to these types of attacks.

(more available)
Added: October 17, 2018
image from Threat Landscape Report Q3 2017

Threat Landscape Report Q3 2017

This is a quarterly report that looks at the current cubery security threats from each quarter.

Added: October 17, 2018
image from Widespread Outbreak Of NotPetya Ransomware

Widespread Outbreak Of NotPetya Ransomware

This report specifically talks about NotPetya.

Added: October 17, 2018
image from 2016 Data Breach Industry Forecast

2016 Data Breach Industry Forecast

To help organizations prepare for what lies ahead and ensure incident response plans are ready for the evolving data breach environment, Experian Data Breach Resolution has outlined five predictions for what we can expect in 2016.

(more available)
Added: October 16, 2018
image from 2018 Global Security Report

2018 Global Security Report

This annual report takes a look at the last decade of cyber security issues, including 2017, and provides some insight into the years ahead.

(more available)
Added: October 16, 2018
image from ASEC Report Volume 85 January 2017

ASEC Report Volume 85 January 2017

This report from the Ahn Lab Security Emergency Response Center provides a review of various Cyber events that took place in January of 2017.

(more available)
Added: October 16, 2018
image from Balancing Security and Accessibility with Compliance in the Healthcare Sector

Balancing Security and Accessibility with Compliance in the Healthcare Sector

This white paper presents some interesting information related to the cybersecurity issues that can occur in the healthcare sector.

Added: October 16, 2018
image from Estimating The Global Cost Of Cyber Risk: Methodology And Examples

Estimating The Global Cost Of Cyber Risk: Methodology And Examples

The goal of this research was to produce a transparent methodology for estimating present and future global costs of cyber risk, acknowledging the considerable uncertainty in the frequencies and costs of cyber incidents.

(more available)
Added: October 16, 2018
image from Insiders Guide to Defeating Ransomware

Insiders Guide to Defeating Ransomware

This e-book sounds the alarm about the threat of ransomware for businesses and public sector organizations, equips security professionals with the facts about the risks and consequences of ransomware, and presents an approach to protect enterprise data from ransomware attacks.

(more available)
Added: October 16, 2018
image from Internet Crime Report 2016

Internet Crime Report 2016

The 2016 Internet _x0012_Crime Report highlights the I_x0012_3’s efforts in monitoring trending scams such as Business Email Compromise (BEC), ransomware, tech support fraud, and extortion. In 2016, IC3 received a total of 298,728 complaints with reported losses in excess of $1.3 billion.

(more available)
Added: October 16, 2018
image from Malware Defense Through Collaborative Filtering

Malware Defense Through Collaborative Filtering

This report discusses the malware situation, and how collaborative filtering can offer a solid defense against it.

Added: October 16, 2018
image from Midyear Security Report 2015

Midyear Security Report 2015

Using research by our experts, it provides an overview of the major threats observed in the first half of 2015. This report also explores likely future trends and offers advice for small, midsize, and enterprise organizations that seek security solutions and services.

(more available)
Added: October 16, 2018
image from Quarterly Threat Report:Fourth Quarter 2017

Quarterly Threat Report:Fourth Quarter 2017

This is Rapid7’s Quarterly Threat Report. In this report they wrap up the cyber events from the year 2017 and lay out some thoughts on what is ahead in 2018.

(more available)
Added: October 16, 2018
  • ««
  • «
  • 33
  • 34
  • 35
  • 36
  • 37
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 08:08 UTC (build b1d7be4)