Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Fraud

Below you will find reports with the tag of “Fraud”

image from 2022 Year In Review

2022 Year In Review

In a year of new and evolving cyber risks, our community banded together to protect the global financial system and the people it serves. (more available)
Added: January 26, 2023
image from 2021 Trends In Identity

2021 Trends In Identity

The Trends in Identity Report that looks at the wide range of identity crimes committed against individuals as reported by the victims of those crimes. (more available)
Added: January 4, 2023
image from 2022 Year In Review

2022 Year In Review

In a year of new and evolving cyber risks, our community banded together to protect the global financial system and the people it serves. (more available)
Added: December 21, 2022
image from 2021 Insider Threat Report

2021 Insider Threat Report

The 2021 Insider Threat Report reveals the latest trends and challenges facing organizations in this new environment. The report explores how IT and cybersecurity professionals deal with risky insiders and how organizations are preparing to protect their critical data and IT infrastructure better. (more available)
Added: October 24, 2022
image from 2021 Business Email Compromise Report

2021 Business Email Compromise Report

This report is designed to explore the state of evolving email threats and how organizations are responding to protect themselves. Business Email Compromise attacks are one of the financially most damaging cyber crimes. (more available)
Added: October 18, 2022
image from 2022 Imperva Bad Bot Report

2022 Imperva Bad Bot Report

This report is based on data collected from the Imperva global network throughout 2021. The data is composed of hundreds of billions of blocked data bot requests, anonymized over thousands of domains. (more available)
Added: October 10, 2022
image from Balancing Risk & Reward

Balancing Risk & Reward

This report is based on cybercrime attacks detected by the Digital Identity Network from July-December 2021, during near real-time analysis of consumer interactions across the customer journey, from new account creations, logins, payments and other non-core transactions such as password resets and transfers. (more available)
Added: September 28, 2022
image from Cyber Claims Study 2019

Cyber Claims Study 2019

This study, based on over 2,000 cyber claims, provides a comprehensive view of recent cyber claim events. The 2019 report also included data from NetDiligence studies published in 2015-2018, representing 1,008 events that occurred in 2014 to 2017. (more available)
Added: September 20, 2022
image from PwC's Global Economic Crime and Fraud Survey 2022

PwC's Global Economic Crime and Fraud Survey 2022

The year’s Global Economic Crime and Fraud Survey enquired about organizations' attitudes towards fraud and financial and economic crime in the current environment and drew responses from 1,296 respondents in 53 countries and regions. (more available)
Added: September 6, 2022
image from Quarterly Threat Report Q2 2022

Quarterly Threat Report Q2 2022

These reports provide data and insights on the attack we’re seeing, how to spot them, and the top ways you can protect your organization. (more available)
Added: August 25, 2022
image from Mobile Banking Heists: The Global Economic Threat

Mobile Banking Heists: The Global Economic Threat

In this report, we examine 10 prolific banking trojans targeting Android mobile apps of users worldwide, detailing their features and capabilities. (more available)
Added: June 21, 2022
image from 2021 State of Phishing & Online Fraud Annual Report

2021 State of Phishing & Online Fraud Annual Report

This 2021 State of Phishing and Online Fraud Report highlights the key trends that drove digital scams using data gathered from analyzing more than one billion sites. (more available)
Added: May 13, 2022
image from Follow the Money: Understanding the money laundering techniques that support large-scale cyber-heists

Follow the Money: Understanding the money laundering techniques that support large-scale cyber-heists

This report describes how money laundering is typically performed in the context of large-scale cyber heists. It illustrates key parts of the typical processes used by cyber criminals with examples to help better inform readers on areas they should focus on to better prevent, detect and respond to money laundering. (more available)
Added: January 26, 2022
image from State of Security Within eCommerce 2021

State of Security Within eCommerce 2021

A review of trends in e-commerce security and attacks based upon a variety of sources collected via Impreva Research labs.
Added: November 19, 2021
image from Cyber Insurance Claims Report: H1 2021

Cyber Insurance Claims Report: H1 2021

A report on the ransomware claims seen along with the attack forms, firmographics, and technical measures of Coalition customers.
Added: August 2, 2021
image from SOTI: Adapting to the Unpredictable

SOTI: Adapting to the Unpredictable

This edition of the SOTI focuses on malicious activity detected and managed over the course of 2020 via DNS filtering.
Added: March 10, 2021
image from Follow the Money: Qualifying Opportunism Behind Cyberattacks During the COVID-19 Pandemic

Follow the Money: Qualifying Opportunism Behind Cyberattacks During the COVID-19 Pandemic

This report covers the cybersecurity threats tied to COVID-19 pandemic observed over the past year, detailing the socioeconomic drivers that contributed to the threat landscape. (more available)
Added: January 29, 2021
image from Fraud in the Wake of COVID-19: Benchmarking Report

Fraud in the Wake of COVID-19: Benchmarking Report

This report provides the results of the third study the ACFE has done on the fight against fraud in the wake of COVID-19. (more available)
Added: January 21, 2021
image from Covid-19 Clicks: How Phishing Capitalized on a Global Crisis

Covid-19 Clicks: How Phishing Capitalized on a Global Crisis

This report is based off of a survey of 7,000 office workers around the world. It looks at worker’s understanding of phishing and email clicking habits. (more available)
Added: December 18, 2020
image from Spear Phishing: Top Threats and Trends

Spear Phishing: Top Threats and Trends

This report looks at spear-phishing attacks affecting organizations today. It identifies the 13 biggest threats, and how to defend against them. (more available)
Added: December 18, 2020
image from SOTI/Security: A Year in Review

SOTI/Security: A Year in Review

Akamai’s end of year review of the key events of 2020 affecting information security. Compiles findings from other SOTI reports with additional commentary and data from the Akamai service footprint. (more available)
Added: December 9, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 16
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 8, 2023 16:09 UTC (build 051771c)