Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Hacktivism

Below you will find reports with the tag of “Hacktivism”

image from Threat Intelligence Report -Q2 2022

Threat Intelligence Report -Q2 2022

This report leveraged the Fortinet service to provide a deep dive into what adversaries are seeing, doing, and planning, enabling organizations to better understand the threats posed by the growth of criminal forums and markets operating on the darknet. (more available)
Added: December 22, 2022
image from 2022 Sysdig Cloud-Native Threat Report

2022 Sysdig Cloud-Native Threat Report

This report was complied using Open Source Intelligence (OSINT), the practice of collecting information from published or otherwise publicly available sources, and Sysdig TRT’s global data collection network. (more available)
Added: October 13, 2022
image from 2022 H1 Global Threat Analysis Report

2022 H1 Global Threat Analysis Report

Radware’s first half of 2022 threat report reviews the most important cybersecurity events, and provides detailed insights into the attack activities for the first six months of 2022. (more available)
Added: August 19, 2022
image from Meta's Adversarial Threat Report Q2 2022

Meta's Adversarial Threat Report Q2 2022

This report is to share notable trends and investigations to help inform our community’s understanding of the evolving security threats we see. (more available)
Added: August 8, 2022
image from Emerging Threats Protection Report

Emerging Threats Protection Report

In this report, we have researched the detected new round of offensive and destructive cyberattacks directed against Ukraine’s digital infrastructure and its alliances. (more available)
Added: April 13, 2022
image from Adversarial Threat Report

Adversarial Threat Report

This report is Meta’s quarterly adversarial threat report that provides a broad view into the risks we see worldwide and across multiple policy violations. (more available)
Added: April 8, 2022
image from 2020 Q3 Report: Data Breach QuickView

2020 Q3 Report: Data Breach QuickView

This report examines publicly disclosed data breach events, and describes trends and key changes for Q3 2020.
Added: October 29, 2020
image from EY Global Information Security Survey 2020

EY Global Information Security Survey 2020

Against the backdrop of mounting threat in an era of disruption, the most forward-thinking cybersecurity functions can be critical agents of change. (more available)
Added: May 8, 2020
image from Resilience360 Annual Risk Report 2020

Resilience360 Annual Risk Report 2020

The insights presented in this report will help guide your supply chainmonitoring and risk mitigation strategy, enable better informed decision-making processes, and aid the formulationof responses that create more resilient and sustainablebusiness operations. (more available)
Added: March 29, 2020
image from 2019 Cyber Threatscape Report

2019 Cyber Threatscape Report

Accenture details trends in cyber threats in 2019. It narrows it down to five key features of the 2019 Trendscape: 1. (more available)
Added: February 17, 2020
image from Stay Ahead of Growing Third Party Risk

Stay Ahead of Growing Third Party Risk

This is a study on third party risk from Gartner. It covers how third party risks are changing, how companies are managing third party risks, and taking an iterative approach to third party risks. (more available)
Added: February 12, 2020
image from Risk Maps 2019

Risk Maps 2019

Aon is supporting its global clients to respond to political risks and security challenges by using the analysis derived from the maps to inform the creation of a more robust risk management programme. (more available)
Added: July 10, 2019
image from The Tactics & Tropes of the Internet Research Agency

The Tactics & Tropes of the Internet Research Agency

Upon request by the United States Senate Select Committee on Intelligence (SSCI), New Knowledge reviewed an expansive data set of social media posts and metadata provided to SSCI by Facebook, Twitter, and Alphabet, plus a set of related data from additional platforms. (more available)
Added: March 26, 2019
image from The IRA, Social Media and Political Polarization in the United State, 2012-2018

The IRA, Social Media and Political Polarization in the United State, 2012-2018

This report provided by Oxford University provides research data into the Russian involvement in the United States election process.
Added: March 26, 2019
image from Analysis Of Brexit Centric Twitter

Analysis Of Brexit Centric Twitter

This report explores Brexit-related Twitter activity occurring between December 4, 2018 and February 13, 2019. Using the standard Twitter API, researchers collected approximately 24 million tweets that matched the word “brexit” published by 1. (more available)
Added: March 16, 2019
image from "Anonymous Slovakia" Targets NATO and EU Sites

"Anonymous Slovakia" Targets NATO and EU Sites

From the report, “On November 26th, Slovakian Anonymous leader ‘Abaddon’ posted in the deep web message board ‘Hidden Answers’, looking to recruit accomplices for an operation targeting NATO and EU websites. (more available)
Added: January 31, 2019
image from The Q1 2018 Mobile Threat Landscape Report

The Q1 2018 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analaysis on threat trends in the mobile application space. The first quarter of 2018 showed a 43 percent decrease in blocklisted apps over Q4. (more available)
Added: January 25, 2019
image from The Dark Side Of Asia

The Dark Side Of Asia

In this research report, they uncover the Dark Side of Asia to provide you with an inside look into key trends, laws, motivations and threat actors of the increasingly threatening Asian Internet community. (more available)
Added: January 25, 2019
image from Why Managed Threat Hunting?

Why Managed Threat Hunting?

This report offers insight into threat hunting. It specifically focusses on the “Human Detection Engine.”
Added: January 1, 2019
image from Cyber Threat Brief: US Recognizes Jerusalem As Capital Of Israel

Cyber Threat Brief: US Recognizes Jerusalem As Capital Of Israel

This report takes a look at the cyber threats that occurred when the US recognized Jerusalem as the Capital of Israel. (more available)
Added: November 29, 2018
image from Cyber Threat Brief: 2018 Winter Olympics

Cyber Threat Brief: 2018 Winter Olympics

This report begins with the sentence, “There are a number of influences on the 2018 Winter Olympics event that may increase the likeliness of malicious activity. (more available)
Added: November 29, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 1, 2023 04:08 UTC (build 051771c)