Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Hacktivism

Below you will find reports with the tag of “Hacktivism”

image from Resilience360 Annual Risk Report 2020

Resilience360 Annual Risk Report 2020

The insights presented in this report will help guide your supply chainmonitoring and risk mitigation strategy, enable better informed decision-making processes, and aid the formulationof responses that create more resilient and sustainablebusiness operations.

(more available)
Added: March 29, 2020
image from 2019 Cyber Threatscape Report

2019 Cyber Threatscape Report

Accenture details trends in cyber threats in 2019. It narrows it down to five key features of the 2019 Trendscape: 1. New threats are occuring from technology evolution and disinformation. 2:Cybercriminals adapt, hustle, diversify, and are looking more like states. 3: hybrid motives pose new dangers of ransomware defense and response 4:Improved ecosystem hygiene is pushing threats to the supply chain

(more available)
Added: February 17, 2020
image from Stay Ahead of Growing Third Party Risk

Stay Ahead of Growing Third Party Risk

This is a study on third party risk from Gartner. It covers how third party risks are changing, how companies are managing third party risks, and taking an iterative approach to third party risks.

(more available)
Added: February 12, 2020
image from Risk Maps 2019

Risk Maps 2019

Aon is supporting its global clients to respond to political risks and security challenges by using the analysis derived from the maps to inform the creation of a more robust risk management programme. We hope this year’s maps provide you with the insights that you need to better protect your business, and should you need to discuss any aspects of your insurance coverage – or how these risks affect your exposure – please contact the team.

(more available)
Added: July 10, 2019
image from The Tactics & Tropes of the Internet Research Agency

The Tactics & Tropes of the Internet Research Agency

Upon request by the United States Senate Select Committee on Intelligence (SSCI), New Knowledge reviewed an expansive data set of social media posts and metadata provided to SSCI by Facebook, Twitter, and Alphabet, plus a set of related data from additional platforms. The data sets were provided by the three primary platforms to serve as evidence for an investigation into the Internet Research Agency (IRA) influence operations.

(more available)
Added: March 26, 2019
image from The IRA, Social Media and Political Polarization in the United State, 2012-2018

The IRA, Social Media and Political Polarization in the United State, 2012-2018

This report provided by Oxford University provides research data into the Russian involvement in the United States election process.

Added: March 26, 2019
image from Analysis Of Brexit Centric Twitter

Analysis Of Brexit Centric Twitter

This report explores Brexit-related Twitter activity occurring between December 4, 2018 and February 13, 2019. Using the standard Twitter API, researchers collected approximately 24 million tweets that matched the word “brexit” published by 1.65 million users.

(more available)
Added: March 16, 2019
image from "Anonymous Slovakia" Targets NATO and EU Sites

"Anonymous Slovakia" Targets NATO and EU Sites

From the report, “On November 26th, Slovakian Anonymous leader ‘Abaddon’ posted in the deep web message board ‘Hidden Answers’, looking to recruit accomplices for an operation targeting NATO and EU websites. The proposed attacks would potentially arrive by means of XSS (cross-site scripting), SQL injection, or a combination of both. And by DDoS (distributed denial of service), a type of attack that is intended to make an online resource unavailable to its legitimate users by overwhelming it with traffic. It is not yet clear what the motives for the operation are, or what the official name will be.”

(more available)
Added: January 31, 2019
image from The Q1 2018 Mobile Threat Landscape Report

The Q1 2018 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analaysis on threat trends in the mobile application space. The first quarter of 2018 showed a 43 percent decrease in blocklisted apps over Q4. Key threat trends include brand imitation, phishing, malware. A spike in apps targeting cryptocurrency and high-profile threats from nation-state actors.

(more available)
Added: January 25, 2019
image from The Dark Side Of Asia

The Dark Side Of Asia

In this research report, they uncover the Dark Side of Asia to provide you with an inside look into key trends, laws, motivations and threat actors of the increasingly threatening Asian Internet community.

(more available)
Added: January 25, 2019
image from Why Managed Threat Hunting?

Why Managed Threat Hunting?

This report offers insight into threat hunting. It specifically focusses on the “Human Detection Engine.”

Added: January 1, 2019
image from Cyber Threat Brief: US Recognizes Jerusalem As Capital Of Israel

Cyber Threat Brief: US Recognizes Jerusalem As Capital Of Israel

This report takes a look at the cyber threats that occurred when the US recognized Jerusalem as the Capital of Israel.

(more available)
Added: November 29, 2018
image from Cyber Threat Brief: 2018 Winter Olympics

Cyber Threat Brief: 2018 Winter Olympics

This report begins with the sentence, “There are a number of influences on the 2018 Winter Olympics event that may increase the likeliness of malicious activity.” Read on to find out more.

(more available)
Added: November 29, 2018
image from The Recent Escalation Between Turkey And The U.S. Provokes Response From Cyber Groups

The Recent Escalation Between Turkey And The U.S. Provokes Response From Cyber Groups

The recent escalation in tensions between the United States and Turkey over the detention of pastor Andrew Brunson, have prompted Turkish patriotic hacktivist groups to target American websites. Historically, the two most prominent hacktivist groups Aslan Neferler Tim (ANT) and Turk Hack Team (THT) have reacted to political issues impacting Turkey, by targeting the perceived adversary with low level nuisance attacks such as web defacements and Distributed Denial of Service attacks (DDoS). As the political situation deteriorates, Anomali expects to see an increase in hacktivist related activity targeting American websites.

(more available)
Added: November 29, 2018
image from Cyber Threat Brief: The 2018 FIFA World Cup

Cyber Threat Brief: The 2018 FIFA World Cup

Russia will host the 2018 FIFA World Cup from 14 June to 15 July 2018 at 12 different venues throughout 11 host cities, and thousands of foreign visitors are expected to travel to the games. With major sporting events increasingly targeted by physical and cyber threats, we believe that FIFA and their affiliates, spectators, athletes, officials, or other attendees are likely to be confronted by a range of security risks such as protests/demonstrations, hooliganism, financial fraud, and to a lesser extent hacktivism, terrorism, and cyber espionage.

(more available)
Added: November 29, 2018
image from Tainted Leaks Disinformation and Phishing With a Russian Nexus

Tainted Leaks Disinformation and Phishing With a Russian Nexus

This report describes an extensive Russia-linked phishing and disinformation campaign. It provides evidence of how documents stolen from a prominent journalist and critic of Russia was tampered with and then “leaked” to achieve specific propaganda aims. We name this technique “tainted leaks.” The report illustrates how the twin strategies of phishing and tainted leaks are sometimes used in combination to infiltrate civil society targets, and to seed mistrust and disinformation. It also illustrates how domestic considerations, specifically concerns about regime security, can motivate espionage operations, particularly those targeting civil society.

(more available)
Added: November 15, 2018
image from Nile Phish: Large-Scale Phishing Campaign Targeting Egyptian Civil Society

Nile Phish: Large-Scale Phishing Campaign Targeting Egyptian Civil Society

This report describes Nile Phish, an ongoing and extensive phishing campaign against Egyptian civil society.

Added: November 12, 2018
image from China's Cyber Superpower Strategy: Implementation, Internet Freedom Implications, and U.S. Responses

China's Cyber Superpower Strategy: Implementation, Internet Freedom Implications, and U.S. Responses

This report is a transcript of written Testimony provided to the House Comittee on Oversight and Government Reform, Subcomittee on Information Technology, by Sarah Cook Senior Research analyst for East Asia and China Media Bulletin Director.

(more available)
Added: November 6, 2018
image from Enhancing Services And Protecting Data For State And Local Governments

Enhancing Services And Protecting Data For State And Local Governments

From the report, “The state and local government sectors often find themselves understaffed and underfunded to utilize technology to its fullest potential. Recent data breaches and ransomware attacks in the newspaper highlight that governments of all sizes are indeed being targeted and have fallen victim to hackers. State and local governments must be prepared to stop internal and external threats alike. The mix of legacy equipment and small IT and security staffs relative to private industry can create a pressure- filled situation.”

(more available)
Added: October 24, 2018
image from Russian Federation Country Profile 2017

Russian Federation Country Profile 2017

This paper gives a profile of the Russian Federation.

Added: October 24, 2018
image from 2015 Global Threat Report

2015 Global Threat Report

This year’s CrowdStrike Intelligence Global Threat Report contains a wealth of intelligence regarding adversary behavior, capabilities, and intentions. More importantly, it ties it back to the events that influenced those activities. By understanding the events that shape the beliefs and motivations of threat actors—regardless if they are criminal, nation-state, or hacktivist—it is possible to comprehend what drove the adversaries to behave as they did, and perhaps to understand what this will mean for the future.

(more available)
Added: October 23, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 7, 2025 00:08 UTC (build b1d7be4)