Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Hacktivism

Below you will find reports with the tag of “Hacktivism”

image from China Country Profile 2017

China Country Profile 2017

This paper gives a profile of China.

Added: October 22, 2018
image from Threat Actor - APT28

Threat Actor - APT28

This report takes a look at ATP28 a recognized state sponsored threat actor operating out of Russia.

Added: October 22, 2018
image from It Takes More than Offensive Capability to Have an Effective Cyberdeterrence Posture

It Takes More than Offensive Capability to Have an Effective Cyberdeterrence Posture

This paper presents the testimony, of Martin Libicki, presented before the House Armed Services Committee on March 1, 2017.

Added: October 21, 2018
image from APT28: Center Of The Storm

APT28: Center Of The Storm

This report details observations of APT28’s, a Russian Sponsored cyber network, targeting, and an investigation into a related breach. They also provide an update on shifts in the group’s tool development and use, and summarize the tactics APT28 employs to compromise its victims.

(more available)
Added: October 20, 2018
image from Web Attack Survival Guide

Web Attack Survival Guide

This guide provides a playbook for helping a company prepare for and handle web attacks.

Added: October 20, 2018
image from Cyber Threats to the Nordic Region

Cyber Threats to the Nordic Region

This report details some of cyber threat activity that has been observed against Denmark, Finland, Iceland, Norway, and Sweden. It explores motivations of the cyber threat and factors that could trigger future activity in the region.

(more available)
Added: October 19, 2018
image from 2016 Annual Corporate Directors Survey

2016 Annual Corporate Directors Survey

This report details the changes that have taken place in Board governance. It discusses the impact these changes have on security and risk issues in business.

(more available)
Added: October 18, 2018
image from Business Risk Intelligence Decision Report: 2018 Mid Year Update

Business Risk Intelligence Decision Report: 2018 Mid Year Update

This report provides insight into several of the business risk factors facing organizations in 2018. It specifically reviews events from all around the globe.

(more available)
Added: October 18, 2018
image from DDoS Threat Report Q2 2016

DDoS Threat Report Q2 2016

This report takes a look at the DDoS threats that occurred in the second quarter of 2016.

Added: October 18, 2018
image from Assessing Russian Activities and Intentions in Recent US Elections

Assessing Russian Activities and Intentions in Recent US Elections

This is a declassified version of a highly classified assessment that has been provided to the President and to recipients approved by the President.

(more available)
Added: October 17, 2018
image from External Threats: Security Beyond The Perimeter

External Threats: Security Beyond The Perimeter

The Purpose of this study is to understand companies’ ability to analyze and mitigate online incidents and cyber attacks that are beyond the traditional security perimeter.

(more available)
Added: October 17, 2018
image from An Introduction to Cyber Threat Modelling

An Introduction to Cyber Threat Modelling

This document defines an analytical model of cyber threat intelligence in terms of a threat entity’s goal orientation, the capabilities it uses to pursue its goals and its modus operandi. The model is intended to act as a common guiding template for conducting a cyber threat assessment for use by penetration testers to define a set of realistic and threat-informed cyber attack test scenarios.

(more available)
Added: October 16, 2018
image from Cyber Threats To The Financial Services And Insurance Industries

Cyber Threats To The Financial Services And Insurance Industries

Get a glimpse of cyber threats the financial services and insurance sectors are facing, including top malware and crimeware detected.

(more available)
Added: October 16, 2018
image from Energy Market Review 2014

Energy Market Review 2014

This report seeks to understand, and analyze, whether or not the energy market can respond to a damaging cyber attack.

(more available)
Added: October 16, 2018
image from Cyber Threats To The Entertainment And Media Industries

Cyber Threats To The Entertainment And Media Industries

Discover why the entertainment and media industries are valuable targets for APT groups and hacktivists seeking influence.

Added: October 15, 2018
image from Global Application and Network Security Report

Global Application and Network Security Report

From the report, “This research provides a comprehensive and objective review of 2015 cyber-attacks from both a business and a technical perspective. It offers best practice advice for organizations to consider when planning for cyber-attack protection in 2016."

(more available)
Added: October 15, 2018
image from Cyber Threats To The Education Industry

Cyber Threats To The Education Industry

Understand the cyber threats targeting the education industry, including subsectors impacted by advanced threat groups.

Added: October 13, 2018
image from Forces Shaping The Cyber Threat Landscape For Financial Institutions

Forces Shaping The Cyber Threat Landscape For Financial Institutions

This significant WhitePaper takes a good look at what trends and developments are impacting the cyber threat landscape for specifically, financial institutions.

(more available)
Added: October 12, 2018
image from The Fake News Machine: How Propagandists Abuse The Internet And Manipulate The Public

The Fake News Machine: How Propagandists Abuse The Internet And Manipulate The Public

This paper studies and explores the techniques and methods used by actors to spread fake news and manipulate public opinion to serve various motives ranging from personal and financial to political. It also discusses the three legs of the fake news triangle: the services that enable them, their appearance on social media sites, and the motivations behind these activities.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 7, 2025 00:08 UTC (build b1d7be4)