Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from Zerologon: Unauthenticated Domain Controller Compromise by Subverting Netlogon Cryptography (CVE-2020-1472)

Zerologon: Unauthenticated Domain Controller Compromise by Subverting Netlogon Cryptography (CVE-2020-1472)

This whitepaper explains a new vulnerability in Windows Server that is highly exploitable.

Added: October 18, 2020
image from 2020 Midyear Cybersecurity Report: Securing the Pandemic-Disrupted Workplace

2020 Midyear Cybersecurity Report: Securing the Pandemic-Disrupted Workplace

This report takes a look at the most significant stories and trends in order to determine what has changed and what to expect for the second half of 2020 in the cybersecurity industry.

(more available)
Added: October 18, 2020
image from Phishing Landscape 2020: A Study of the Scope and Distribution of Phishing

Phishing Landscape 2020: A Study of the Scope and Distribution of Phishing

This study captures and analyzes a large set of information about phishing attacks, in order to better understand how much phishing is taking place, where it is taking place, and to see if the data suggests better ways to fight phishing.

(more available)
Added: October 14, 2020
image from Cyber Insurance - The Market's View

Cyber Insurance - The Market's View

A survey of 260 cyber insurance brokers and 190 cyber insurers, on the challenges and opportunities in the cyber insurance space. Includes perspectives on aggregation risks, GDPR impact, and third part risk management.

(more available)
Added: October 6, 2020
image from Web Application Vulnerability Report 2020

Web Application Vulnerability Report 2020

A review of web application vulnerabilities as seen through Acuentix’s web scans between March 2019 and February 2020.

Added: September 30, 2020
image from 2020 State of Malware Report

2020 State of Malware Report

This report goes in-depth into the changes in malware attacks for 2020, using data collected from honey pots, telemetry, and research conducted by threat analysts and reporters in 2019.

(more available)
Added: September 28, 2020
image from ACSC Annual Cyber Threat Report: July 2019 to June 2020

ACSC Annual Cyber Threat Report: July 2019 to June 2020

This report outlines key cyber threats and statistics over the period 1 July 2019 to 30 June 2020. Over this period, the ACSC responded to 2,266 cyber security incidents and received 59,806 cybercrime reports at an average of 164 cybercrime reports per day, or one report every 10 minutes.

(more available)
Added: September 28, 2020
image from Protecting People 2019: A global Cybersecurity Analysis of Vulnerability, Attacks and Privilege

Protecting People 2019: A global Cybersecurity Analysis of Vulnerability, Attacks and Privilege

This report examines which employees, departments, and industries are the most vulnerable in 2019. It analyzes which ones receive the most targeted threats, and how their privilege might be abused.

(more available)
Added: September 28, 2020
image from ECSO Barometer 2020: "Cybersecurity In Light of COVID-19"

ECSO Barometer 2020: "Cybersecurity In Light of COVID-19"

This is a report on a survey conducted by the ECSO from March 2020 to May 2020, with members of the cybersecurity community. It found many shifts in European cybersecurity interests after the impact of the COVID-19 pandemic.

(more available)
Added: September 28, 2020
image from Addressing Cyber Risk and Fraud in the Cloud: Oracle and KPMG Cloud Threat Report 2020 Series Vol. 3

Addressing Cyber Risk and Fraud in the Cloud: Oracle and KPMG Cloud Threat Report 2020 Series Vol. 3

This report explores how the broad adoption of cloud services has affected cyber risk and fraud.

Added: September 28, 2020
image from Fraud in the Wake of COVID-19: September 2020 Edition

Fraud in the Wake of COVID-19: September 2020 Edition

This report aims to help anti-fraud practitioners, business leaders, and the general public in understanding the evolution of fraud in the wake of the coronavirus, as well as the importance of heightening anti-fraud measures to protect against fraudulent activity during this unprecedented time.

(more available)
Added: September 28, 2020
image from McAfee Labs COVID-19 Threats Report July 2020

McAfee Labs COVID-19 Threats Report July 2020

A deep dive threat report into COVID-19 related attacks.

Added: September 27, 2020
image from 2020 State of Hybrid Cloud Security

2020 State of Hybrid Cloud Security

FireMon’s second annual State of Hybrid Cloud Security report dives into how the proliferation of cloud environments is impacting enterprises and their ability to scale and protect them.

(more available)
Added: September 25, 2020
image from Network-layer DDoS attack trends for Q2 2020

Network-layer DDoS attack trends for Q2 2020

This report from Cloudflare shows trends and shifts in DDoS attacks for the 2nd quarter of 2020.

Added: September 25, 2020
image from What Decision Makers Can Do About Data Protection

What Decision Makers Can Do About Data Protection

Protecting data to ensure appropriate usage and avoid unauthorized or inappropriate usage is a major task for decision makers with responsibility for protecting the integrity of corporate data assets. This report tries to show decision makers how to go about this.

(more available)
Added: September 25, 2020
image from Vulnerability Remediation Performance Snapshot for the Manufacturing Sector

Vulnerability Remediation Performance Snapshot for the Manufacturing Sector

An extension of the Prioritization to Prediction series, this report uses a sample of over 40 manufacturing sector firms to better understand the means and metrics of vulnerability management with the sector.

(more available)
Added: September 23, 2020
image from Vulnerability Remediation Performance Snapshot for the Healthcare Sector

Vulnerability Remediation Performance Snapshot for the Healthcare Sector

An extension of the Prioritization to Prediction series, this report uses a sample of approximately 30 healthcare sector firms to better understand the means and metrics of vulnerability management with the sector.

(more available)
Added: September 23, 2020
image from Vulnerability Remediation Performance Snapshot for the Finance Sector

Vulnerability Remediation Performance Snapshot for the Finance Sector

An extension of the Prioritization to Prediction series, this report uses a sample of approximately 100 finance sector firms to better understand the means and metrics of vulnerability management with the sector.

(more available)
Added: September 23, 2020
image from Vulnerability Remediation Performance Snapshot for the Technology Sector

Vulnerability Remediation Performance Snapshot for the Technology Sector

An extension of the Prioritization to Prediction series, this report uses a sample of approximately 70 technology services to better understand the means and metrics of vulnerability management with the sector.

(more available)
Added: September 23, 2020
image from State of the Internet: Security Report: Volume 6, Issue 2 - Gaming

State of the Internet: Security Report: Volume 6, Issue 2 - Gaming

Using Akamai’s global visibility and content delivery networks, this report covers the security threats present in the gaming industry. An exploration of how gamers are a growing lucrative target for criminals, including methods, geography, and recommendations.

(more available)
Added: September 23, 2020
image from DDoS Threat Report Q2 2019

DDoS Threat Report Q2 2019

This quarterly threat report offers insight into the DDoS attacks that occurred in the 2nd quarter of 2019.

Added: September 16, 2020
  • ««
  • «
  • 18
  • 19
  • 20
  • 21
  • 22
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 6, 2025 04:08 UTC (build b1d7be4)