Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from Eavesdropper: How A Mobile Developer Error Is Exposing Millions Of Conversations

Eavesdropper: How A Mobile Developer Error Is Exposing Millions Of Conversations

This report focuses the vulnerability that they call “Eavesdropper.” The Eavesdropper vulnerability is due to the hardcoding of credentials in mobile apps that are using the Twilio Rest API as well as some using the Twilio SDK. This vulnerability exposes massive amounts of current and historic data, including sensitive call and messaging data.

(more available)
Added: October 20, 2018
image from eCommerce Threats Of 2018

eCommerce Threats Of 2018

This report discusses the malicious Bots in 2018 and how they can impact the eCommerce sector.

Added: October 20, 2018
image from ENISA Threat Landscape Report 2017

ENISA Threat Landscape Report 2017

This report summarizes the threat landscape seen in 2017 and gives some clear recommendations for the future.

Added: October 20, 2018
image from Exposé Of A Credit Card Black Market

Exposé Of A Credit Card Black Market

This short report takes a look at cybersecurity related Credit Card Fraud.

Added: October 20, 2018
image from Fighting File Based Exploits Across The Expanding Attack Surface

Fighting File Based Exploits Across The Expanding Attack Surface

This report provides insight into taking a proactive approachv against known, unkown, and zero-day exploits that serve as the starting point for multi-vector cyberattacks.

(more available)
Added: October 20, 2018
image from Follow The Money:Dissecting The Operations Of The Cyber Crime Group FIN6

Follow The Money:Dissecting The Operations Of The Cyber Crime Group FIN6

This report examines the Cyber Crime Group FIN6.

Added: October 20, 2018
image from German Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In German Cities

German Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In German Cities

This paper takes a look at the cities of Germany, and the cyber threats that occurred there.

Added: October 20, 2018
image from Impact vs. Metasplout Pro Efficiency Study

Impact vs. Metasplout Pro Efficiency Study

Under most tested scenarios, Core Impact users can expect a notable reduction in both operator time and total elapsed time when performing common penetration testing tasks. This whitepaper presents the repeatable methodology and testing protocol used in our study.

(more available)
Added: October 20, 2018
image from Internet-Facilitated Drugs Trade: Analysis Of The size, scope, and the role of the Netherlands

Internet-Facilitated Drugs Trade: Analysis Of The size, scope, and the role of the Netherlands

This report aims to investigate the role of the Internet in facilitating drugs trade. It is commissioned by the Research and Documentation Centre (Wetenschappelijk Onderzoek- en Documentatiecentrum, WODC), the independent research arm of the Ministry of Security and Justice in the Netherlands. Special attention will therefore be paid to the role of Dutch actors in facilitating this trade.

(more available)
Added: October 20, 2018
image from JWT Handbook

JWT Handbook

Ever wondered how JWT came to be and what problems it was designed to tackle? Are you curious about the plethora of algorithms available for signing and encrypting JWTs? Or are you interested in getting up-to-speed with JWTs as soon as possible? Then this handbook is for you.

(more available)
Added: October 20, 2018
image from McAfee Labs Threats Report June 2018 Infographic

McAfee Labs Threats Report June 2018 Infographic

This is the infographic based on the threat report of the same name.

Added: October 20, 2018
image from Mobile Phishing Report 2018

Mobile Phishing Report 2018

This whitepaper looks at the evolution of mobile phishing - examining why and how people get phished. It explores the prevalence and severity of enterprise phishing techniques, providing actionable advice for how best to protect your mobile device fleet.

(more available)
Added: October 20, 2018
image from Quarterly Threat Report Q2 2018

Quarterly Threat Report Q2 2018

A review of the threat trends from the second quarter of 2018 as seen via ProofPoint’s detection network.

Added: October 20, 2018
image from Western European Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In Western Cities

Western European Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In Western Cities

This paper takes a look at the cities of the west, and the cyber threats that occurred there.

Added: October 20, 2018
image from 2016 State of Security Operations

2016 State of Security Operations

In the State of Security Operations Maturity report, Hewlett Packard Enterprise provides updates to the capabilities, lessons learned, and performance levels of security operations based upon maturity assessments performed on a worldwide organizations.

(more available)
Added: October 19, 2018
image from 2017 Credential Spill Report

2017 Credential Spill Report

Shap Security has a unique position to talk about credtial spills. This paper provides a breakdown of their experiences with the credential spill issues of 2017.

(more available)
Added: October 19, 2018
image from 2018 Bad Bot Report:The Year Bad Bots Went Mainstream

2018 Bad Bot Report:The Year Bad Bots Went Mainstream

Focussing on Bad Bots, this report offers some updated insights into the current bad bot statistics and situations.

Added: October 19, 2018
image from 4th Annual State of Application Security Report (2015 Mid-Year Report)

4th Annual State of Application Security Report (2015 Mid-Year Report)

Arxan and iThreat Cyber Group (ICG) analyzed data collected by ICG over the past 3.5 years that looked at the distribution of pirated software and digital assets on the Dark Web (i.e., the portion of content on the World Wide Web that is not indexed by standard search engines) and indexed sites that are focused on distributing pirated releases.

(more available)
Added: October 19, 2018
image from 5 Ways To Strengthen Your SaaS Security And Build Customer Loyalty

5 Ways To Strengthen Your SaaS Security And Build Customer Loyalty

This is a 10 page guide that considers things that you can do to strengthen your SaaS security while not offending your customers.

(more available)
Added: October 19, 2018
image from 6 Best Practices For Amazon Security Groups

6 Best Practices For Amazon Security Groups

This paper provides 6 Best Practices for Amazon Security Groups

Added: October 19, 2018
image from Adjusting the Lens of Economic Crime:Preparation brings opportunity back into focus

Adjusting the Lens of Economic Crime:Preparation brings opportunity back into focus

This year’s report illustrates how economic crime has evolved over the last two years, morphing into different forms depending on industrial sector and region.

(more available)
Added: October 19, 2018
  • ««
  • «
  • 50
  • 51
  • 52
  • 53
  • 54
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 08:08 UTC (build b1d7be4)