Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware Defenses

Below you will find reports with the tag of “Malware Defenses”

image from The EU General Data Protection Regulation

The EU General Data Protection Regulation

This whitepaper discusses what the General Data Protection Regulation (GDPR) will mean to organizations globally.

Added: October 13, 2018
image from Who Needs Malware? How Adversaries Use Fileless Attacks To Evade Your Security

Who Needs Malware? How Adversaries Use Fileless Attacks To Evade Your Security

As security measures get better at detecting and blocking both malware and cyberattacks, adversaries and cybercriminals are forced to constantly develop new techniques to evade detection. One of these advanced techniques involves “fileless" exploits, where no executable file is written to disk. These attacks are particularly effective at evading traditional antivirus (AV) solutions, which look for files saved to disk so they can scan them and determine if they are malicious. This report discusses these issues.

(more available)
Added: October 13, 2018
image from 2017 Phishing Response Trends Australia Region

2017 Phishing Response Trends Australia Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 12, 2018
image from Australian Companies Leaving Themselves Exposed On Security And Compliance:Survey

Australian Companies Leaving Themselves Exposed On Security And Compliance:Survey

This paper presents the results of a survey conducted in Australia to understand how prepared companies were for cyber breach situations, and compliance.

(more available)
Added: October 12, 2018
image from Network Threat Detection

Network Threat Detection

This report aims to compare the effectiveness of a selection of threat detection appliances. The products were exposed to internet threats that were live during the test period, as well as crafted exploit-based attacks.

(more available)
Added: October 12, 2018
image from Report Malware PI

Report Malware PI

This report takes a look at Malware in the cloud and offers some solutions to the problem.

Added: October 12, 2018
image from RiskTeller: Predicting the Risk of Cyber Incidents

RiskTeller: Predicting the Risk of Cyber Incidents

This paper from CCS 2017, presents a system that analyzes binary file appearance logs of machines to predict which machines are at risk of infection months in advance.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 9
  • 10
  • 11
  • 12
  • 13
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 20, 2025 20:08 UTC (build b1d7be4)