Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from 2022 Threat Detection Report

2022 Threat Detection Report

This is the 2022 Red Canary Threat Detection Report. This report goes in-depth with over 30,000 confirmed threats detected across our customers environments, this research arms security leaders and their teams with actionable insight into the threats we observed, techniques adversaries most commonly leverage, and trends that help you understand what is changing and why.

(more available)
Added: April 5, 2022
image from IRIS Risk Retina - Nonprofit

IRIS Risk Retina - Nonprofit

This free public report from the Cyentia IRIS Risk Retina series clears away the fog of FUD, providing parameters for frequency and loss of publicly discoverable cyberevents in the nonprofit sector.

(more available)
Added: March 21, 2022
image from The Size and Shape of Workforce Risk

The Size and Shape of Workforce Risk

A deep dive into the profiles of workforce members, identifying the characteristics of greater and less cyberrisk.

Added: March 9, 2022
image from Global Threat Landscape Report - 2022 Q1

Global Threat Landscape Report - 2022 Q1

The first update to the Fortinet regular Threat Landscape Report for 2022. Covers major trends in threats as determined by Fortinet’s global sensor network.

(more available)
Added: March 8, 2022
image from Follow the Money: Understanding the money laundering techniques that support large-scale cyber-heists

Follow the Money: Understanding the money laundering techniques that support large-scale cyber-heists

This report describes how money laundering is typically performed in the context of large-scale cyber heists. It illustrates key parts of the typical processes used by cyber criminals with examples to help better inform readers on areas they should focus on to better prevent, detect and respond to money laundering. In addition, the report offers perspectives on areas in which controls could be further improved and how money laundering techniques may evolve

(more available)
Added: January 26, 2022
image from McAfee Labs Threats Report, April 2021

McAfee Labs Threats Report, April 2021

This report incorporates not only the malware zoo, but new analysis for what is being detected in the wild. Also added: statistics detailing the top MITRE ATT&CK techniques observed in Q4 2020 from Criminal/APT groups.

(more available)
Added: January 14, 2022
image from Cloud and Threat Report - January 2022

Cloud and Threat Report - January 2022

Takes a look back at the top trends in cloud attacker activities and cloud data risks from 2021 compared to 2020.

(more available)
Added: January 13, 2022
image from Hindsight Cybersecurity: Seven Key Lessons Learned By Breach Victims

Hindsight Cybersecurity: Seven Key Lessons Learned By Breach Victims

This report shares seven key lessons learned by breach victims. Each lesson includes simple recommendations and tips, many of which do not require organizations to purchase any tools.

(more available)
Added: January 7, 2022
image from Sophos 2022 Threat Report

Sophos 2022 Threat Report

Sophos’ annual threat report drawn from incident response engagements with customers.

Added: December 13, 2021
image from DomainTools Report: Fall 2021

DomainTools Report: Fall 2021

A review of domain registration, hosting, and content-related data on attack patterns and trends.

Added: December 10, 2021
image from ENISA Threat Landscape 2021

ENISA Threat Landscape 2021

This is the ninth edition of the ENISA Threat Landscape (ETL) report, an annual report on the status of the cybersecurity threat landscape that identifies prime threats, major trends observed with respect to threats, threat actors and attack techniques, and also describes relevant mitigation measures.

(more available)
Added: December 10, 2021
image from 2021 Cloud Application Security

2021 Cloud Application Security

As remote employees use work devices for personal activities, and personal devices for work activities, cloud-based apps – especially unauthorized cloud apps – are more popular than ever. But they also deliver significant risk, with Remote Desktop Protocol (RDP) alone serving as the vehicle of choice for as much as 55% of ransomware attacks. This report explores how cloud-based apps – from storage services to social media apps – threaten your network security.

(more available)
Added: December 10, 2021
image from 2021 Cyber Security Threat Trends

2021 Cyber Security Threat Trends

The data used in this report comes from Cisco Umbrella, Cisco’s cloud delivered security service that includes DNS-layer security, secure web gateway, firewall, cloud access security broker (CASB) functionality, and threat intelligence.

(more available)
Added: December 9, 2021
image from State of Security Within eCommerce 2021

State of Security Within eCommerce 2021

A review of trends in e-commerce security and attacks based upon a variety of sources collected via Impreva Research labs.

(more available)
Added: November 19, 2021
image from Corvus Risk Insights Index: Q4 2021

Corvus Risk Insights Index: Q4 2021

Using data from Corvus’s scanning platform, claims information, and other unnamed sources, this report into cyber and technology errors and omissions focuses on litigation risk, ransomware trends, and selected technology updates.

(more available)
Added: October 25, 2021
image from Financial Trend Analysis: Ransomware Trends in Bank Secrecy Act Data Between January 2021 and June 2021

Financial Trend Analysis: Ransomware Trends in Bank Secrecy Act Data Between January 2021 and June 2021

Using governmental reports of bank secrecy act (BSA) data, this report evaluate the threat patterns and magnitudes in ransomware events over the first half of 2021. A historical view of trends in financial reports, both frequency and magnitudes, is included.

(more available)
Added: October 18, 2021
image from Trends in Cybersecurity Breaches: March 2021

Trends in Cybersecurity Breaches: March 2021

A survey of recent breaches occurring over the past year as identified and classified via AuditAnalytic’s commercial database of breach information. Include firmographic and case study information.

(more available)
Added: October 13, 2021
image from Cyber Claims Study: 2021 Report

Cyber Claims Study: 2021 Report

This annual report on trends in submitted claims in the cybersecurity insurance space. With particular focus on current trends such as ransomware and company firmographics.

(more available)
Added: October 11, 2021
image from The 2021 Ransomware Survey Report

The 2021 Ransomware Survey Report

A survey analysis of 455 business leaders on their sentiments regarding ransomware.

Added: October 2, 2021
image from Netscout Threat Intelligence Report: 1H 2021

Netscout Threat Intelligence Report: 1H 2021

The regular update to this threat intelligence series. Focuses on changes in attacker behaviors in the first half of 2021, with particular focus on DDOS activity, ransomware actions, supply chain attacks, and COVID-19 related patterns.

(more available)
Added: September 23, 2021
image from The Broker's Guide to Ransomware: 2nd Edition

The Broker's Guide to Ransomware: 2nd Edition

A review of the principals behind ransomware attacks and the key trends in this attack class, as presented in the claims information collected by Corvus.

(more available)
Added: September 21, 2021
  • ««
  • «
  • 17
  • 18
  • 19
  • 20
  • 21
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 15, 2025 00:08 UTC (build b1d7be4)