Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from 2020 Deloitte-NASCIO Cybersecurity Study

2020 Deloitte-NASCIO Cybersecurity Study

This report reflects insights from 51 state and territory respondents on the CISO’s role, as well as budget, governance, reporting, workforce, and operations.

(more available)
Added: October 18, 2020
image from FIN11: A Widespread Ransomware and Extortion Operation

FIN11: A Widespread Ransomware and Extortion Operation

This report provides a look into FIN11, a financially motivated threat group that has conducted some of the largest and longest running malware distribution campaigns to date.

(more available)
Added: October 18, 2020
image from Looking Into the Eye of the Interplanetary Storm

Looking Into the Eye of the Interplanetary Storm

This article offers a glimpse into the inner workings of the Interplanetary Storm botnet, provides an exhaustive technical analysis of the Golang-written binaries along with an overview of the protocol internals and finally, some attribution information.

(more available)
Added: October 18, 2020
image from 2020 Midyear Cybersecurity Report: Securing the Pandemic-Disrupted Workplace

2020 Midyear Cybersecurity Report: Securing the Pandemic-Disrupted Workplace

This report takes a look at the most significant stories and trends in order to determine what has changed and what to expect for the second half of 2020 in the cybersecurity industry.

(more available)
Added: October 18, 2020
image from Cybersecurity: The Human Challenge

Cybersecurity: The Human Challenge

This study provides new insights into the state of cybersecurity skills and resources across the globe.

Added: October 14, 2020
image from 2020 State of Malware Report

2020 State of Malware Report

This report goes in-depth into the changes in malware attacks for 2020, using data collected from honey pots, telemetry, and research conducted by threat analysts and reporters in 2019.

(more available)
Added: September 28, 2020
image from ACSC Annual Cyber Threat Report: July 2019 to June 2020

ACSC Annual Cyber Threat Report: July 2019 to June 2020

This report outlines key cyber threats and statistics over the period 1 July 2019 to 30 June 2020. Over this period, the ACSC responded to 2,266 cyber security incidents and received 59,806 cybercrime reports at an average of 164 cybercrime reports per day, or one report every 10 minutes.

(more available)
Added: September 28, 2020
image from Protecting People 2019: A global Cybersecurity Analysis of Vulnerability, Attacks and Privilege

Protecting People 2019: A global Cybersecurity Analysis of Vulnerability, Attacks and Privilege

This report examines which employees, departments, and industries are the most vulnerable in 2019. It analyzes which ones receive the most targeted threats, and how their privilege might be abused.

(more available)
Added: September 28, 2020
image from ECSO Barometer 2020: "Cybersecurity In Light of COVID-19"

ECSO Barometer 2020: "Cybersecurity In Light of COVID-19"

This is a report on a survey conducted by the ECSO from March 2020 to May 2020, with members of the cybersecurity community. It found many shifts in European cybersecurity interests after the impact of the COVID-19 pandemic.

(more available)
Added: September 28, 2020
image from Fraud in the Wake of COVID-19: September 2020 Edition

Fraud in the Wake of COVID-19: September 2020 Edition

This report aims to help anti-fraud practitioners, business leaders, and the general public in understanding the evolution of fraud in the wake of the coronavirus, as well as the importance of heightening anti-fraud measures to protect against fraudulent activity during this unprecedented time.

(more available)
Added: September 28, 2020
image from McAfee Labs COVID-19 Threats Report July 2020

McAfee Labs COVID-19 Threats Report July 2020

A deep dive threat report into COVID-19 related attacks.

Added: September 27, 2020
image from What's Lurking in the Shadows 2020?

What's Lurking in the Shadows 2020?

This report provides recommendations on how companies can manage the threat posed by shadow IoT devices.

Added: September 27, 2020
image from When the World Stayed Home

When the World Stayed Home

This report was compiled from interviews with 1,004 company leaders in order to find the effect of remote work on their companies.

(more available)
Added: September 27, 2020
image from Threat Landscape for Industrial Automation Systems H1 2020

Threat Landscape for Industrial Automation Systems H1 2020

This report from Kaspersky explains changes in the threat landscape for industrial automation systems for the first half of 2020. It goes in detail on the variety of malware, the main threat sources, regional differences, and more.

(more available)
Added: September 25, 2020
image from DDoS Threat Report Q1 2019

DDoS Threat Report Q1 2019

This quarterly threat report offers insight into the DDoS attacks that occurred in the 1st quarter of 2019.

Added: September 16, 2020
image from Cybercrime: COVID-19 Impact

Cybercrime: COVID-19 Impact

Interpol’s Cybercrime Directorate produced this Global Assessment Report on COVID-19 related Cybercrime based on data from 194 countries and private partners to provide a comprehensive overview of the cybercrime landscape amid the pandemic.

(more available)
Added: September 3, 2020
image from Claroty Biannual ICS Risk & Vulnerability Report: 1H 2020

Claroty Biannual ICS Risk & Vulnerability Report: 1H 2020

The objective of this report is to provide nuanced insight into the ICS risk and vulnerability landscape, the challenges it poses to operational technology (OT) security practitioners, and what conclusions can be drawn from publicly available data.

(more available)
Added: September 2, 2020
image from 2020 State of the Software Supply Chain

2020 State of the Software Supply Chain

Now in its sixth year, Sonatype’s State of the Software Supply Chain Report continues to examine measurable practices of secure open source software development and delivery.

(more available)
Added: September 1, 2020
image from More Evidence of APT Hackers-for-Hire Used for Industrial Espionage

More Evidence of APT Hackers-for-Hire Used for Industrial Espionage

Bitdefender researchers recently investigated a sophisticated APT-style cyberespionage attack targeting aninternational architectural and video production company, pointing to an advanced threat actor and a South Korean based C&C infrastructure. This report goes in-depth on this attack.

(more available)
Added: September 1, 2020
image from Enduring from home

Enduring from home

A survey of 200 IT professionals on the readiness and impact of COVID-19 upon cyber security.

Added: August 20, 2020
image from Incident response analyst report

Incident response analyst report

A review of cases handled by Kaspersky’s incident response retainer and on-demand services. Concentrated in the EU, Middle East, and Eurasian countries and in the industrial, financial, and government sectors.

(more available)
Added: August 8, 2020
  • ««
  • «
  • 20
  • 21
  • 22
  • 23
  • 24
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 15, 2025 04:08 UTC (build b1d7be4)