Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from Global Cybersecurity Index 2017

Global Cybersecurity Index 2017

A survey driven review of 25 indicators via 157 questions spanning 193 respondents. This attempts to focus on factors influencing cybersecurity strategy design and implementation on a year-over-year basis.

(more available)
Added: August 1, 2020
image from Global Cybersecurity Index 2018

Global Cybersecurity Index 2018

A survey driven review of 25 indicators via 50 questions spanning nearly 160 respondents. This attempts to focus on factors influencing cybersecurity strategy design and implementation on a year-over-year basis.

(more available)
Added: August 1, 2020
image from The 2020 Healthcare Cybersecurity Report

The 2020 Healthcare Cybersecurity Report

This report outlines changes in healthcare cybersecurity in 2019 as well as changes predicted to happen in 2020.

Added: July 30, 2020
image from Cybersecurity Trends 2020

Cybersecurity Trends 2020

This annual report outlines expected cybersecurity trends for the coming year.

Added: July 30, 2020
image from Overstimulating: CARES Act Fraud On the Deep and Dark Web

Overstimulating: CARES Act Fraud On the Deep and Dark Web

After the CARES act was passed in March of 2020, fraudsters worked towards making money off of it. This report seeks to understand all of the components of fraud happening on the dark web in relation to the CARES act.

(more available)
Added: July 29, 2020
image from Cyber security skills in the UK labour market

Cyber security skills in the UK labour market

A review of the cybersecurity job market in the UK, the nature and extent of skill gaps and shortages. A combination of surveys, qualitative research with firms, and a review of job postings.

(more available)
Added: July 27, 2020
image from 2019 Paid Ransomware Report

2019 Paid Ransomware Report

A review of 63 events where Kivu participated in payouts of ransomware events on behalf of clients engaged via a post-incident response. Provides firmographic breakdown of ransomware payouts.

(more available)
Added: July 27, 2020
image from What Doxxing Victims Reveal About "Targeted Attacks"

What Doxxing Victims Reveal About "Targeted Attacks"

A review of doxxing related ransomware cases handled by Kivu Consulting in a post-breach role. Explores firmographics of the organizations involved in various variants of ransomware families.

(more available)
Added: July 27, 2020
image from Cyber Security Breaches Survey 2020

Cyber Security Breaches Survey 2020

Using telephone survey of UK business and thirty in-depth interviews, this report reviews awareness and approaches to cyber security in the UK as well as the nature and impact of breaches by firm size and sector.

(more available)
Added: July 22, 2020
image from The State of K-12 Cybersecurity: 2019 Year in Review

The State of K-12 Cybersecurity: 2019 Year in Review

Using publicly available breach information, this report seeks to analyze the breaches and incidents occurring in the US K-12 educational sector.

(more available)
Added: July 22, 2020
image from 2020 Cybersecurity Outlook Report

2020 Cybersecurity Outlook Report

An annual report using Carbon Black’s data sets of the Carbon Black Cloud customer footprint, Carbon Black User Exchange, public samples, Carbon Black Endpoint Standard data, and internal sources. Leverages the ATT&CK framework to determine common tools-techniques-processess (TTPs).

(more available)
Added: July 22, 2020
image from The State of Cloud Security 2020

The State of Cloud Security 2020

A survey of over 3,500 IT managers with data and workloads in the public cloud.

Added: July 9, 2020
image from Threat Intelligence Executive Report 2020 Vol. 3

Threat Intelligence Executive Report 2020 Vol. 3

The Threat Intelligence Executive Report by Secureworks analyzes security threats and helps organizations protect their systems. During March and April of 2020, Secureworks noticed 3 developments in threat intelligence: Multiple threat actors leverage COVID-19, Remote access security is essential in the current working environment, and big breaches begin with small intrusions.

(more available)
Added: July 8, 2020
image from Threat Intelligence Executive Report 2020 Vol. 2

Threat Intelligence Executive Report 2020 Vol. 2

The Threat Intelligence Executive Report by Secureworks analyzes security threats and aims to help organizations protect their systems. In the first two months of 2020, they identified 3 main trends: Lesser-known government-sponsored threat groups putting data at risk, Citrix vulnerability disclosure causing spikes in incidents, and ransomware operators leveraging risk of GDPR fines as a threat.

(more available)
Added: July 8, 2020
image from Threat Intelligence Executive Report 2020 Vol. 1

Threat Intelligence Executive Report 2020 Vol. 1

The Threat Intelligence Executive Report by Secureworks is a report designed to analyze security threats and help organizations protect their systems. In this report, they look into Iranian espionage operations in 2020, Customized Magecart attacks, and China based threat groups targeting NGOs and Asian government networks.

(more available)
Added: July 8, 2020
image from 2020 State of Operational Technology and Cybersecurity Report

2020 State of Operational Technology and Cybersecurity Report

A survey of stakeholders in operational technology (OT) environments across four industries: manufacturing, energy and utilities, healthcare, and transportation.

Added: July 7, 2020
image from 2020 Incident Response and Data Breach Report

2020 Incident Response and Data Breach Report

Drawn on over 1,000 incidents that The Crypsis Group responded to in 2019, this report looks for trends in industry and attack patterns for the past year. Primary focus areas for the report are ransomware, business email compromise (BEC), and data breaches. Also includes suggestions on defensive measures where appropriate.

(more available)
Added: July 6, 2020
image from Cyber Resilient Organization Report 2020

Cyber Resilient Organization Report 2020

The fifth annual survey uses survey results from over 3,4000 It and security professionals on organization’s ability to detect, prevent, contain, and respond to cybersecurity incidents.

(more available)
Added: July 1, 2020
image from Vulnerabilities in the Core

Vulnerabilities in the Core

This report sought to understand the health and security of Free and Open Source Software (FOSS) as it is today. It identifies the most commonly used free and open source software components in production applications, and examines them for potential vulnerabilities.

(more available)
Added: June 29, 2020
image from State of Open Source Security Report 2020

State of Open Source Security Report 2020

The annual report from Snyk on the state of open source software from a security perspective. Includes survey data from 500+ developers, internal Snyk vulnerability data from the projects monitored by Snyk, and additional aggregated source code repository data.

(more available)
Added: June 25, 2020
image from Hiscox Cyber Readiness Report 2020

Hiscox Cyber Readiness Report 2020

The fourth annual report from Hiscox. This survey based report collected responses from IT managers, executives, and other professionals across multiple sectors and countries. Focuses on assessing the cyber readiness of firms, budget spend, and losses experienced.

(more available)
Added: June 25, 2020
  • ««
  • «
  • 21
  • 22
  • 23
  • 24
  • 25
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 15, 2025 08:08 UTC (build b1d7be4)