Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from Hacker's Playbook 2nd Edition Q4 2016

Hacker's Playbook 2nd Edition Q4 2016

From the report, “How do we actually “play the hacker”? We do this by deploying simulators that play the role of a “virtual hacker” across endpoints, network and cloud, and execute breach methods from our hacker’s playbook. Our findings are incorporated in this report, and analyzed by SafeBreach Labs, with the hope that security teams can glean some interesting insights into the things not to do in their environment.”

(more available)
Added: July 10, 2019
image from Healthcare Cyber Heists in 2019

Healthcare Cyber Heists in 2019

20 Leading CISO’s from the healthcare industry offer their perspective on evolving cyberattacks, ransomware & the biggest concerns to their organizations.

(more available)
Added: July 10, 2019
image from Threat Insights Report: June 2019

Threat Insights Report: June 2019

Bromium Insights Report is designed to help our customers become more aware of emerging threats and trends and to equip security teams with knowledge and tools to combat today’s attacks and anticipate evolving threats to manage their security posture.

(more available)
Added: July 10, 2019
image from Cloud Security Threat Report: Adapting to the New Reality of Evolving Cloud Threats

Cloud Security Threat Report: Adapting to the New Reality of Evolving Cloud Threats

Cloud is the center of IT and increasingly, the foundation for cyber security. Understanding how threat vectors are shifting in cloud is fundamental to making the necessary updates to your security program and strategy. Symantec’s CSTR shines a light on how to secure the digitally transformed, virtual organization of today and tomorrow.

(more available)
Added: July 10, 2019
image from Attacker Behavior Industry Report

Attacker Behavior Industry Report

This report examines a wide range of cyberattack detections and trends from a sample of 354 Vectra customers with more than 3 million devices and workloads per month from nine different industries. This report takes a multidisciplinary approach that spans all strategic phases of the attack lifecycle.

(more available)
Added: May 18, 2019
image from 2019 Trustwave Global Security Report

2019 Trustwave Global Security Report

This report promises to allow you to use the vast insights and hard data contained in the report to help bolster your security posture and better understand the nature of the threats we face today.

(more available)
Added: May 18, 2019
image from Bromium Insights Report: April 2019

Bromium Insights Report: April 2019

This report from Bromium offers insights into notable threats and events from 2019.

Added: May 18, 2019
image from The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey

The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey

This year’s SANS survey saw an increase in usage and interest in CTI, along with a diversification in how the intelligence is being used by organizations. While the use of CTI continues to grow, there is no one-size-fits-all approach. Organizations leverage different types of CTI to meet different needs. This survey focuses on how and why CTI is being used, how it is helping defenders, what data sources are being leveraged, and how data is converted into usable intelligence.

(more available)
Added: May 18, 2019
image from Enterprise Risk Index Report

Enterprise Risk Index Report

This report offers insights from the Global Deployment of SentinelOne Agents.

Added: May 18, 2019
image from Industry Assessment 2017: Mobile Threat Defense (MTD)

Industry Assessment 2017: Mobile Threat Defense (MTD)

This report details the Industry Average detection efficacy of the leading MTD solutions used against malicious applications, network attacks and device vulnerabilities. During testing, the Quality of Experience (QoE) and Total Cost of Ownership (TCO) of each MTD solution was also assessed to determine the overall value of each product.

(more available)
Added: May 18, 2019
image from Early Findings: Review of State and Local Government Ransomware Attacks

Early Findings: Review of State and Local Government Ransomware Attacks

This report is a discussion of the findings and trends of 169 ransomware incidents affecting state and local governments since 2013.

(more available)
Added: May 18, 2019
image from Security Magatrends - January 2019

Security Magatrends - January 2019

This report identifies challenges and perceptions that enterprises, midmarket companies, and SMBs face across seven industry verticals including manufacturing, financial, and healthcare. The goal is to help readers to understand the common issues and where they are doing a better or worse job than others. Ultimately, the report will help readers understand how to handle threats better, no matter where they stand now.

(more available)
Added: May 18, 2019
image from RiskSense Vulnerability Weaponization Insights

RiskSense Vulnerability Weaponization Insights

This Spotlight report provides in-depth analysis of vulnerabilities and weaponization patterns across the entire family of Adobe products. By focusing on weaponization, we go beyond simply counting vulnerabilities, and instead reveal how popular software from a leading vendor becomes a beacon for attackers. A significant number of these vulnerabilities are exploitable and have remote code execution capabilities, changing their status from a potential threat to an active and live cyber risk exposure point. While our findings naturally focus on the most recent data, the report includes more than 20 years of data from 1996 through 2018, allowing us to see long-term trends.

(more available)
Added: May 3, 2019
image from Protecting People: A Quarterly Analysis of Highly Targeted Cyber Attacks

Protecting People: A Quarterly Analysis of Highly Targeted Cyber Attacks

This report presents data gathered between October–December 2018, along with previously collected data for historical comparisons. We examine which employees and organizational departments receive the most highly targeted email threats. Then we explore how they’re being attacked, analyzing attackers’ techniques and tools. Based on these findings, we recommend concrete steps organizations can take to build a defense that focuses on their people.

(more available)
Added: May 3, 2019
image from 2019 Vulnerability Statistics Report

2019 Vulnerability Statistics Report

From the report, “For our 4th Year running, welcome to the edgescan Vulnerability Stats Report. This report aims to demonstrate the state of full stack security based on edgescan data for 2018. The edgescan report has become a reliable source for truly representing the global state of cyber security. This year we took a deeper look at vulnerability metrics from a known vulnerability (CVE) and visibility standpoint. We still see high rates of known/patchable vulnerabilities which have working exploits in the wild, which possibly demonstrates it is hard to patch production systems effectively on a consistent basis.”

(more available)
Added: May 3, 2019
image from Defending Against Today's Critical Threats: A 2019 Threat Report

Defending Against Today's Critical Threats: A 2019 Threat Report

As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future.

(more available)
Added: May 3, 2019
image from The Threat Intelligence Handbook

The Threat Intelligence Handbook

This e-book provides a practical guide for security teams to “unlock” the power of intelligence.

Added: April 23, 2019
image from Improving Cybersecurity Awareness In Undeserved Populations

Improving Cybersecurity Awareness In Undeserved Populations

This paper, published in partnership with the UC Berkeley Center for Long-Term Cybersecurity, highlights research indicating that “underserved” residents in San Francisco, California— including low-income residents, seniors, and foreign language speakers—face higher-than average risks of being victims of cyber attacks. They are less likely to know whether they have even been victimized by a cyber attack, and they have lower awareness of cybersecurity risks. Partly as a result, they are less likely to access online services. This cybersecurity gap is a new “digital divide” that needs to be addressed—with urgency—by the public and private sectors alike.

(more available)
Added: April 23, 2019
image from 2019 Tax Season Threat Roundup

2019 Tax Season Threat Roundup

This unique report takes a hard look at scams that focus on tax reporting and the filing of taxes.

Added: April 19, 2019
image from The Future Of Email Security In The Cloud

The Future Of Email Security In The Cloud

This white paper will guide security teams as they reexamine their approach to cloud-based email.

Added: April 19, 2019
image from 2018 Cloud Security Report

2018 Cloud Security Report

This report has been produced by the 400,000 member Information Security Community on LinkedIn in partnership with Cybersecurity Insiders to explore how organizations are responding to the security threats in the cloud, and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud.

(more available)
Added: April 4, 2019
  • ««
  • «
  • 27
  • 28
  • 29
  • 30
  • 31
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 16, 2025 04:08 UTC (build b1d7be4)