Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from Ransomware Report

Ransomware Report

This report offers new insights into ransomware and the issues related to this problem.

Added: April 4, 2019
image from 2018 Application Security Report

2018 Application Security Report

This report is the result of a comprehensive survey of 437 cybersecurity professionals designed to reveal the latest application security trends, how organizations are protecting applications, and what tools and best practices IT cybersecurity teams are prioritizing to find, fix and prevent vulnerabilities in next-gen applications.

(more available)
Added: April 4, 2019
image from Mobile Security & BYOD Report

Mobile Security & BYOD Report

Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use in the enterprise. As mobility grows in the workplace, so do challenges from managing device access to handling the most pressing concerns of mobile security. The 2018 Mobile Security Report focuses on these security challenges and offers fresh insights on the state of securing mobility, the technology choices organizations are making, and their response to the growing security risks associated with enterprise mobility.

(more available)
Added: April 4, 2019
image from 2018 Endpoint Security Report

2018 Endpoint Security Report

The 2018 Endpoint Security Report reveals the latest endpoint security trends and challenges, why and how organizations invest in endpoint security, and the security capabilities companies are prioritizing.

(more available)
Added: April 4, 2019
image from 2018 Managed Security Report

2018 Managed Security Report

The 2018 Managed Security Report is based on the results of a comprehensive online survey of IT and cybersecurity professionals conducted in July and August of 2018.

(more available)
Added: April 4, 2019
image from How Mobile Phishing Works And What To Do About It

How Mobile Phishing Works And What To Do About It

This report offers information on Mobile Phishing from data researched in 2018.

Added: April 4, 2019
image from The Cost Of Cybercrime

The Cost Of Cybercrime

The ninth annual cost of cybercrime study helps to quantify the economic cost of cyberattacks by analyzing trends in malicious activities over time.

(more available)
Added: April 4, 2019
image from 2019 SonicWall Cyber Threat report

2019 SonicWall Cyber Threat report

To promote global awareness and facilitate important dialogues, SonicWall remains steadfast in its commitment to research, analyze and share threat intelligence via the 2019 SonicWall Cyber Threat Report.

(more available)
Added: April 4, 2019
image from Threat Detection Report

Threat Detection Report

An In Depth Look at the most prevalent ATT&CK techniques according to Red Canary’s historical detection dataset.

Added: March 26, 2019
image from The Forrester Tech Tide: Zero Trust Threat Detection And Response, Q1 2019

The Forrester Tech Tide: Zero Trust Threat Detection And Response, Q1 2019

Zero Trust threat detection and response technologies are increasingly critical to securing customers and protecting the firm’s brand. To accelerate their performance in threat detection and response, companies are evaluating and adopting a range of contributing technologies. This Forrester Tech Tide™ report presents an analysis of the maturity and business value of the 18 technology categories that support Zero Trust threat detection and response. Security professionals should read this report to shape their firm’s investment approach to these technologies.

(more available)
Added: March 26, 2019
image from DDoS Threat Report Q4 2018

DDoS Threat Report Q4 2018

This quarterly threat report offers insight into the DDoS attacks that occurred in the 4th quarter of 2018.

Added: March 26, 2019
image from Would You Be Ready For A Cyber Attack?

Would You Be Ready For A Cyber Attack?

Business in the Community is delighted to present this report, which confirms where we all can play a role in better online security and how we – business leaders, think tanks, government – can achieve this. We encourage CEOs and business owners of all sizes to take actions after reading this report. If you are a small business owner, we hope it inspires you to implement the recommendations to be safer online. For larger businesses, we hope you will consider joining our call to action. By working together, we will be a step closer to achieving the National Cyber Security Centre’s vision to help: “make the UK the safest place to live and do business online”.

(more available)
Added: March 26, 2019
image from Striking Security Gold: Uncovering Hidden Insights in a decade's worth of RSA Conference abstracts

Striking Security Gold: Uncovering Hidden Insights in a decade's worth of RSA Conference abstracts

From the report, “But what exactly do we talk about when we talk “security?” That’s the question we seek to answer in this report, which has its roots in a similar question asked by an eight-year-old daughter two and a half years ago: “What’s the RSA Conference about, Daddy?” That root sprouted into a four-part blog series and a panel discussion a year later where we analyzed 25 years of session titles in honor of the 25th anniversary of RSA Conference.”

(more available)
Added: March 16, 2019
image from State of Application Services 2019 Report/ Focus On Americas

State of Application Services 2019 Report/ Focus On Americas

This report from F5 offers insights into key data regarding application services in the Americas.

Added: March 16, 2019
image from 7 Most Unsafe Gaps For Industrial Cyber Security

7 Most Unsafe Gaps For Industrial Cyber Security

Indegy provides a helpful graphic designed to reveal seven critical areas in the area of industrial cyber security.

Added: March 16, 2019
image from Industry Cyber-Exposure Report: ASX 200

Industry Cyber-Exposure Report: ASX 200

Using information from Rapid7’s Project Sonar internet telemetry service, this report reviews several dimensions of demonstrated security controls for companies in the S&P 200 and ASX (Australian) stock indices.

(more available)
Added: March 16, 2019
image from Avast Global PC Risk Report 2019

Avast Global PC Risk Report 2019

This report reveals that globally, in any given month, home users are twice as much at risk of encountering any type of malware, with a 20.09% chance of infection; business users, on the other hand, have a 10.87% chance of getting attacked, generally because they often have more layers of protection in place. The more people and businesses depend on computers, along with the type of activities carried out on them and the data these PCs hold, the greater consequences and damage malware attacks can cause.

(more available)
Added: March 16, 2019
image from Cybersecurity In The City: Ranking America's Most Insecure Metros

Cybersecurity In The City: Ranking America's Most Insecure Metros

From the report, “To generate this report, Coronet analyzed an enormous set of data comprised of both access and service threats. The data originated from Wi-Fi and cellular networks, devices spanning all operating systems and public network connectivity infrastructure. The data was aggregated and evaluated based on potential damage that could be caused by attackers and existing vulnerabilities in the 55 most populated DMAs, which together account for almost 70 percent of the entire U.S. population. The ranked results have been aggregated into regions which closely resemble Nielsen DMAs. Coronet ranked each city that was analyzed from most insecure to least vulnerable, with the most insecure cities scoring a 6.5 and above.” Read on to find out more.

(more available)
Added: March 16, 2019
image from The State of Industrial Cybersecurity 2018

The State of Industrial Cybersecurity 2018

In June of 2018 Claroty asked the experts about the state of industrial cybersecurity. This paper discusses what they said.

(more available)
Added: March 9, 2019
image from SCADA And Mobile Security In The Internet Of Things Era

SCADA And Mobile Security In The Internet Of Things Era

From the report, “Two years ago, the authors assessed 20 mobile applications that worked with ICS software and hardware. At that time, mobile technologies were widespread, but IoT mania was only beginning. In that paper, the authors stated, “convenience often wins over security. Nowadays, you can monitor (or even control!) your ICS from a brand-new Android [device].” Today, the idea of putting logging, monitoring, and even supervisory/control functions in the cloud is not so farfetched. The purpose of this paper is to discuss how the landscape has evolved over the past two years and assess the security posture of SCADA systems and mobile applications in this new IoT era.”

(more available)
Added: March 9, 2019
image from Are You Trading Stocks Securely?

Are You Trading Stocks Securely?

This paper demonstrates vulnerabilities that affect numerous traders. Among them are unencrypted authentication, communications, passwords, and trading data; remote DoS that leaves applications useless; trading programming languages that allow DLL imports; insecurely implemented chatbots; weak password policies; hardcoded secrets; and poor session management. In addition, many applications lack countermeasures, such as SSL certificate validation and root detection in mobile apps, privacy mode to mask sensitive values, and anti-exploitation and antireversing mitigations.

(more available)
Added: March 9, 2019
  • ««
  • «
  • 28
  • 29
  • 30
  • 31
  • 32
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 16, 2025 12:08 UTC (build b1d7be4)