Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from 2019 AWS Cloud Security Report

2019 AWS Cloud Security Report

This report has been produced in partnership with the 400,000 member Cybersecurity Insiders community of IT security professionals to explore how AWS user organizations are responding to security threats in the cloud, and what tools and best practices IT cybersecurity leaders are prioritizing in their move to the cloud.

(more available)
Added: February 6, 2019
image from Anatomy Of An Attack: Industril Control Systems Under Siege

Anatomy Of An Attack: Industril Control Systems Under Siege

From the report, “Over the past few year’s attackers have exploited this opportunity, and as documented in our Anatomy of an Attack (AOA) report, have compromised a wide variety of manufacturing control systems. This report documents five case studies which show how cyber attackers could gain access to manufacturing and utility facilities. We also detail the progression of the attacks which in some cases disabled operations for an extended period. In one of our case studies, losses were catastrophic with the impacted entity suffering losses of over 800,000 euro per day. This report will explain how the attacks happen, and once established, how the attackers can extend these command and control points to breach the institution’s records, blackmail and extort funds, or worse, disable ongoing operations of the facility over an extended period.” Read on to find out more.

(more available)
Added: February 6, 2019
image from H1 2018 Report: The State Of Online Journey Hijacking

H1 2018 Report: The State Of Online Journey Hijacking

Online Journey Hijacking, a client-side phenomenon where unauthorized ads are injected into consumer browsers, is a growing yet invisible problem for eCommerce sites. This issue is widespread across the web — yet the eCommerce industry has only been made aware of its existence in recent years.

(more available)
Added: February 6, 2019
image from Health Care Cyber Breach Research Report for 2016

Health Care Cyber Breach Research Report for 2016

This report offers insight into Cyber Breaches and the health industry for 2016. It provides information on the important trends of 2016, medical device hijacks and the top ten health care cyber attacks of 2016.

(more available)
Added: February 6, 2019
image from The Life of a Zero day

The Life of a Zero day

From the report, “We live in incredible times, where we trust more of our lives to machines that are becoming ever more powerful. We cannot leave the doors to our “digital kingdoms” wide open. Adversaries, both nation-states and for-profit malicious actors, have access to a seemingly unlimited supply of “all access keys”. Our responsibility is to revoke and disable these keys or to at least make that access as difficult as possible through thoughtful defense-in-depth security controls. These controls should not just rely solely on the “next gen” version of a well-known technology. Truly different types of protection and detection technologies need to be layered in order to create the strongest possible defense.” Read on to find out more.

(more available)
Added: February 6, 2019
image from The State of Endpoint Security: Past, Present and Future

The State of Endpoint Security: Past, Present and Future

From the report, “With endpoint security products continuing to be at the tip of the spear of cyber defenses for years to come, the question is how to ensure the best possible security posture. No matter which way an endpoint security buyer turns, there is no one magic bullet. It is likely that a layered approach with multiple different technologies working together is required.” Read on to find out why.

(more available)
Added: February 6, 2019
image from Is Your Endpoint Security Strategy Too Negative?

Is Your Endpoint Security Strategy Too Negative?

From the report, “An OS-Centric Positive Security isn’t a silver bullet, but it can be a tremendously valuable and complementary defense mechanism—your second or last line of defense. The majority of endpoint security solutions deployed today are based on the Negative Security model; so, it’s time to add a Positive Security solution to strengthen your endpoint protection.” Read on to find out more.

(more available)
Added: February 6, 2019
image from Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware

Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware

From the report, “Machine Learning (ML) is based around the idea machines can learn from data. ML techniques have been around for a very long time. In recent years, their use has exploded thanks to advancements in elastic cloud computing and big data. Now, ML is commonly used in fields as diverse as medical research, fraud detection, smart cars, online search and electronic commerce personalization and recommendations, to name just a few. ML has recently become the shiny new object for security and is the foundational pillar of products such as next-generation antivirus (NGAV) and User and Entity Behavior Analytics (UEBA). While most of these products have promised to be a “silver bullet” against malware, complete protection remains illusive. In fact, for a number of reasons, ML is more likely to detect and cure cancer than to stop all of today’s advanced threats. As far-fetched as this may sound, a detailed look at the distinctions between cancer detection and malware detection quickly demonstrate why this statement is true. Let’s have a look at why ML will only get you so far and what you can do about it. ” Read on to find out more.

(more available)
Added: February 6, 2019
image from MEDJACK.4 Medical Device Hijacking

MEDJACK.4 Medical Device Hijacking

This report takes an inside look at the Cyber Security challenge for healthcare today and more specifically looks at the medical device security challenge.

(more available)
Added: February 6, 2019
image from Six Phishing Predictions

Six Phishing Predictions

To stop phishing attacks, it helps to see them coming. So we asked an array of CofenseTM experts for 2019 predictions. What trends in phishing and malware threats should you anticipate? To be better prepared to defend your organization, read on.

(more available)
Added: February 6, 2019
image from MEDJACK.2 Hospitals Under Siege

MEDJACK.2 Hospitals Under Siege

This report offers a variety of case studies that highlight the challenges in the Healthcare Network.

Added: February 6, 2019
image from Zombie Zero: Weaponized Malware Targets ERP Systems

Zombie Zero: Weaponized Malware Targets ERP Systems

This report takes a look at the dangers of weaponized malware and provides a case study of Zombie Zero behavior.

(more available)
Added: February 6, 2019
image from The Anatomy of an Attack Surface: Five Ways Hackers are Cashing In

The Anatomy of an Attack Surface: Five Ways Hackers are Cashing In

From the report, “For security teams, the sheer depth and breadth of what they need to defend may seem daunting, but thinking about the Internet from an attacker’s perspective —a collection of digital assets that are discoverable by hackers as they research their next campaigns— can put the massive scope of their organization’s attack surface into perspective. In this report, we’ll highlight five areas that we feel help to better frame the challenges faced in keeping the Internet a safe environment, all of which underline a need to broaden awareness of the potential risks involved to foster a more informed approach to cyber defense.”

(more available)
Added: February 6, 2019
image from 2019 SIEM Survey Report

2019 SIEM Survey Report

The 2019 SIEM Survey Report represents one of the most comprehensive surveys on SIEM to date, designed to explore the latest trends, key challenges, and solution preferences for SIEM.

(more available)
Added: February 6, 2019
image from Anatomy Of An Attack: Iranian Nation State Interdiction

Anatomy Of An Attack: Iranian Nation State Interdiction

This report offers deep insight into the threat actor known as Oilrig.

Added: February 6, 2019
image from 2018 eCommerce Holiday Season Data Recap

2018 eCommerce Holiday Season Data Recap

From the report, “As the dust settles after the 2018 holiday shopping season, online retailers and eCommerce businesses will be diving deep into the results to measure just how effectively their online promotional campaigns capitalized on the opportunity - and translated increased traffic into more revenue and improved conversion rates. Just what type of impact did the holiday season have on eCommerce brands in 2018? What days stood out amongst the pack when it came to traffic, orders, and conversion rates? Which verticals saw their KPIs rise the most? To uncover top holiday season eCommerce insights, Namogoo analyzed hundreds of millions of web sessions across regions, devices, and verticals.”

(more available)
Added: February 6, 2019
image from You've Been Phished, Again! Solution: Eliminate the Click-it Temptation

You've Been Phished, Again! Solution: Eliminate the Click-it Temptation

From the report, “In this SPIE, we shine a spotlight on the phishing prevention approaches of one start-up company, Area 1 Security; and one long-tenured cybersecurity vendor, IBM. Although complete elimination cannot be promised, each is taking steps that reduce the potential of their business clients (Area 1’s Horizon) and their clients’ clients (IBM Trusteer Rapport) from becoming victims. Secondarily, by removing the burden of phishing defense from employees and consumers, employees’ productivity is positively affected, and consumers’ trust in online activities is strengthened.”

(more available)
Added: February 5, 2019
image from BlueVector Threat Report Q1 2018

BlueVector Threat Report Q1 2018

From the report, “To put the relentlessness of attacks and the attackers perpetrating them into perspective, it has been reported that the global cybercrime economy generates an annual profit of $1.5 trillion or roughly the same as Russia’s GDP. To use an old cybersecurity adage, attackers only need to succeed once to compromise your network, defenders need to succeed every time. These facts and the events of Q1 2018 reinforce the reality that threat actors have no intention of scaling back their attacks. It is important not to be distracted by coverage given to one attack vector or class of attack – distraction has been a powerful tool in the arsenals of attackers for centuries… just think about why malware trojans are so named.”

(more available)
Added: February 5, 2019
image from Q1 2018 Quarterly Threat Report

Q1 2018 Quarterly Threat Report

This quarter saw a dramatic increase in attacks targeting consumer-grade routers, increasing 539% from Q4, 2017. The majority of hostile detections on the eSentire threat detection surface pertain to perimeter threats: Information Gathering, Intrusion Attempts, and Reputation Blocks. eSentire Threat Intelligence assesses with medium confidence that these detections originate, largely, from automated scanning and exploitation attempts. Threats beyond the perimeter, such as Malicious Code (+35%) and Phishing (+39%) both saw increases in the frst quarter of 2018.

(more available)
Added: February 5, 2019
image from Minerva Labs 2018 Year In Review: The Year Fileless Malware Became The Norm

Minerva Labs 2018 Year In Review: The Year Fileless Malware Became The Norm

By the end of this report, you’ll have a better understanding of today’s approaches to evading detection tools and the trajectory of evasion into the next year. This way, you’ll have a better sense regarding your endpoint security architecture and your plans for maintaining or improving its effectiveness.

(more available)
Added: February 5, 2019
image from State Of The Web 2017: Trust Hacking

State Of The Web 2017: Trust Hacking

For this report, Menlo Security’s researchers analyzed the top 100,000 domains as ranked by Alexa to understand the risks inherent in using the world’s most popular websites. We found widespread evidence that cybercriminals are successfully exploiting long-held measures of trust, such as a particular site’s reputation or the category in which the site is included, to avoid detection and increase the effectiveness of their attacks.

(more available)
Added: February 5, 2019
  • ««
  • «
  • 32
  • 33
  • 34
  • 35
  • 36
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 17, 2025 08:08 UTC (build b1d7be4)