Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from BluVector Threat Report Q3 2018

BluVector Threat Report Q3 2018

From the report, “Trojans are still winning. Out of the 12 Threat Reports over Q3, six were trojans. While the results from the Threat Report quarterly from Q2 2018 were pretty even in terms of the volume of threats being spread out between APTs, ransomware and trojans, Q3 2018 showcased the depth and breadth of trojan diversity and malicious innovation.”

(more available)
Added: February 5, 2019
image from The Rising Threat Of Fileless Malware

The Rising Threat Of Fileless Malware

From the report, “Threat actors are increasing their use of fileless malware for one simple reason: most organizations aren’t prepared to detect it. Education is the first step in determining what threat these new attacks pose and what IT and security teams can do to detect and stop fileless malware attacks. READ THIS PAPER to understand how fileless malware is quickly evolving to avoid detection, the techniques currently employed to prevent infection and the strategies security teams need to consider when determining how to stop future fileless breaches.”

(more available)
Added: February 5, 2019
image from Assault On Healthcare

Assault On Healthcare

This report offers some insight into Health Information Technology and the cybersecurity issues that plague that area.

Added: February 5, 2019
image from The Top 5 Retail Point-of-Sale Cyberthreats

The Top 5 Retail Point-of-Sale Cyberthreats

On an ongoing basis, Visa tracks global breach trends affecting retailers and other merchants. In 2017, research confirmed that the U.S. and Europe were the top two regions for payment data breaches. This report offers insight specific to Visa and their unique due diligence in the cyber threat universe.

(more available)
Added: January 31, 2019
image from UK Active Cyber Defence

UK Active Cyber Defence

The key findings of this report are; 1) Active Cyber defence has significant potential in helping improve UK national cybersecurity 2) Active Cyber defence can play a powerful role in shaping the cybersecurity marketplace and furthering the interests of UK internet users and consumers 3) Active Cyber defense is a potentially useful model for export to like-minded countries 4) Active Cyber defense may constitute an emergent public good 5)Active cyber defense is not perfect, nor should we expect it to be.

(more available)
Added: January 31, 2019
image from The Future Of Cybercrime & Security

The Future Of Cybercrime & Security

This report offers insight into both Cybercrime and Cybersecurity. It discusses IoT botnets and DDoS, Rising Ransomware, File-less Attacks, and on the security side, it discusses Talent 7 Budget Shortage, Government opinions, Pervasive Threat Intelligence and Market Consolidation.

(more available)
Added: January 31, 2019
image from 2018 Webroot Threat Report

2018 Webroot Threat Report

The 2018 edition of Webroot’s annual Threat Report shares a glimpse into their discoveries and analysis of threat activity throughout 2017, to equip you with the knowledge you need to overcome modern cybercrime.

(more available)
Added: January 31, 2019
image from 2018 Webroot Threat Report: Mid-Year Update

2018 Webroot Threat Report: Mid-Year Update

The Webroot Threat Research Team has analyzed the data from our customer base during the first half of 2018. This mid-year threat report not only shows the stats, but also tells the story behind the headlines. The bottom line from our observations: it has never been more important to implement a robust, effective, multi-layered and continuously evolving security approach to keep valuable data and systems secure.

(more available)
Added: January 31, 2019
image from The Path To Digital Transformation

The Path To Digital Transformation

This report offers insight into controlling friction while tackling Cybercrime in Financial Services.

Added: January 30, 2019
image from 2017 APAC Cybercrime Report

2017 APAC Cybercrime Report

This report offers insight into the Asia-Pacific region and the cybercrimes that are growing and continuing to occur in the area.

(more available)
Added: January 30, 2019
image from 2017 Cybercrime Report: Travel and Entertainment Industry DeepDive

2017 Cybercrime Report: Travel and Entertainment Industry DeepDive

This report from ThreatMetrix compiles their 2017 Cybercrime report in such a way that they offer unique insight into the travel and entertainment industry and how cybercrime is impacting that arena.

(more available)
Added: January 30, 2019
image from Cybercrime Report: Gaming And Betting

Cybercrime Report: Gaming And Betting

Using intelligence from the ThreatMetrix Digital Identity Network, gaming and gambling companies can accurately differentiate between responsible users and problem gamblers / fraudsters in real time.

(more available)
Added: January 30, 2019
image from Q1 2016 Cybercrime Report

Q1 2016 Cybercrime Report

The ThreatMetrix Cybercrime Report: Q1 2016 is based on actual cybercrime attacks from January 2016 – March 2016 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Creating Value and Managing Risk in the World of PSD2

Creating Value and Managing Risk in the World of PSD2

Creating)Value)and)Managing)Risk)in)the)World)of)PSD2,“a"white"paper"developed"by"Aite"Group” in close cooperation with ThreatMetrix, provides insight into the key provisions of the revised & Payment(Service(Directive (PSD2) legislation and its impact on market practices.

(more available)
Added: January 30, 2019
image from APT Group Profile: OilRig

APT Group Profile: OilRig

This report offers insight into OilRig an Iranian-linked Advanced Persistent Threat. It discusses who they are and why you should care.

(more available)
Added: January 25, 2019
image from The Q3 2017 Mobile Threat Landscape Report

The Q3 2017 Mobile Threat Landscape Report

The third quarter of 2017 saw an increase in the number of malicious apps flooding the mobile marketplace, the continued issues of imitation and trojan apps in official app stores, and the emergence of the WireX mobile botnet. In this report, they’ll give an overview of these mobile threats, as well as emerging trends they anticipate will be prevalent in Q4 and beyond to help you protect yourself and your customers.

(more available)
Added: January 25, 2019
image from The Q4 2017 Mobile Threat Landscape Report

The Q4 2017 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. The fourth quarter of 2017 showed a 37 percent decrease in blocklisted apps over Q3. Key threat trends include brand imitation, phishing, malware, and bankbot attacks on cryptocurrency users.

(more available)
Added: January 25, 2019
image from The Q3 2018 Mobile Threat Landscape Report

The Q3 2018 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. Q3 showed a nearly 220 percent increase in blocklisted apps over Q2. Due to a surge in total apps observed, the percentage of blocklisted apps dropped from 4% in Q2 to 3% in Q3.

(more available)
Added: January 25, 2019
image from The Q2 2018 Mobile Threat Landscape Report

The Q2 2018 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. Q2 showed a nearly 57 percent increase in blocklisted apps over Q1. Key threat trends include brand imitation, phishing, malware, malvertising scams crossing into the mobile realm, targetted attacks against MyEtherWallet, and the misuse of location data by major mobile providers.

(more available)
Added: January 25, 2019
image from The Q2 2017 Mobile Threat Landscape Report

The Q2 2017 Mobile Threat Landscape Report

In this report, we’ll give an overview of the recent mobile threats RiskIQ detected in Q2 of 2017, as well as emerging trends we anticipate will be prevalent in Q3 and beyond to help you protect yourself and your customers.

(more available)
Added: January 25, 2019
image from The Q1 2018 Mobile Threat Landscape Report

The Q1 2018 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analaysis on threat trends in the mobile application space. The first quarter of 2018 showed a 43 percent decrease in blocklisted apps over Q4. Key threat trends include brand imitation, phishing, malware. A spike in apps targeting cryptocurrency and high-profile threats from nation-state actors.

(more available)
Added: January 25, 2019
  • ««
  • «
  • 33
  • 34
  • 35
  • 36
  • 37
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 17, 2025 16:08 UTC (build b1d7be4)