Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from The SpyRATs of OceanLotus

The SpyRATs of OceanLotus

This paper takes a look at several bespoke backdoors deployed by OceanLotus Group, as well as evidence of the threat actor using obfuscated CobaltStrik Beacon payloads to perform C2.

(more available)
Added: December 29, 2018
image from Predictive Malware Response Test

Predictive Malware Response Test

SE Labs tested a product from Cylance and sought to discover its weaknesses.

Added: December 29, 2018
image from McAfee Labs Threats Report - December 2018

McAfee Labs Threats Report - December 2018

This report provides insight into the top stories from the third quarter of 2018.

Added: December 29, 2018
image from Operation Sharpshooter

Operation Sharpshooter

This report takes a look at a new global campaign targeting nuclear, defense, energy, and financial companies.

Added: December 29, 2018
image from Endpoint Security Isn't Dead - It's Just Getting Smarter

Endpoint Security Isn't Dead - It's Just Getting Smarter

This report details a new Cylance survey of iTnews readers and provides insight into the state of endpoint security.

Added: December 29, 2018
image from 2019 Threats Predictions

2019 Threats Predictions

This infographic provides a summarized list of the points made in McAfee’s 2019 threat predictions blog post.

Added: December 29, 2018
image from Reinventing Cybersecurity Prevention With Deep Learning

Reinventing Cybersecurity Prevention With Deep Learning

In this whitepaper they cover the different defense technologies used over time, how different attacks vectors influenced this evolution, how the industry adopted different approaches over time, and why the prevention approach has returned and why it matters.

(more available)
Added: December 29, 2018
image from 2017 Threat Report Discussion Guide

2017 Threat Report Discussion Guide

The Cylance 2017 Threat Report offers valuable analysis on the current state of cybersecurity. The information provided in the report is unavailable anywhere else. This Cylance® study includes research and information drawn from internal data and feedback provided by Cylance customers. The report offers considerable insights into recent threat trends and related security issues.

(more available)
Added: December 29, 2018
image from Expanding Machine Learning Applications on the Endpoint

Expanding Machine Learning Applications on the Endpoint

This paper discusses one possible avenue for improving EDR which is the broader adoption of machine learning techniques.

Added: December 29, 2018
image from The Need For Speed

The Need For Speed

This paper seeks to provide a new approach to cyber security that enables IT operations and incident response teams to move faster and act smarter.

(more available)
Added: December 29, 2018
image from Automate The Hunt

Automate The Hunt

This paper provides insight into the tools an IT security pro needs to rapidly hunt, find and investigate dynamic threat indicators.

(more available)
Added: December 29, 2018
image from 2018 Endpoint Security Survey

2018 Endpoint Security Survey

This paper exerts that there exists very little data on whether companies are winning the war against cyber crime. It seeks to answer several questions with this survey of 270 IT security professionals in North America.

(more available)
Added: December 29, 2018
image from Endpoint Security Buyer's Guide

Endpoint Security Buyer's Guide

This guide is designed to help enterprises endpoint security solutions.

Added: December 29, 2018
image from McAfee Labs Threats Report: September 2018

McAfee Labs Threats Report: September 2018

In this edition, we highlight the notable investigative research and trends in threats statistics gathered by the McAfee Advanced Threat Research and McAfee Labs teams in Q2 of 2018. Cybercriminals continue to follow the money. Although this statement is familiar, our latest Threats Report clearly shows the migration from certain older attacks to new threat vectors as they become more profitable. Just as in Q1, we see the popularity of cryptocurrency mining continue to rise. In this report we detail recent findings from three McAfee Labs analyses that appeared in Q2. You can read summaries of each on pages 5-7. One area of investigation by our research teams is in digital assistants. In Q2 we analyzed a vulnerability in Microsoft’s Cortana. This flaw allowed an attacker to log into a locked Windows device and execute code. Following our vulnerability disclosure policy, we communicated our findings to Microsoft; the analysis resulted in CVE-2018-8140. We also examined the world of cryptocurrency attacks with an in-depth view of blockchain technology. Our report detailed many of the vulnerabilities being exploited by threat actors looking for a quick return on their investment.

(more available)
Added: December 14, 2018
image from The Challenge Of Building The Right Security Automation Architecture

The Challenge Of Building The Right Security Automation Architecture

Security automation architecture can improve organizations’ security posture by augmenting or replacing human intervention in the identification and containment of cyber exploits or breaches through the use of such technologies as artificial intelligence, machine learning, analytics and orchestration. Sponsored by Juniper, the purpose of this research is to understand the challenges companies face when deciding how, when and where to implement the right automation capabilities in order to improve productivity, reduce costs, scale to support cloud deployments and ultimately strengthen the security posture of the business. Ponemon Institute surveyed 1,859 IT and IT security practitioners in Germany, France, the United Kingdom and the United States. All participants in this research are in organizations that presently deploy or plan to deploy security automation tools or applications and are familiar with their organizations use of security automation and have some responsibility for evaluating and/or selecting security automation technologies and vendors.

(more available)
Added: December 14, 2018
image from ERP Applications Under Fire

ERP Applications Under Fire

With hundreds of thousands of implementations across the globe, Enterprise Resource Planning (ERP) applications are supporting the most critical business processes for the biggest organizations in the world. This report is the result of joint research performed by Digital Shadows and Onapsis, aimed to provide insights into how the threat landscape has been evolving over time for ERP applications. We have concentrated our efforts on the two most widely-adopted solutions across the large enterprise segment, SAP and Oracle E-Business Suite, focusing on the risks and threats organizations should care about.

(more available)
Added: December 14, 2018
image from Services Cyber Intrusion Casebook 2018

Services Cyber Intrusion Casebook 2018

In 2018, our global Services team focused resources, intelligence and technology to detect and disrupt future attacks. We’ve analyzed the massive amounts of security data collected from every engagement this year and we’ve gained new insights into what challenges organizations face and how they can better prepare for the next wave of threats. This casebook presents some of the findings and recommendations we’ve made in key engagements across a representative sample of the work we performed last year. We dig into: Emerging and notable trends Examples of ill-prepared organizations and the devastating effects of the breaches they suffered Essential recommendations to prevent companies from becoming another statistic of poor security planning and execution This casebook also underscores the expertise of our team and the important work we’re doing at CrowdStrike® Services. As you read the case studies, you will see that CrowdStrike stands shoulder-to-shoulder with our clients as we work together to stop adversaries and repair damage. But this casebook is not just for CrowdStrike clients — we want everyone to become better prepared to overcome their adversaries in 2019.

(more available)
Added: December 14, 2018
image from Cobalt Group

Cobalt Group

Fidelis Threat Research analysts have discovered a new version of ThreadKit, malware notorious for it’s use by the cybercrime organization known as Cobalt Group. This report will provide analysis of a recent campaign, seen October 30th , utilizing the Cobalt Group malware frameworks. Cobalt Group was believed to have suffered a hit earlier this year[1] with the reported arrest of one of its members. After the arrest, the campaigns appear to have slowed significantly however despite this, there has been continued development concerning the groups malware framework.

(more available)
Added: December 14, 2018
image from State of the Internet 2018

State of the Internet 2018

In this issue of the State of The Internet/Security report, they take a look back at some of the events they were a part of and the research the Akamai teams produced in the past 12 months. They also examine a few of the stories that formed the background in security this year.

(more available)
Added: December 14, 2018
image from The Domain Tools Report: Spring 2017

The Domain Tools Report: Spring 2017

In the DomainTools Reports, we explore various “hotspots” of malicious or abusive activity across the Internet. To date, we have analyzed such varied markers as top level domain (TLD), Whois privacy provider, domain age, patterns of registrant behavior, and more. In each case, we found patterns across our database of over 300 million (315M+ as of this writing) active domains worldwide; these patterns helped us pinpoint nefarious activity, at a large scale, in ways that are similar to methodologies used by security analysts and threat hunters at smaller scales to expose threat actor infrastructure.

(more available)
Added: December 5, 2018
image from 2018 Cybersecurity Report Card

2018 Cybersecurity Report Card

This paper outlines the results of the DomainTools second annual Cybersecurity Report Card Survey. More than 500 security professionals from companies ranging in size, industry and geography were surveyed about their security posture and asked to grade the overall health of their programs.

(more available)
Added: December 5, 2018
  • ««
  • «
  • 36
  • 37
  • 38
  • 39
  • 40
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 17, 2025 20:08 UTC (build b1d7be4)