Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from Peering Over The DAX 100 Threat Horizon

Peering Over The DAX 100 Threat Horizon

This report offers insight into the German DAX 100 Threat Horizon.

Added: November 29, 2018
image from Smartphones, Tablets, and Fraud: When Apathy Meets Security

Smartphones, Tablets, and Fraud: When Apathy Meets Security

Consumers rely on their mobile devices on an ever‐growing basis to keep them connected. Smartphones and tablets provide them with access to each other through email, messaging, and social media while also putting financial services and shopping in the palm of their hands. And each and every one of these activities holds value for criminals in search of account credentials and personally identifiable information (PII) to sell or misuse. Unfortunately, for all of the potential that mobile devices represent, the apathy of every mobile stakeholder is undermining the security of mobile devices and the accounts of their users. Protecting Android, iOS, and Windows mobile device users from fraud will require a concerted effort by all stakeholders to eliminate vulnerabilities, encourage security‐minded behaviors, and to leverage all the security benefits that mobile devices have to offer.

(more available)
Added: November 27, 2018
image from Know the game, not just the rules The changing face of cyber security

Know the game, not just the rules The changing face of cyber security

This paper seeks to prompt a discussion about how our mindset and approach to cyber security now needs to change. It proposes 10 areas where important challenges must be confronted; this evolution will also provide some structure for innovative and disruptive technologies that are beginning to come to market but don’t fit the mould of traditional security controls.

(more available)
Added: November 27, 2018
image from Closing The Gap On Breach Readiness

Closing The Gap On Breach Readiness

This e-book contains insights on breach readiness, response and resiliency based on in-depth interviews conducted with the Security for Business Innovation Council (SBIC). The SBIC is comprised of forward-thinking security executives from Global 1000 enterprises committed to advancing the state of information security worldwide by sharing insights from their real-world experience.

(more available)
Added: November 27, 2018
image from The Art Of War: Using Economics To Defeat Cyber Crime

The Art Of War: Using Economics To Defeat Cyber Crime

The ancient Chinese general Sun Tzu said “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” While it’s unrealistic to think we can win every battle against cyber criminals, Sun Tzu’s words have a lot to offer. The problem that every privacy and security team faces is how to defend on every possible front with finite resources and budget. And the simple answer is, you don’t have to.

(more available)
Added: November 24, 2018
image from New Malware Threats Demand Action From Healthcare Sector

New Malware Threats Demand Action From Healthcare Sector

This white paper examines challenges for healthcare organizations and presents how the key to effective endpoint and server protection lies in the ability to dynamically analyze behavior in order to recognize malicious software by its actions, not its appearance. Intelligent response at machine speed is required to prevent, contain and mitigate potential threats. Success in this mission results in a major benefit for providers and payers: the ability to keep IT systems operation so medical and non-medical personnel can stay focused on patient care.

(more available)
Added: November 24, 2018
image from Unseen Trheats, Imminent Losses: 2018 Midyear Security Roundup

Unseen Trheats, Imminent Losses: 2018 Midyear Security Roundup

In this midyear report, TrendMicro tracks the tendency of security risks to emerge from aspects of computing that are often overlooked and show how costly they can be especially for enterprises.

(more available)
Added: November 23, 2018
image from 2018 State of Cybersecurity in Small & Medium Size Businesses

2018 State of Cybersecurity in Small & Medium Size Businesses

Ponemon Institute is pleased to present the results of The 2018 State of Cybersecurity in Small and Medium Size Businesses sponsored by Keeper Security. The goal of this study is to track how small and medium size companies address the same threats faced by larger companies. This report features the findings from 2018 and 2017.

(more available)
Added: November 23, 2018
image from A New Era Of Network Attacks: 2018 EfficientIP Global DNS Threat Report

A New Era Of Network Attacks: 2018 EfficientIP Global DNS Threat Report

We live in a new era of network attacks. Increasing frequency and varieties, together with the latest regulations which have global impact, makes 2018 the most important year in recent times for public and private sector organizations.

(more available)
Added: November 23, 2018
image from SIEM For Beginners

SIEM For Beginners

Everything you wanted to know about log management but were afraid to ask.

Added: November 21, 2018
image from Economic Impact Of Cybercrime - No Slowing Down

Economic Impact Of Cybercrime - No Slowing Down

This report takes a deep look at the economics of Cybercrime.

Added: November 21, 2018
image from Prevention Is Better Than Cure: Business Security - The Journey Continues

Prevention Is Better Than Cure: Business Security - The Journey Continues

This year’s Risk:Value Report from NTT Security shows that there is still a lot of work to do. It crystallizes in one shocking statistic: one-third of companies would rather pay a hacker’s ransom than invest in information security. Many organizations are still stuck in a reactive mindset when it comes to security.

(more available)
Added: November 21, 2018
image from The Hunt For IOT

The Hunt For IOT

F5 Labs, in conjunction with our data partner Loryka, has been tracking “The Hunt for IoT” for two years. We have focused our hunt primarily around port 23 telnet brute force attacks—the “low-hanging fruit” method—as they are the simplest, most common way to compromise an IoT device. (Telnet was also the most prominent attack type when we started this research series.)

(more available)
Added: November 21, 2018
image from 2019 Global ICS & IIoT Risk Report

2019 Global ICS & IIoT Risk Report

This report provides a “data-driven analysis of vulnerabilities in our industrial and critical infrastructure.”

Added: November 21, 2018
image from Ransomware Attacks Surge And Ransom Demands rise

Ransomware Attacks Surge And Ransom Demands rise

In recent months, Beazley Breach Response (BBR) Services has seen the number of reported ransomware incidents climb again. The varieties of ransomware and the differing technical abilities of the criminals make effective response especially challenging. Breach response services, such as forensics and legal counsel, are often necessary in ransomware attacks to determine the attack vector and level of access obtained by the attacker. If the attacker accessed or exfiltrated personally identifiable information or protected health information, notification to affected individuals may be required by law.

(more available)
Added: November 21, 2018
image from Cloud Native Security Report: Watching The Honeypots

Cloud Native Security Report: Watching The Honeypots

This report is the first in a bi-annual series that examines risks and attacks in the cloud native computing ecosystem. The next report will be released in the first half of 2019.

(more available)
Added: November 20, 2018
image from State of Cybersecurity Report 2018

State of Cybersecurity Report 2018

The first edition of the “State of Cybersecurity report” was well received by customers, industry analysts and cybersecurity professionals. The 2018 edition of the Report maintains the same unique structure to build on the first edition’s ethos and bring in new viewpoints and findings. The rest of this section is reproduced from last year’s report for the benefit of first-time readers.

(more available)
Added: November 20, 2018
image from Small And Mighty

Small And Mighty

This special report provides a deep dive into the cybersecurity practices of small and midmarket businesses.

Added: November 20, 2018
image from 2019 Forcepoint Cybersecurity Predictions Report

2019 Forcepoint Cybersecurity Predictions Report

In the 2019 Forcepoint Cybersecurity Predictions Report, we explore the impact of businesses putting their trust in cloud providers to protect their data, the impact of end-user trust in those securing personal biometric data, the cascading of trust into the supply chain to protect any critical data in their custodianship, and trust in algorithms and analytics successfully piloting automobiles and alerting security professionals to potential data loss incidents.

(more available)
Added: November 20, 2018
image from Email and Internet Voting: The Overlooked Threat To Election Security

Email and Internet Voting: The Overlooked Threat To Election Security

This report reviews the research that has been conducted by the federal government concluding that secure online voting is not yet feasible. We examine the insoluble security problems that are inherent to casting ballots online, including server penetration attacks, client-device malware, attacks to emailed and faxed ballots in transit, denial-of-service attacks, disruption attacks and the challenge to reliably authenticate voters.

(more available)
Added: November 20, 2018
image from 2017 Threat Report

2017 Threat Report

This report contains an overview of the threat trends and malware families Cylance’s customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.

(more available)
Added: November 20, 2018
  • ««
  • «
  • 38
  • 39
  • 40
  • 41
  • 42
  • »
  • »»
© Cyentia Institute 2025
Library updated: August 16, 2025 20:08 UTC (build b1d7be4)