Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from Industry Threat Report: Healthcare

Industry Threat Report: Healthcare

This report was produced with a goal of raising awareness and educating senior decision makers about the cybersecurity issues facing the healthcare industry.

(more available)
Added: October 26, 2018
image from Insider Threat Intelligence Report 2017

Insider Threat Intelligence Report 2017

This report is the second release of the Dtex Insider Threat Intelligence Report – an initiative started in 2015 to track, analyze, and share the impact of human behavior on enterprises of all sizes and industries.

(more available)
Added: October 26, 2018
image from Internet Organized Crime Threat Assessment 2017

Internet Organized Crime Threat Assessment 2017

This is the fourth annual presentation of the cybercrim threat landscape by Europol’s European Cybercrime Centre.

Added: October 26, 2018
image from Internet Security Report Quarter 1

Internet Security Report Quarter 1

Have you ever wondered what 0 types of cyber attacks affect small to midsize businesses (SMBs) and distributed enterprises (DEs)? Well, you’ve come to the right place.

(more available)
Added: October 26, 2018
image from Metamorfo Campaigns Targeting Brazilian Users

Metamorfo Campaigns Targeting Brazilian Users

This blog post takes a look at Metamorfo and how it is impacting Brazilian users, specifically, to install banking trojans.

(more available)
Added: October 26, 2018
image from Microsoft Security Intelligence Report Volume 22

Microsoft Security Intelligence Report Volume 22

This is the 22nd edition of the Microsoft Security Intelligence Report. In this report, they have organized data sets into two categories, cloud and endpoint. They are sharing data about a shorter time period, one quarter.

(more available)
Added: October 26, 2018
image from Phishing Confessions From Security Professionals

Phishing Confessions From Security Professionals

This report is the results of a survey conducted among security professionals to analyze their experiences with phishing.

Added: October 26, 2018
image from Qadars Banking Trojan: A Notoriously Sophisticated Crimware Trojan

Qadars Banking Trojan: A Notoriously Sophisticated Crimware Trojan

The Qadars Banking Trojan has been observed globally targeting well-known banks since 2013. The research in this white paper provides a detailed analysis of the banking trojan, discussing the obfuscation techniques, domain generation algorithm (DGA), communication protocols and data formatting, and social engineering techniques employed by the trojan.

(more available)
Added: October 26, 2018
image from Quarterly Threat Report Q2 2018

Quarterly Threat Report Q2 2018

This Quarterly report continues Rapid7’s excellent work of providing insight to the threats they have witnessed during the 2nd Quarter of 2018.

(more available)
Added: October 26, 2018
image from Ransomware: How Consumers And Businesses Value Their Data

Ransomware: How Consumers And Businesses Value Their Data

IBM fielded a US-based consumer and business research study to determine the value people place on data and their awareness and knowledge about ransomware. The results are alarming.

(more available)
Added: October 26, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report April 2016

SecureWorks Threat Intelligence Executive Monthly Report April 2016

This report from April 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 26, 2018
image from Securing The Enterprise's Cloud Workloads On Microsoft Azure

Securing The Enterprise's Cloud Workloads On Microsoft Azure

This paper seeks to help organizations understand that Microsoft Azure (Azure) has a lot more to offer than cost savings. Enterprises with the highest levels of cloud adoption, typically, not only completely re-architect their applications, but also take advantage of automation to streamline the entire development and deployment process. They adopt DevOps pipelines and use CI/CD (continuous integration and continuous delivery) tools with the objective of nimbly meeting customer and business needs.

(more available)
Added: October 26, 2018
image from SilverTerrier: The Next Evolution In Nigerian Cybercrime

SilverTerrier: The Next Evolution In Nigerian Cybercrime

With unique and specialized analysis, this paper discusses Nigerian cyber crime actors, their growth, collaboration, and the direction they are headed.

(more available)
Added: October 26, 2018
image from State of Malware

State of Malware

This report discusess malware attacks and data from the year 2016 and makes predictions for 2017.

Added: October 26, 2018
image from State Of The Endpoint 2017

State Of The Endpoint 2017

This report seeks to provide answers to many questions related to the failures of endpoint security that are occuring even though there has been a shift in technology and strategy.

(more available)
Added: October 26, 2018
image from State of the Internet Security 4th Quarter 2017

State of the Internet Security 4th Quarter 2017

This is Akamai’s State of The Internet Security report from the fourth quarter of 2017

Added: October 26, 2018
image from The 2017 Ransomware Survival Guide

The 2017 Ransomware Survival Guide

This guide offers help for surviving ransomware attacks.

Added: October 26, 2018
image from The ABC's Of Inline Security

The ABC's Of Inline Security

The goal of this book is to clarify the most frequently encountered concepts of inline security and be a resource as you develop your network security architecture. For each of the 20 terms included, they provide a simple definition, common use cases, and important considerations for deployment.

(more available)
Added: October 26, 2018
image from The Rise of Ransomware

The Rise of Ransomware

From the report, “We are pleased to present the findings of The Rise of Ransomware, sponsored by Carbonite, a report on how organizations are preparing for and dealing with ransomware infections. We surveyed 618 individuals in small to medium-sized organizations who have responsibility for containing ransomware infections within their organization.”

(more available)
Added: October 26, 2018
image from Threat Intelligence Executive Report 2018: Volume 2

Threat Intelligence Executive Report 2018: Volume 2

This Threat report details some early 2018 threats like ransomware, North Korean hacking, the leveraging of newly exposed vulns.

Added: October 26, 2018
image from Threat Intelligence: Tax Related Scams Where Motive Meets Opportunity

Threat Intelligence: Tax Related Scams Where Motive Meets Opportunity

Root9B’s Vice President of Threat Intelligence, Keith Smith, sat down to highlight the threat of tax related scams using compromised business email accounts. He also offers some proactive steps your business can take to prevent security breaches and protect sensitive information during this year’s tax season.

(more available)
Added: October 26, 2018
  • ««
  • «
  • 43
  • 44
  • 45
  • 46
  • 47
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 5, 2025 08:08 UTC (build b1d7be4)