Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from Global Threat Intelligence Report

Global Threat Intelligence Report

From the Report, “This year’s GTIR utilizes the Center for Internet Security’s Critical Security Controls to identify controls that can be effective at each stage of the Lockheed Martin Cyber Kill Chain® (CKC) . By ensuring that controls exists for each stage of the CKC, organizations can increase their ability to disrupt attacks . We’ve dedicated an entire section and case study to a Practical Application of Security Controls to the Cyber Kill Chain.”

(more available)
Added: October 25, 2018
image from H1 2017 Cybersecurity Insights

H1 2017 Cybersecurity Insights

This report is focussed on providing insights based on events in 2017.

Added: October 25, 2018
image from Incapsula Survey: What DDoS Attacks Really Cost Businesses

Incapsula Survey: What DDoS Attacks Really Cost Businesses

To determine real-world costs posed by DDoS attacks in 2014, Incapsula commissioned a survey to gauge real organizations’ experiences with them. By compiling these statistics, they hoped to provide some perspective. Additionally, they wanted to underscore the importance of investing in a truly impenetrable mitigation solution.

(more available)
Added: October 25, 2018
image from Incident Report: In The Nick Of Time

Incident Report: In The Nick Of Time

This short report analyzes a specific threat incident.

Added: October 25, 2018
image from Investigation: WannaCry Cyber Attack And The NHS

Investigation: WannaCry Cyber Attack And The NHS

This report, out of Great Britain, focuses on the WannaCry Cyber Attack and what they learned in their investigation.

Added: October 25, 2018
image from IT Security at SMBs: 2017 Benchmarking Survey

IT Security at SMBs: 2017 Benchmarking Survey

This report presents the results of an in-depth primary market research survey of cyber security decision-makers in small to mid-sized businesses in the United States, conducted during August and September 2017. The goal of their research was to understand how SMBs, undertake decision-making in the context of their internet security, how they evaluate security solutions, and their budgetary concerns.

(more available)
Added: October 25, 2018
image from M-Trends 2018

M-Trends 2018

In this report they look at incidents that occurred between October 2016 and September 2017.

Added: October 25, 2018
image from Malware Review 2018

Malware Review 2018

This report takes a look back at 2017 and a look forward to 2018. It focuses specifically on malware attacks.

(more available)
Added: October 25, 2018
image from Minerva's 2016 Year In Review

Minerva's 2016 Year In Review

Released in 2017, this report details the cyberthreats that Minerva dealt with in 2016.

Added: October 25, 2018
image from Protecting Against Tomorrow's Malware Attacks Today

Protecting Against Tomorrow's Malware Attacks Today

This article from the UK discusses ways that organizations can protect themselves from future Malware attacks.

Added: October 25, 2018
image from Quarterly Threat Summary Q3 2016

Quarterly Threat Summary Q3 2016

This Quarterly report offers key takeaways from the third Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 25, 2018
image from Ransomware and Businesses 2016

Ransomware and Businesses 2016

This report from Symantec gives a variety of information about ransomware. It gives an overview, discusses the factors driving the growth and persistence of ransomware, infection vectors, platforms affected, the major ransomware families and finally, how businesses are going to be impacted.

(more available)
Added: October 25, 2018
image from Ransomware: Past, Present and Future

Ransomware: Past, Present and Future

This paper details the history and abilities of Ransomware, and where it is headed in the coming years.

Added: October 25, 2018
image from SANS Survey on Security Optimization

SANS Survey on Security Optimization

This report discusses the proper workflows in Security Optimization.

Added: October 25, 2018
image from Securing Operational Technology: How Vulnerable Is Our Critical National Infrastructure

Securing Operational Technology: How Vulnerable Is Our Critical National Infrastructure

This paper looks at utilitiy providers and the cybersecurity threats that attack them.

Added: October 25, 2018
image from Securing The Enterprise's Cloud Assets On Amazon Web Services

Securing The Enterprise's Cloud Assets On Amazon Web Services

This report provides helpful advice on how to secure Cloud Assets on Amazon’s Web Services.

Added: October 25, 2018
image from Security In A Remote Access World

Security In A Remote Access World

This report looks at six trends that IT execs need to adress now.

Added: October 25, 2018
image from Security Intelligence Report Volume 21

Security Intelligence Report Volume 21

This report focuses on software vulnerabilities, software vulnerability exploits, malware, and unwanted software. It is the hope that readers find the data, insights, and guidance provided in this report useful in helping them protect their organizations, software, and users.

(more available)
Added: October 25, 2018
image from SilverTerrier: Rise Of Nigerian Business Email Compromise

SilverTerrier: Rise Of Nigerian Business Email Compromise

With unique and specialized analysis, this paper discusses Nigerian cyber crime actors, their growth, collaboration, and the direction they are headed.

(more available)
Added: October 25, 2018
image from State of the Internet - Security Q4 2016 report

State of the Internet - Security Q4 2016 report

Contributors to this paper include security professionals, including the Security Intelligence Response Team (SIRT), the Threat Research Unit, Information Security, and the Custom Analytics group.

(more available)
Added: October 25, 2018
image from Super Antivirus 2018: A Shady App Many Are Downloading On Google Play

Super Antivirus 2018: A Shady App Many Are Downloading On Google Play

This report provides an inside look at a threat being downloaded on Google Play.

Added: October 25, 2018
  • ««
  • «
  • 45
  • 46
  • 47
  • 48
  • 49
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 5, 2025 00:08 UTC (build b1d7be4)