Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from 2016 Threat Predictions

2016 Threat Predictions

This report deals with predicting the cyber threat landscape for 2016 through 2020. It does this by looking back 5 years, and analyzing the past, and also talking to folks who make predictions for the 5 years in the future.

(more available)
Added: October 23, 2018
image from 2017 Hacked Website Report

2017 Hacked Website Report

This is an annual report that discusses the latest malware and hacking trends in compromised websites.

Added: October 23, 2018
image from 2017 Midyear Security Roundup: The Cost Of Compromise

2017 Midyear Security Roundup: The Cost Of Compromise

This report reviews the cyber security threats that occurred in the first half of 2017.

Added: October 23, 2018
image from 2017 Ransomware Defense Survey

2017 Ransomware Defense Survey

Some statistics that jump out from this report, 76% of respondents see ransomware as significant business threat, 52% rate their organizations at above average or superior when it comes to detecting or blocking ransomware before it locks or encrypts data in their systems, 57% say they are more likely to be a ransomware target in 2017.

(more available)
Added: October 23, 2018
image from 2018 Cloud Security Report

2018 Cloud Security Report

Offering insight into a variety of issues related to cloud security, this report discusses several key issues, including, the biggest threats to cloud security, legacy security tools that do not work in the cloud, and the growth of cloud security budgets.

(more available)
Added: October 23, 2018
image from 2018 Security Report

2018 Security Report

This report takes a look at 5 key trends that are shaping IT security practices, with findings that provide insight into customer challenges, threat actor behavior, and the global threat landscape.

(more available)
Added: October 23, 2018
image from 2018 Sonicwall Cyber Threat Report

2018 Sonicwall Cyber Threat Report

Subtitled, “Threat Intelligence, Industry Analysis, and Cybersecurity Guidance, for the Global Cyber Arms Race,” this report seeks to fully disclose the research done by the authors, in order to aid all of those involved in the cybersecurity realm.

(more available)
Added: October 23, 2018
image from Achieving Cyber Resilience

Achieving Cyber Resilience

This paper lays out the appropriate steps companies should take to protect their business from cyber attacks and ransomware.

Added: October 23, 2018
image from Annual Ransomware Report 2017

Annual Ransomware Report 2017

Druva conducted its annual ransomware survey to better understand what impact ransomware has had on organizations, how they have responded to breaches, and what their outlook is regarding the future of these types of malware attacks.

(more available)
Added: October 23, 2018
image from Balancing Humans And Machines

Balancing Humans And Machines

Aaron Higbee, Co-founder and CTO, PhishMe, (now CoFense) discusses the future of phishing defence and asks which side of the fence the future of defence against phishing attacks lies: human or machine?

(more available)
Added: October 23, 2018
image from Best Practices For Digital Data Security: Cybersecurity Recommendations For The Business Traveler

Best Practices For Digital Data Security: Cybersecurity Recommendations For The Business Traveler

This whitepaper takes a look at the cybersecurity considerations that a business traveler should keep in mind while on the move.

(more available)
Added: October 23, 2018
image from Breaking Down The Complexity Of Retail Security

Breaking Down The Complexity Of Retail Security

This report takes a look at retail security. It discusses the challenges, and options available to help solve some of the problems involved in defending retail markets.

(more available)
Added: October 23, 2018
image from Callisto Group

Callisto Group

This White Paper is a report regarding The Callisto Group. The Callisto Group is an advanced threat actor whose known targets include military personnel, government officials, think tanks, and journalists in Europe and the South Caucasus. Their primary interest appears to be gathering intelligence related to foreign and security policy in the Eastern Europe and South Caucasus regions.

(more available)
Added: October 23, 2018
image from Cloud Hard 2018 Security With A Vengeance

Cloud Hard 2018 Security With A Vengeance

In partnership with the Information Security Community, Bitglass surveyed over 570 cybersecurity and IT professionals to learn how organizations are approaching cloud security. Read on to learn about the state of traditional tools, security measures IT leaders are taking, and cloud priorities for 2018.

(more available)
Added: October 23, 2018
image from Crossing The Last Mile Of IoT Security Cyber Risk

Crossing The Last Mile Of IoT Security Cyber Risk

This paper seeks to provide understanding and aid with meeting the unique information demands that the Internet of Things requires.

(more available)
Added: October 23, 2018
image from Cyber Threatscape Report 2018

Cyber Threatscape Report 2018

This report provides detailed information about Iranian Threat, Extended Supply Chain Threats, Critical Infrastructure, Advanced Persistent Threats, Miner Malware, and Ransomware.

(more available)
Added: October 23, 2018
image from DDoS Glossary Of Terms

DDoS Glossary Of Terms

This Distributed Denial of Service (DDoS) attack glossary is intended to provide a high level overview of the various DDoS attack types and typical DDoS attack characteristics.

(more available)
Added: October 23, 2018
image from DDoS Threat Report Q4 2017

DDoS Threat Report Q4 2017

This report takes a look at the DDoS threats that occurred in the fourth quarter of 2017.

Added: October 23, 2018
image from Definitive Guide To Ransomware

Definitive Guide To Ransomware

In this whitepaper, they explore the growing threat of ransomware and what you can do to keep your organization secure.

(more available)
Added: October 23, 2018
image from Digital Malware: Impact On The E-Commerce Market

Digital Malware: Impact On The E-Commerce Market

This report will outline benchmarks for the state of the Digital Malware problem, including the current infection rate of consumer machines, the rate of infected online sessions, causes for fluctuation, and guidance on how online businesses can protect their customer journey and win back lost revenue.

(more available)
Added: October 23, 2018
image from Global Cloud Data Security Report Q1 2015

Global Cloud Data Security Report Q1 2015

From the report, “CipherCloud enables organizations to embrace cloud applications by protecting critical data going into the cloud. This approach has been adopted by millions of users in multiple industries, such as healthcare, banking and finance, telecommunications and government, across the globe. This report gathers insight from CipherCloud’s installed base and provides analysis on how enterprises approach cloud security and data protection.”

(more available)
Added: October 23, 2018
  • ««
  • «
  • 48
  • 49
  • 50
  • 51
  • 52
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 12:08 UTC (build b1d7be4)