Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from Internet Security Threat Report Volume 23

Internet Security Threat Report Volume 23

This paper explores threats like coin-mining attcks, spike in software supply-chain attacks, the ransomware business, the drop in zero days, and the rise in mobile malware.

(more available)
Added: October 20, 2018
image from McAfee Labs Threats Report June 2018 Infographic

McAfee Labs Threats Report June 2018 Infographic

This is the infographic based on the threat report of the same name.

Added: October 20, 2018
image from Mobile Phishing Report 2018

Mobile Phishing Report 2018

This whitepaper looks at the evolution of mobile phishing - examining why and how people get phished. It explores the prevalence and severity of enterprise phishing techniques, providing actionable advice for how best to protect your mobile device fleet.

(more available)
Added: October 20, 2018
image from Mobile Security Report: 2017 Spotlight Report

Mobile Security Report: 2017 Spotlight Report

This mobile security report provides insights into the events of 2017.

Added: October 20, 2018
image from Prepare For The Growing Threats Of Mobile Security

Prepare For The Growing Threats Of Mobile Security

This review of the events of 2016, seeks to offer insight into the future of 2017.

Added: October 20, 2018
image from Quarterly Threat Report Q2 2018

Quarterly Threat Report Q2 2018

A review of the threat trends from the second quarter of 2018 as seen via ProofPoint’s detection network.

Added: October 20, 2018
image from Ransomware As A Service (RaaS): Deconstructing Philadelphia

Ransomware As A Service (RaaS): Deconstructing Philadelphia

This report provides a thorough analysis of Philadelphia, a a chilling example of ransomware as a service.

Added: October 20, 2018
image from Ransomware Response:Ideal vs. Reality

Ransomware Response:Ideal vs. Reality

From the Report, “This newsletter introduces the latest ransomware trends and best practices for ransomware response using the AhnLab MDS (Malware Defense System). "

(more available)
Added: October 20, 2018
image from Ransomware: Many Victims Few Solutions Infographic

Ransomware: Many Victims Few Solutions Infographic

This infographic takes a look at Ransomware and provides a brief overview of discusses some solutions.

Added: October 20, 2018
image from Secure Mobile Development Best Practices

Secure Mobile Development Best Practices

This guide gives specific recommendations to use during your development process. The descriptions of attacks and security recommendations in this report are not exhaustive or perfect, but you will get practical advice that you can use to make your apps more secure.

(more available)
Added: October 20, 2018
image from State of the Internet - Security Q1 2016 report

State of the Internet - Security Q1 2016 report

Get detailed cloud security insights about DDoS and web application attack trends observed across the Akamai Intelligent Platform™ for Q1 2016. Highlights include: 1) A 23% increase in DDoS attacks and a 26% increase in web application attacks, compared with Q4 2015, setting new records for the number of attacks in the quarter 2) The rise in repeat DDoS attacks, with an average of 29 attacks per targeted customer – including one customer who was targeted 283 times 3) The continued rise in multi-vectored attacks (56% of all DDoS attacks mitigated in Q1 2016), making mitigation more difficult

(more available)
Added: October 20, 2018
image from Swearing Trojan Overview

Swearing Trojan Overview

This is an overview of the Swearing Trojan infecting mobile banking.

Added: October 20, 2018
image from The 2017 Global Threat Landscape Report

The 2017 Global Threat Landscape Report

“This report is based exclusively on information collected via a wide range of security services within GravityZone: Security for Virtualized Environments, Security for Endpoints, Security for Mobile and Security for Exchange, consumer-oriented products such as Bitdefender Antivirus, Bitdefender Internet Security or Bitdefender Total Security, as well as from Bitdefender BOX, the innovative solution for protecting devices in the IoT space.”

(more available)
Added: October 20, 2018
image from The Criminal Justice Information Services Compliance For Mobile Devices

The Criminal Justice Information Services Compliance For Mobile Devices

This is a guide to the Criminal Justice Information Services Compliance For Mobile Devices.

Added: October 20, 2018
image from The Future Of Political Warfare: Russia, The West, And The Coming Age Of Digital Competition

The Future Of Political Warfare: Russia, The West, And The Coming Age Of Digital Competition

This paper outlines the current state of play in political warfare, identifies emerging threats, and proposes potential policy responses. It argues for greater information sharing mechanisms between trans-Atlantic governments and the private sector, greater information security and transparency, and greater investments in research and development on AI and computational propaganda. As authoritarian regimes seek to undermine democratic institutions, Western societies must harness their current— though fleeting—competitive advantage in technology to prepare for the next great leap forward in political warfare.

(more available)
Added: October 20, 2018
image from The Pressured World Of A Security Pro

The Pressured World Of A Security Pro

This is an infographic summary based on the 2017 Security Pressures report.

Added: October 20, 2018
image from The Ransomware Economy

The Ransomware Economy

This paper discusses the How and Why the Dark Web Marketplace for Ransomware Is Growing at a Rate of More Than 2,500% Per Year

(more available)
Added: October 20, 2018
image from VIGOR: Interactive Visual Exploration of Graph Query Results

VIGOR: Interactive Visual Exploration of Graph Query Results

This research takes a look at mining visual graphs and analyzes the value of that activity.

Added: October 20, 2018
image from 2016 Mobile Security Report

2016 Mobile Security Report

From the report, “We present this report, gleaned from our database of mobile security intelligence, to help IT and security pros make informed decisions about managing and securing mobile devices, mobile apps, and their enterprises’ mobile ecosystem.”

(more available)
Added: October 19, 2018
image from 2017 Web Application Threat Trend Report

2017 Web Application Threat Trend Report

Readers are encouraged to use this report to get a better understanding of the current threat landscape, including trends specific to different contexts like region, time of day, industry, and more, in order to better fine-tune defenses for meeting the security needs of their unique environments.

(more available)
Added: October 19, 2018
image from 4th Annual State of Application Security Report (2015 Mid-Year Report)

4th Annual State of Application Security Report (2015 Mid-Year Report)

Arxan and iThreat Cyber Group (ICG) analyzed data collected by ICG over the past 3.5 years that looked at the distribution of pirated software and digital assets on the Dark Web (i.e., the portion of content on the World Wide Web that is not indexed by standard search engines) and indexed sites that are focused on distributing pirated releases.

(more available)
Added: October 19, 2018
  • ««
  • «
  • 55
  • 56
  • 57
  • 58
  • 59
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 16, 2025 20:08 UTC (build b1d7be4)