Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from Advanced Threat Report: Europe, the Middle East and Africa

Advanced Threat Report: Europe, the Middle East and Africa

This report provides you with unique insights into Europe, Middle East and Africa’s (EMEA’s) threat landscape for the second half of 2015.

(more available)
Added: October 19, 2018
image from ASEC Report Volume 88 Q3 2017

ASEC Report Volume 88 Q3 2017

This report from the Ahn Lab Security Emergency Response Center provides a review of various Cyber events that took place in the 3rd Qtr. of 2017.

(more available)
Added: October 19, 2018
image from Business Perception Of IT Security: In The Face of An Inevitable Compromise

Business Perception Of IT Security: In The Face of An Inevitable Compromise

From The Report, “Evaluation of the business threat landscape can be broken down into two major areas: financial and technical. The former we covered extensively in our previous report, by measuring security budgets and recovery costs from typical threats. The next step is to take a closer look at real incidents that businesses have to deal with, and measures they take to prevent them.”

(more available)
Added: October 19, 2018
image from Cloud Security Defense: In Detail If Not In Depth

Cloud Security Defense: In Detail If Not In Depth

This report discusses the results of a survey conducted in 2017 to determine what information, concerns and security choices organizations are making with the cloud and the security of the cloud.

(more available)
Added: October 19, 2018
image from Cyber Attack Trends: 2018 Mid Year Report

Cyber Attack Trends: 2018 Mid Year Report

In this 2018 Mid-Year Report, they take a look at how so far this year, the different strains of malware and their authors have proven to be capable of much more than previously imagined, with more sophistication and a new level of agility. Indeed, as seen in this analysis of the GrandCrab ransomware, malware is now rapidly adapting in real-time to the technology solutions offered by security vendors.

(more available)
Added: October 19, 2018
image from Cyber Fears In Financial Services

Cyber Fears In Financial Services

The biggest takeaway from this report is that, for IT teams tasked with managing cybersecurity for financial networks is that the job is never done. Malicious actors will always be coming out of the woodwork, employing new and sometimes unexpected tactics to access funds and PII. IT teams therefore have to not only be vigilant, but keep the big picture in mind when mapping out their constantly- evolving network defenses by planning for tomorrow’s threats today.

(more available)
Added: October 19, 2018
image from Cyber Threats to the Nordic Region

Cyber Threats to the Nordic Region

This report details some of cyber threat activity that has been observed against Denmark, Finland, Iceland, Norway, and Sweden. It explores motivations of the cyber threat and factors that could trigger future activity in the region.

(more available)
Added: October 19, 2018
image from Cyberthreat Defense Report

Cyberthreat Defense Report

This docuement was created to Empower your organization to shift focus from protection to exploring new possibilities with a unified Lifecycle Defense.

(more available)
Added: October 19, 2018
image from Cyberthreat Report

Cyberthreat Report

This paper is based on a study that sought to understand the challenges associated with delivering web security, as well as to gauge receptivity to cloud-based web security solutions.

(more available)
Added: October 19, 2018
image from DDoS Threat Report Q2 2017

DDoS Threat Report Q2 2017

This report takes a look at the DDoS threats that occurred in the second quarter of 2017.

Added: October 19, 2018
image from Dell Security Annual Threat Report 2016

Dell Security Annual Threat Report 2016

This annual report aims to help organizations prevent attacks.

Added: October 19, 2018
image from ENISA Threat Landscape Report 2016

ENISA Threat Landscape Report 2016

In the following report, we give an overview of the top cyber-threats assessed in 2016. By concentrating more on the cyber-threats, ETL 2016 is more streamlined towards the details of cyber threats, while it provides information on threat agents and attack vectors. Based on this material, we deliver our conclusions for policy makers, businesses and research.

(more available)
Added: October 19, 2018
image from Global Application & Network Security Report 2017-2018

Global Application & Network Security Report 2017-2018

This report highlights the trends and threats of 2017 as observed by Radware.

Added: October 19, 2018
image from GTIC Monthly Threat Report June 2017

GTIC Monthly Threat Report June 2017

This monthly threat report takes a look at the month of June 2017. More specifically, it takes a look at the Trickbot ‘mac1’ Phishing campaign.

(more available)
Added: October 19, 2018
image from Hospital Network Security Requirements:5 Steps Beyond Compliance

Hospital Network Security Requirements:5 Steps Beyond Compliance

As this report states, you can be compliant, but still not be secure. Read the 5 steps that can help make your hospital secure beyond the requirements for compliance.

(more available)
Added: October 19, 2018
image from Internet Security Threat Report 2016

Internet Security Threat Report 2016

This report details 6 key findings from Symantec’s breakdown of the security issues of 2016.

Added: October 19, 2018
image from Key Technologies Needed To Advance Mission Critical IoT

Key Technologies Needed To Advance Mission Critical IoT

This white paper outlines the key challenges you face across the 3 layers of the IoT ecosystem—device, wireless communications, and network and system—and details the technologies you need to overcome them and realize success in the mission-critical IoT.

(more available)
Added: October 19, 2018
image from Machine Learning: How To Build A Better Threat Detection Model

Machine Learning: How To Build A Better Threat Detection Model

This is a very good guide to building a good threat detection model for machine learning.

Added: October 19, 2018
image from McAfee Labs Threat Report December 2017

McAfee Labs Threat Report December 2017

In this report, they highlight the statistics gathered by McAfee Labs in Q3 of 2017.

Added: October 19, 2018
image from Mobile Banking: Big Business, Big Target, Big Opportunity

Mobile Banking: Big Business, Big Target, Big Opportunity

This report provides insights into the security issues surrounding Mobile Banking.

Added: October 19, 2018
image from Network Detection: What Is It Really?

Network Detection: What Is It Really?

This report seeks to help provide important information to clarify what cybersecurity organizations are truly offering.

Added: October 19, 2018
  • ««
  • «
  • 56
  • 57
  • 58
  • 59
  • 60
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 12:08 UTC (build b1d7be4)