Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from Offense-In-Depth: Reflective Social Engineering

Offense-In-Depth: Reflective Social Engineering

This report takes a look at phishing campaings and why they work so easily.

Added: October 19, 2018
image from Ok Panic: Newly Evolved Ransomware Is Bad News For Everyone

Ok Panic: Newly Evolved Ransomware Is Bad News For Everyone

A quick and effecient article discussing why the new ransomware is dangerous.

Added: October 19, 2018
image from Personal Data Protection:Brief Handbook On The Proper Application Of GDPR

Personal Data Protection:Brief Handbook On The Proper Application Of GDPR

Ever since the new European regulation on the protection of personal data (GDPR) was voted in, businesses have started their countdown to the transition that will take place in May 2018. They now have less than 2 years to comply with the new European regulation and the consequences of its new requirements in terms of data protection: strengthened cybersecurity, liability of data collection entities and new mandatory procedures. For organizations, what this entails now is the need to review their procedures and ensure their regulatory compliance before it starts raining sanctions.This white paper aims to address the question by providing a simplified interpretation of the regulation and practical solutions for a smooth transition.

(more available)
Added: October 19, 2018
image from Post-Soviet Bank Heists

Post-Soviet Bank Heists

This report takes a look at recent bank heists that originated from Post-Soviet states.

Added: October 19, 2018
image from Preparing For NGAV At Scale

Preparing For NGAV At Scale

This Paper is subtitled “Stopping Attacks In Progress Starts With Asking The Right Questions” The paper tries to discuss and reveal the questions that should be asked.

(more available)
Added: October 19, 2018
image from Quarterly Threat Report Q2 2017

Quarterly Threat Report Q2 2017

This Quarterly report offers key takeaways from the second Quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 19, 2018
image from Ransomware Survey Infographic

Ransomware Survey Infographic

To get a more complete sense of the impact of ransomware beyond the headlines and statistics, we surveyed IT professionals who have had to deal with it firsthand.

(more available)
Added: October 19, 2018
image from Securing Our Future: Closing the Cybersecurity Talent Gap (October 2015)

Securing Our Future: Closing the Cybersecurity Talent Gap (October 2015)

October 2015 results from the Raytheon-NCSA survey of young adults in 12 countries about cybersecurity career interest and preparedness.

Added: October 19, 2018
image from State of the Internet/Security Q4 2015 report

State of the Internet/Security Q4 2015 report

This report gives a detailed breakdown of DDoS attacks in Q4 of 2015.

Added: October 19, 2018
image from Stonedrill - Shamoon & Shamoon 2.0 Variant

Stonedrill - Shamoon & Shamoon 2.0 Variant

It would appear that a new variant titled ‘StoneDrill‘ has now hit the wild and conducts operations very similar to that of Shamoon 2.0 and Shamoon malware. Here is a brief analysis of StoneDrill,

(more available)
Added: October 19, 2018
image from Strengthen Your Defenses Against Cybercrime

Strengthen Your Defenses Against Cybercrime

This ebook provides insight based on a survey that sought to understand the state of email cybersecurity.

Added: October 19, 2018
image from The Hacker-Powered Security Report 2018

The Hacker-Powered Security Report 2018

As we approach critical mass of hacker-powered security, read on to learn more about best practices of starting and running effective disclosure and bug bounty programs, and get to know some of the stories and stats about the hackers themselves.

(more available)
Added: October 19, 2018
image from Threat Landscape Report Q4 2017

Threat Landscape Report Q4 2017

This is a quarterly report that looks at the current cubery security threats from each quarter.

Added: October 19, 2018
image from Trends for 2015: Targeting the Corporate World

Trends for 2015: Targeting the Corporate World

The “Trends For 2015 – Targeting the Corporate World” report by the ESET LATAM Research Lab invites you to review some of the most significant cases that affected computer security in 2014, and to consider and present the challenges and threats expected for 2015. This report will try to address the different types of threats and security incidents we have witnessed during the year classified by catego- ry in order to answer the following questions: what will we find during 2015 in terms of IT security? And how, therefore, can companies and individual users prepare themselves to get through next year in safe- ty?

(more available)
Added: October 19, 2018
image from Untangling CIPA

Untangling CIPA

This paper takes a look at the Children’s Internet Protection Act.

Added: October 19, 2018
image from 2015 Internet Security Threat Report, Volume 20, Appendices

2015 Internet Security Threat Report, Volume 20, Appendices

The 2015 Internet Security Threat Report (ISTR) provides an overview and analysis of the year in global threat activity. (aggregating and collecting data collected from Symantec devices and customers)

(more available)
Added: October 18, 2018
image from 2015 State of Cybersecurity Leadership Report

2015 State of Cybersecurity Leadership Report

This paper was developed to help CISOs, CIOs, executive teams and boards of directors learn what they need to know to work together to address the challenges posed by cyber threats in the context of overall risk to the business.

(more available)
Added: October 18, 2018
image from 2015 State Of The Phish

2015 State Of The Phish

To provide a clearer idea of where, and how, organizations make themselves most vulnerable to phishing attacks, ThreatSim has prepared this 2015 report, which pools two sources of data: 1) ThreatSim’s anonymous data aggregated across our customer base, involving millions of simulated email phishing. 2) A survey of information technology executives, administrators, and information security professionals.

(more available)
Added: October 18, 2018
image from 2016 Web Application Threat Trend Report

2016 Web Application Threat Trend Report

Readers are encouraged to use this report to get a better understanding of the current threat landscape, including trends specific to different contexts like region, time of day, industry, and more, in order to better fine-tune defenses for meeting the security needs of their unique environments.

(more available)
Added: October 18, 2018
image from 2017 Bitdefender Ransomware Reprot

2017 Bitdefender Ransomware Reprot

This is a solid breakdown of the Ransomware issues as seen in 2017.

Added: October 18, 2018
image from 2017 Ransomware Report

2017 Ransomware Report

From The Report, “With global ransomware damages predicted to exceed $5 billion this year, it is no surprise that ransomware is the fastest growing security threat. As this year’s global attacks have made national news, businesses of all sizes have become increasingly aware of the looming ransomware threat and the challenge of staying protected. Infected companies race the clock to minimize data loss, downtime, and reputation damage. With the seemingly endless profitability, anonymity and ease of execution it doesn’t appear cybercriminals will be turning their back on ransomware anytime soon. Companies are right to expect another year filled with attacks and new variants. The question is how can companies block these attacks before ransom is demanded, and their data along with their reputation is put at risk.”

(more available)
Added: October 18, 2018
  • ««
  • «
  • 57
  • 58
  • 59
  • 60
  • 61
  • »
  • »»
© Cyentia Institute 2025
Library updated: August 16, 2025 16:09 UTC (build b1d7be4)