Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from 2017 Phishing Response Trends US Region

2017 Phishing Response Trends US Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 17, 2018
image from 2017 Quarterly Threat Report Q3

2017 Quarterly Threat Report Q3

This report takes a look at the cyber threats that took place in the 3rd Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 17, 2018
image from 2017 State Of Privacy Security Awareness

2017 State Of Privacy Security Awareness

This report offers analysis of survey results that sought to understand that the general public knows about privacy and cybersecurity.

(more available)
Added: October 17, 2018
image from 2018 Malware Trends Forecast

2018 Malware Trends Forecast

Barkly offers their insight into the Malware landscape, and what they project will occur in 2018.

Added: October 17, 2018
image from 2018 Security Report

2018 Security Report

In this report, we will take a look back over the past year and try to make sense of it. In turn we will realize how the threat landscape, by entering the fifth generation of cyber security, now spans across countries and industries along multiple vectors of network, cloud and mobile and uses state-sponsored technologies to do so. By reviewing recent attacks we can understand, however, how 97% of organizations are not prepared for the fifth generation of cyber attacks. We will then be able to take a closer look at what 2018 may have in store and, most importantly, how best to prepare for it.

(more available)
Added: October 17, 2018
image from 3 Must Have Ways To Analyze Mobile For GDPR Compliance

3 Must Have Ways To Analyze Mobile For GDPR Compliance

This paper seeks to aid organizations with analyzing mobile use and GDPR Compliance.

Added: October 17, 2018
image from AI Based Prevention And Detection

AI Based Prevention And Detection

This report discusses the new evolution in Endpoint Security.

Added: October 17, 2018
image from Annual Information Security Report 2015

Annual Information Security Report 2015

This “Information Security Report 2015” presents the Fujitsu Group’s information security-related activities.

Added: October 17, 2018
image from ASEC Report Volume 86 Q1 2017

ASEC Report Volume 86 Q1 2017

This report from the Ahn Lab Security Emergency Response Center provides a review of various Cyber events that took place in the 1st QTR of 2017.

(more available)
Added: October 17, 2018
image from Crypto-Ransomware Survey Results 2016

Crypto-Ransomware Survey Results 2016

Researchscape surveyed 275 IT experts from January 15 to January 30, 2016. This report is based on the findings of that survey.

(more available)
Added: October 17, 2018
image from Cyber Risk Report 2015

Cyber Risk Report 2015

The goal of this Report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.

(more available)
Added: October 17, 2018
image from Cyber Threats To The Healthcare And Health Insurance Industries

Cyber Threats To The Healthcare And Health Insurance Industries

Learn about current and impending cyber threats to the healthcare and health insurance industry.

Added: October 17, 2018
image from Cyber-Security Perceptions And Realities: A View From The C-Suite

Cyber-Security Perceptions And Realities: A View From The C-Suite

This Report is based on the findings of a survey that sought to understand the priorities and viewpoint of the Executive members of multiple organizations around the world, as pertains to cyber-secuirty issues.

(more available)
Added: October 17, 2018
image from Cybersecurity For Risk Mitigation In Financial Services

Cybersecurity For Risk Mitigation In Financial Services

From the paper, “The financial industry is no stranger to hacks and data breaches, but recently, the sector has been targeted more aggressively, leaving consumers wondering if their accounts and data are safe. As hackers and attacks become more sophisticated, it is crucial the financial services industry take appropriate actions to safeguard their systems, as well as their customers.”

(more available)
Added: October 17, 2018
image from Data Breach Digest: Perspective Is Reality

Data Breach Digest: Perspective Is Reality

This report offers a helpful understanding of data breaches.

Added: October 17, 2018
image from Digital Souks: Middle Eastern and North African Underground

Digital Souks: Middle Eastern and North African Underground

Trend Micro researchers’ in-depth explorations of the cybercriminal underworld— from Germany1, Brazil2, Japan3, North America4, and China5 to Russia6—have shown how financial gain motivates the way malware, crimeware, personally identifiable information (PII), and stolen commodities change hands. While their marketplaces are profit-driven and focused on flaunting their wares, we observed that the Middle Eastern and North African (MENA) underground was somewhat different with its ironic mix of ideology and felony.

(more available)
Added: October 17, 2018
image from Enterprise Guide To iOS App Development

Enterprise Guide To iOS App Development

This paper provides a helpful guide to iOS App development for the enterprise.

Added: October 17, 2018
image from Global IT Risks Survey 2015

Global IT Risks Survey 2015

From the report, “It’s time for businesses to recalibrate the way they think about their security budgets. Seen as a separate expense to IT infrastructure, it appears hard to justify until disaster strikes. But understood as an essential part of the IT environment – including mobile devices and virtualized machines – its value is obvious, especially in the context of the damage and huge costs it can prevent.”

(more available)
Added: October 17, 2018
image from GTIC Monthly Threat Report January 2018

GTIC Monthly Threat Report January 2018

This monthly threat report takes a look at the month of January 2018. Specifically, it looks at two VULNS, the hacking of nuclear weapons, and the increase in suspected Chinese Cyber activity.

(more available)
Added: October 17, 2018
image from Incident Response For Android And iOS

Incident Response For Android And iOS

This book will prepare enterprises and practitioners for the inevitable increase in mobile compromise. We will use step-by-step tutorials, guiding the reader from setting up a mobile IR practice all the way through continuous monitoring of mobile devices.

(more available)
Added: October 17, 2018
image from Internet Of Things Cybersecurity Readiness

Internet Of Things Cybersecurity Readiness

This report provides the results of a unique survey designed to analyze their IoT technologies and the struggles and challenges of providing and preparing for security issues related to thos devices.

(more available)
Added: October 17, 2018
  • ««
  • «
  • 60
  • 61
  • 62
  • 63
  • 64
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 00:08 UTC (build b1d7be4)