Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from Looking ahead: SophosLabs 2017 malware forecast

Looking ahead: SophosLabs 2017 malware forecast

In this report, they review malicious activity SophosLabs analyzed and protected customers against last year and use the findings to paint a picture for 2017.

(more available)
Added: October 17, 2018
image from Mcafee Labs Threats Report September 2017

Mcafee Labs Threats Report September 2017

In this quarterly threats report, they highlight three Key Topics: In the lead story, they analyze the recent WannaCry and Petya attacks, the perpetrators’ likely motives, and the business impact. The second Key Topic departs from their usual threat analysis stories. Because threat hunting is becoming increasingly important, in this story they offer detailed advice and recommendations for using certain types of indicators of compromise when hunting for threats. In the final Key Topic, they explore script-based malware—why it is used, how authors obfuscate scripts, how it propagates, and its growth in popularity.

(more available)
Added: October 17, 2018
image from Mobile Data Report

Mobile Data Report

This report pays particular attention to the state of mobile security in law firms.

Added: October 17, 2018
image from Office 365 Exchange Online: Research Report December 2016

Office 365 Exchange Online: Research Report December 2016

This ebook provides a report on the results of a survey that was conducted to discover information on 4 issues related to Office 365.

(more available)
Added: October 17, 2018
image from OWASP Top 10 2017 A Flash Card Guide

OWASP Top 10 2017 A Flash Card Guide

This is a fun little infographic that provides information on the top threats of 2017.

Added: October 17, 2018
image from Past And Present Of Underground Network Industry

Past And Present Of Underground Network Industry

This document presents the definition, category, means, and examples of the underground network industry, as well as protection measures.

Added: October 17, 2018
image from Qaurterly Threat Report Q! 2017

Qaurterly Threat Report Q! 2017

The Proofpoint Quarterly Threat Report captures threats, trends and transformations we see within our customer base and in the wider security market.

(more available)
Added: October 17, 2018
image from Ransomware: A Victims perspective

Ransomware: A Victims perspective

This paper seeks to answer the following questions, “What motivates victims to pay up? How much do they value their data? What role does antivirus protection play in the problem-solving equation?"

(more available)
Added: October 17, 2018
image from Rise of the Machines: The Dyn Attack Was Just a Practice Run

Rise of the Machines: The Dyn Attack Was Just a Practice Run

This report uses the impact of the Mirai botnet, to help stakeholders prevent future incidents by addressing the lack of security-by-design in the Internet-of-things and in the Internet itself.

(more available)
Added: October 17, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report October 2016

SecureWorks Threat Intelligence Executive Monthly Report October 2016

This report from October 2016 takes a look at the Mirai botnet, VULNS, breach responses, and some new security initiatives.

(more available)
Added: October 17, 2018
image from Security Response: The Evolution of Ransomware

Security Response: The Evolution of Ransomware

This report takes a look at how the ransomware types work, not just from a technological point of view but also from a psychological viewpoint. They also look at how these threats evolved, what factors are at play to make ransomware the major problem that it is today, and where ransomware is likely to surface next.

(more available)
Added: October 17, 2018
image from State Of Cloud Security 2018

State Of Cloud Security 2018

This paper provides insights into some of the latest cloud practices and technologies enterprise information security practitioners must be aware of as IT and sensitive data extends beyond the traditional corporate perimeter.

(more available)
Added: October 17, 2018
image from The Case For Software Security

The Case For Software Security

This E-book discusses the importance of securing software.

Added: October 17, 2018
image from The Evolution Of Network Access Control

The Evolution Of Network Access Control

This whitepaper discusses the growing network security issues caused by IoT, BYOD, and other issues occuring in cyber technology.

Added: October 17, 2018
image from The National Computer Security Survey (NCSS)

The National Computer Security Survey (NCSS)

The Bureau of Justice Statistics (BJS) within the U.S. Department of Justice (DOJ), along with the U.S. Department of Homeland Security (DHS), conducted the National Computer Security Survey (NCSS), a nationally representative sample of businesses across 36 industry sectors. This report will be of interest to researchers and analysts who are interested in under- standing the methodology underlying the NCSS, including questionnaire design, survey field- ing, sampling, and weighting methodologies for this large-scale survey. The report will also be informative for scholars who are interested in analyzing the NCSS public-use data file.

(more available)
Added: October 17, 2018
image from The Rising Face of Cybercrime: Ransomware

The Rising Face of Cybercrime: Ransomware

In this Report, researchers analyzed the growing trend of ransomware across nearly 20,000 companies to identify common forms of ransomware, and identify which industries are most susceptible to these types of attacks.

(more available)
Added: October 17, 2018
image from Threat Landscape Report Q3 2017

Threat Landscape Report Q3 2017

This is a quarterly report that looks at the current cubery security threats from each quarter.

Added: October 17, 2018
image from Trusted Access Report 2018

Trusted Access Report 2018

This report takes a closer look at user authentications and how users behave in phishing simulations, as well as shedding light on the security health of users’ devices used to log into enterprise applications.

(more available)
Added: October 17, 2018
image from Widespread Outbreak Of NotPetya Ransomware

Widespread Outbreak Of NotPetya Ransomware

This report specifically talks about NotPetya.

Added: October 17, 2018
image from "Known Unkowns": Overcoming Catastrophic Failure Modes In Artificial Intelligence

"Known Unkowns": Overcoming Catastrophic Failure Modes In Artificial Intelligence

This report takes a look at some of the problems in AI, and machine based cyber security, and seeks to show how they can be overcome.

(more available)
Added: October 16, 2018
image from 2016 Global Security Report

2016 Global Security Report

Gives a detailed report of ransomware in the year 2016. Includes a video presentation.

Added: October 16, 2018
  • ««
  • «
  • 61
  • 62
  • 63
  • 64
  • 65
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 08:08 UTC (build b1d7be4)