Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from 2016 State Of Privacy & Security Awareness

2016 State Of Privacy & Security Awareness

From the report, “Good privacy and security practices are often common sense—but ensuring that this common sense is applied consistently and rigorously makes all the difference in the world. In a truly risk-aware organization, employees combine policy know-how, common sense, and a keen eye for detail as they regularly align their actions with your organizations security and privacy principles. How will you ensure that you’ve got such a culture?”

(more available)
Added: October 16, 2018
image from 2017 Phishing Response Trends UK Region

2017 Phishing Response Trends UK Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 16, 2018
image from 2017 Quarterly Threat Report Q2

2017 Quarterly Threat Report Q2

This report takes a look at the cyber threats that took place in the 2nd Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 16, 2018
image from 2018 Global Security Report

2018 Global Security Report

This annual report takes a look at the last decade of cyber security issues, including 2017, and provides some insight into the years ahead.

(more available)
Added: October 16, 2018
image from A Quick History Of IoT Botnets

A Quick History Of IoT Botnets

Here is a short report on the history of IoT Botnets.

Added: October 16, 2018
image from An Emprical Analysis of Cyber Security Incidents at a Large Organization

An Emprical Analysis of Cyber Security Incidents at a Large Organization

This is a study into organisations’ attitudes towards the cyber threat, the management control processes they have in place, and their understanding and use of cyber insurance as a means of risk transfer.

(more available)
Added: October 16, 2018
image from An Introduction to Cyber Threat Modelling

An Introduction to Cyber Threat Modelling

This document defines an analytical model of cyber threat intelligence in terms of a threat entity’s goal orientation, the capabilities it uses to pursue its goals and its modus operandi. The model is intended to act as a common guiding template for conducting a cyber threat assessment for use by penetration testers to define a set of realistic and threat-informed cyber attack test scenarios.

(more available)
Added: October 16, 2018
image from Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks

Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks

This paper seeks to show that data relating to the profiles of organizations and individuals subject to targeted attacks is amenable to study using epidemiological techniques. They design case-control studies to calculate odds ratios reflecting the degree of association between the identified risk factors and the receipt of targeted attack.

(more available)
Added: October 16, 2018
image from ASEC Report Volume 85 January 2017

ASEC Report Volume 85 January 2017

This report from the Ahn Lab Security Emergency Response Center provides a review of various Cyber events that took place in January of 2017.

(more available)
Added: October 16, 2018
image from Benefits And Costs Of Alternate Cyber Futures

Benefits And Costs Of Alternate Cyber Futures

This report seeks to answer the following questions, In 2030, will the Internet and related information and communications technologies (ICT) continue to drive global innovation and prosperity? Or, will that bright promise be swamped by an unstable and insecure Internet, so overwhelmed by non-stop attacks that it has become an increasing drag on economic growth?

(more available)
Added: October 16, 2018
image from Buidling a Business Driven Financial SOC

Buidling a Business Driven Financial SOC

This whitepaper outlines the unique challenges that business-driven financial SOCs deal with, and provides tools and tips on how to manage and resolve these challenges.

(more available)
Added: October 16, 2018
image from Cyber Risk: Threat and Opportunity

Cyber Risk: Threat and Opportunity

The executive summary of this paper gives four points of discussion: a) Interest in cyber insurance has grown beyond expectations b) Cyber attacks and breaches have grown in frequency, and loss costs are on the rise c) Insurers are issuing an increasing number of cyber insurance policies and becoming more skilled and experienced at underwriting and pricing this rapidly evolving risk d) Some observers believe that cyber exposure is greater than the insurance industry’s ability to adequately underwrite the risk.

(more available)
Added: October 16, 2018
image from Cyber Threats To The Financial Services And Insurance Industries

Cyber Threats To The Financial Services And Insurance Industries

Get a glimpse of cyber threats the financial services and insurance sectors are facing, including top malware and crimeware detected.

(more available)
Added: October 16, 2018
image from Delivering Strong Security In A HyperConverged Data Center Environment

Delivering Strong Security In A HyperConverged Data Center Environment

From The Report, “Just as hyperconvergence in the data center will have a huge impact on how systems and data are managed, it will have significant repercussions for information security. Any organization that thinks security does not need to change in a hyperconverged environment puts data and systems reliability at risk.”

(more available)
Added: October 16, 2018
image from Digging Deeper: An In Depth Analysis Of A Fast Flux Network

Digging Deeper: An In Depth Analysis Of A Fast Flux Network

This whitepaper provides some insight into a Fast Flux Network and its ability to deal with attacks.

Added: October 16, 2018
image from Energy Market Review 2014

Energy Market Review 2014

This report seeks to understand, and analyze, whether or not the energy market can respond to a damaging cyber attack.

(more available)
Added: October 16, 2018
image from ERP Applications Under Fire: How CyberAttackers Target The Crown Jewels

ERP Applications Under Fire: How CyberAttackers Target The Crown Jewels

This report is the result of joint research performed by Digital Shadows and Onapsis, aimed to provide insights into how the threat landscape has been evolving over time for ERP applications.

(more available)
Added: October 16, 2018
image from GTIC Monthly Threat Report February 2018

GTIC Monthly Threat Report February 2018

This monthly threat report takes a look at the month of February 2018. Specifically, it looks at how Agent Tesla works, cryptocurreny malware, ransomware’s refusal to die, and Turla APT updating their malware after public advisories.

(more available)
Added: October 16, 2018
image from HIPAA & The Enterprise Network

HIPAA & The Enterprise Network

This whitepaper will explore HIPAA requirements and how comprehensive network security automation and orchestration will control endpoints, provide total visibility of all network access devices and automate threat response to help ensure compliance.

(more available)
Added: October 16, 2018
image from Insiders Guide to Defeating Ransomware

Insiders Guide to Defeating Ransomware

This e-book sounds the alarm about the threat of ransomware for businesses and public sector organizations, equips security professionals with the facts about the risks and consequences of ransomware, and presents an approach to protect enterprise data from ransomware attacks.

(more available)
Added: October 16, 2018
image from Integrated Infrastructure: Cyber Resiliency in Society, Mapping the Consequences of an Interconnected Digital Economy;

Integrated Infrastructure: Cyber Resiliency in Society, Mapping the Consequences of an Interconnected Digital Economy;

A very detailed report that discusses the dangers of cyber threats to infrastructure and large systems that impact all of society.

(more available)
Added: October 16, 2018
  • ««
  • «
  • 62
  • 63
  • 64
  • 65
  • 66
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 08:08 UTC (build b1d7be4)