Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from Internet Crime Report 2016

Internet Crime Report 2016

The 2016 Internet _x0012_Crime Report highlights the I_x0012_3’s efforts in monitoring trending scams such as Business Email Compromise (BEC), ransomware, tech support fraud, and extortion. In 2016, IC3 received a total of 298,728 complaints with reported losses in excess of $1.3 billion.

(more available)
Added: October 16, 2018
image from Joao Malware Analysis

Joao Malware Analysis

This report provides analysis and information related to Joao Malware which has attacked video gamers.

Added: October 16, 2018
image from Malware Defense Through Collaborative Filtering

Malware Defense Through Collaborative Filtering

This report discusses the malware situation, and how collaborative filtering can offer a solid defense against it.

Added: October 16, 2018
image from Midyear Security Report 2015

Midyear Security Report 2015

Using research by our experts, it provides an overview of the major threats observed in the first half of 2015. This report also explores likely future trends and offers advice for small, midsize, and enterprise organizations that seek security solutions and services.

(more available)
Added: October 16, 2018
image from Mobile Maturity Matrix: Where Does Your Business Fall?

Mobile Maturity Matrix: Where Does Your Business Fall?

This report draws key insights from a survey conducted by IDG Connect on behalf of Wandera and VMware to assess the varying levels of mobile maturity within organizations, analyzing key indicators such as risk management, content filtering and data usage management.

(more available)
Added: October 16, 2018
image from Quarterly Threat Report:Fourth Quarter 2017

Quarterly Threat Report:Fourth Quarter 2017

This is Rapid7’s Quarterly Threat Report. In this report they wrap up the cyber events from the year 2017 and lay out some thoughts on what is ahead in 2018.

(more available)
Added: October 16, 2018
image from Quarterly Threats Report March 2018

Quarterly Threats Report March 2018

In this quarterly report, they discuss the fact that criminals have shifted their tactics and have now moved to power shifting, crypto-currency, and ransomware, as their main focus of cyberthreat.

(more available)
Added: October 16, 2018
image from Ransomware What Lies Ahead?: A Comprehensive Guide to Ransomware Variants

Ransomware What Lies Ahead?: A Comprehensive Guide to Ransomware Variants

This paper is the result of detailed research into classic and unique ransomware families. Its purpose is to provide a solid foundation for developing protective measures in your organization. Reading this paper offers a thorough understanding of the different types of ransomware, how it can be created and the course of itsevolution,especiallyasitexpandsintonewterritories such as mobile devices and IoT.

(more available)
Added: October 16, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report November 2016

SecureWorks Threat Intelligence Executive Monthly Report November 2016

This report from November 2016 takes a look at 6 different types of threat events and discusses the insights gleaned from research about those events.

(more available)
Added: October 16, 2018
image from Security Response: The Apple Threat Landscape

Security Response: The Apple Threat Landscape

This report examines the weaknesses in Apple products and the growing trend of attacks on the Apple system.

Added: October 16, 2018
image from Six Best Practices For Securing Amazon Web Service

Six Best Practices For Securing Amazon Web Service

This paper offers some solutions to the best practices for securing Amazon Web Services.

Added: October 16, 2018
image from Sleeper Awake: RSA Conference Transcript 2016

Sleeper Awake: RSA Conference Transcript 2016

This is the transcript from Amit Yoran’s presentation at the 2016 RSA Conference.

Added: October 16, 2018
image from The Busy Manager's Guide To Open Security

The Busy Manager's Guide To Open Security

Following the Equifax hack, this document is a guide to help your organization protect their Open-Source information.

Added: October 16, 2018
image from The Cost of Malware Containment

The Cost of Malware Containment

Ponemon Institute conducted this research to understand how much money organizations are wasting in their efforts to prevent malware driven threats and other malicious programs from stealing high value and confidential data. To ensure a knowledgeable participant, we surveyed 630 IT and IT security practitioners in the United States who are familiar with their organization’s practices for containing malware infections. They also have responsibility in detecting, evaluating and/or containing malware infections within their organization.

(more available)
Added: October 16, 2018
image from The Cyber Readiness of Canadian Organizations

The Cyber Readiness of Canadian Organizations

The purpose of this research is to study how Canadian organizations are responding to cyber security threats and the need to invest in enabling security technologies.

(more available)
Added: October 16, 2018
image from Threat Landscape Report Q2 2017

Threat Landscape Report Q2 2017

This is a quarterly report that looks at the current cubery security threats from each quarter.

Added: October 16, 2018
image from Threat Report 2015

Threat Report 2015

The Proofpoint Threat Report explores threats, trends, and transformations that they see within their customer base and in the wider security marketplace.

(more available)
Added: October 16, 2018
image from Tracking Trends In Business Email Compromise

Tracking Trends In Business Email Compromise

This report takes a look at Business Email Compromise attacks and examines why the FBI was able to report that it has become a billion dollar industry.

(more available)
Added: October 16, 2018
image from Trusted Access Report 2017

Trusted Access Report 2017

This paper discusses the evolution of enterprise security.

Added: October 16, 2018
image from Underground Hacker Markets

Underground Hacker Markets

For our 3rd Annual Underground Hacker Markets Report, Dell SecureWorks engaged two of our top intelligence analysts from our CISO INTEL Team. The team members spend time tracking hackers on the numerous underground hacker forums and marketplaces all over the world. While much of the cybercrime hitting organizations throughout the world is the result of cooperation by hackers working outside the confines of publicly-accessible marketplaces, these underground forums provide a small window into the world cybercriminals occupy. In this report, we concentrated on marketplaces located on the Russian Underground and on English-speaking marketplaces between Q3 2015 and Q1 2016.

(more available)
Added: October 16, 2018
image from Voice Of The Analyst: An Inside Perspective On Security Operations

Voice Of The Analyst: An Inside Perspective On Security Operations

This report offers the results of a survey that sought to understand the true nature and quality of a SECOP position.

(more available)
Added: October 16, 2018
  • ««
  • «
  • 63
  • 64
  • 65
  • 66
  • 67
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 00:08 UTC (build b1d7be4)