Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from X-Force Threat Intelligence Report - 2016

X-Force Threat Intelligence Report - 2016

This report discusses information gleaned from the notable highlights in cyber threats during the year 2015. It studies notable incidents and targeted malware affecting geographies including Canada, Australia, the United Kingdom, France, Turkey and Japan. It also discusses the barriers that must be overcome in order to prevent cyber attacks from occurring.

(more available)
Added: October 16, 2018
image from "VPN Filter" Botnet: A Sophoslabs Analysis

"VPN Filter" Botnet: A Sophoslabs Analysis

This report provides a technical investigation of the malicious components involved in the attack that infected over 500,000 routers and network storage devices.

(more available)
Added: October 15, 2018
image from 2015 Information security breaches survey

2015 Information security breaches survey

A report from the government of the United Kingdom detailing the findings of a survey regarding security breaches in 2015.

(more available)
Added: October 15, 2018
image from 2015 Strategic Security Survey

2015 Strategic Security Survey

In this report, they: a) Discuss the assumptions shaping IT defense spending plans b) Delve into the real and intangible costs of a data breach c) Examine why malware is still the most common form of breach. d) Look at which threats on which security teams need to focus.

(more available)
Added: October 15, 2018
image from 2015 Threat Report

2015 Threat Report

The report introduces the Chain of Compromise as an analytical concept to help readers, particularly those working in cyber security and information technology roles, understand how attackers compromise security using different combinations of tactics and resources. Some of 2015’s most prominent threats, such as exploit kits, ransomware, and DNS hijacks, are discussed in relation to this model, demonstrating how users become compromised by modern cyber attacks.

(more available)
Added: October 15, 2018
image from 2017 Global IP Reputation Analysis Report

2017 Global IP Reputation Analysis Report

This report provides a monthly snapshot of analysis and trends of IP Reputation globally.

Added: October 15, 2018
image from 2017 Global Security Report

2017 Global Security Report

This annual report takes a look at the security events of 2017 and projects what is to come in 2018.

(more available)
Added: October 15, 2018
image from 2017 Internet Crime Report

2017 Internet Crime Report

The 2017 Internet Crime Report emphasizes the IC3’s efforts in monitoring trending scams such as Business Email Compromise (BEC), Ransomware, Tech Support Fraud, and Extortion. The report also highlights the Elder Justice Initiative promoting justice for the nation’s seniors. In 2017, IC3 received a total of 301,580 complaints with reported losses exceeding $1.4 Billion.

(more available)
Added: October 15, 2018
image from 2017 Midyear Cybersecurity Report

2017 Midyear Cybersecurity Report

This midyear report details two dynamics undermining the successes of the cybersecurity landscape. “Our security experts are becoming increasingly concerned about the accelerating pace of change—and yes, sophistication—in the global cyber threat landscape. That is not to say defenders are not improving their ability to detect threats and prevent attacks, or to help users and organizations avoid or recover more quickly from them. But we see two dynamics undermining their hard-won successes, hindering further progress, and helping to usher in a new era of cyber risks and threats…”

(more available)
Added: October 15, 2018
image from 2017 Phishing Response Trends South Africa Region

2017 Phishing Response Trends South Africa Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 15, 2018
image from 2017 Quarterly Threat Report Q1

2017 Quarterly Threat Report Q1

This report takes a look at the cyber threats that took place in the 1st Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 15, 2018
image from Always On. Always Up.

Always On. Always Up.

This white paper is geared towards the energy industry and learning about how network security can help maintain cybersecurity protections specifically in that industry.

(more available)
Added: October 15, 2018
image from Annual Worldwide Infrastructure Security Report, Vol 11

Annual Worldwide Infrastructure Security Report, Vol 11

The data within this document is based on the collective experiences, observations and concerns of the global operational security community. Arbor Networks has collected this data through a survey conducted in October 2015.

(more available)
Added: October 15, 2018
image from Automation: The Future Of Network Visibility

Automation: The Future Of Network Visibility

This whitepaper provides some insights to consider for automating your SIEM, NMS, packet capture device, and other tool deployments.

Added: October 15, 2018
image from Be Compromise Ready 2017 Data Security Incident Response Report

Be Compromise Ready 2017 Data Security Incident Response Report

From the Report, “Cybersecurity carries a certain mystique. This comes from a combination of people not being “tech savvy,” sensationalized or incorrect headlines (“Guests Locked in Their Hotel Rooms by Ransomware”), superficial advice from so-called experts and technology-driven cure-alls. The reality is that if you focus on the basics, you will be better positioned to be “Compromise Ready.” Like other material risks companies face, cybersecurity readiness requires an enterprise wide approach tailored to the culture and industry of the company. There is no one-size-fits-all solution.”

(more available)
Added: October 15, 2018
image from Beware Of The 64-Bit Malware

Beware Of The 64-Bit Malware

The 64-bit Windows operating system is increasing its market share and becoming the prevalent system in most business environments. Its growing popularity is also attracting more attackers and slowly reshaping the Windows threat landscape. Cybersecurity teams must gain a deep understanding of 64-bit systems, and the different malware variants that can infiltrate and attack them, especially as the threat expands into additional operating systems, such as Linux and macOS.

(more available)
Added: October 15, 2018
image from BitSight Insights: Global View

BitSight Insights: Global View

This report will help you learn how understanding the global cyber threat landscape can help evaluate the potential risks of doing business in certain nations. It is the result of studying the performance of companies per country with more than 50% of their IP space in: The United States, United Kingdom, Germany, Brazil, China and Singapore.

(more available)
Added: October 15, 2018
image from Comprehensive Study on Cybercrime

Comprehensive Study on Cybercrime

As required by General Assembly resolution 65/230, this Study has been prepared with a view to ‘examining options to strengthen existing and to propose new national and international legal or other responses to cybercrime.’ The mandate comes within the context of a number of other mandates and activities related to cybercrime and cybersecurity within the United Nations system. In this respect, the focus of the Study is limited to the crime prevention and criminal justice aspects of preventing and combating cybercrime.

(more available)
Added: October 15, 2018
image from Consumer Security Risks Survey 2016

Consumer Security Risks Survey 2016

This report discusses four main findings; 1) Consumers are concerned about online threats to the people and things that matter most, 2) The dangers online can have severe consequences for people’s data, 3) Children are also exposed to online threats, 4) People should be more cyber savvy - and protect what matters most - when they are online.

(more available)
Added: October 15, 2018
image from Containing Targeted Cyber Attacks: Best Practices For Gaining Control Over The Enterprise Endpoint Environment

Containing Targeted Cyber Attacks: Best Practices For Gaining Control Over The Enterprise Endpoint Environment

This paper dicusses the best pracitices for gaining conrtol over Cyber Attacks and the Incident Response action.

Added: October 15, 2018
image from Cryptowall Report

Cryptowall Report

This is a report that deals with the CryptoWall Malware. The focus of this report is to study the prevalence and global impact of CryptoWall.

(more available)
Added: October 15, 2018
  • ««
  • «
  • 64
  • 65
  • 66
  • 67
  • 68
  • »
  • »»
© Cyentia Institute 2025
Library updated: August 15, 2025 16:09 UTC (build b1d7be4)