Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from Cyber Security Considerations For Financial Institutions

Cyber Security Considerations For Financial Institutions

This paper discusses the issues that are caused by, “technology innovation and spearheaded by a generation that expects a seamless customer experience, the financial services landscape is undergoing fundamental change, which will no doubt influence the industry’s future cyber security considerations.”

(more available)
Added: October 15, 2018
image from Cyber Threats To The Entertainment And Media Industries

Cyber Threats To The Entertainment And Media Industries

Discover why the entertainment and media industries are valuable targets for APT groups and hacktivists seeking influence.

Added: October 15, 2018
image from Cyberattacks Against Intelligent Transportation Systems

Cyberattacks Against Intelligent Transportation Systems

There is currently very little published research discussing the cybersecurity threats against ITS. In this paper, we first explored real-world ITS cyberattacks and their impact. As cyberattacks and attackers go hand-in-hand, we discussed the most likely perpetrators and their goals and motivations for attacking ITS. We then applied our knowledge of current cyberattacks to develop and analyze future cyberattack scenarios against ITS and Smart Roads.

(more available)
Added: October 15, 2018
image from Global Application and Network Security Report

Global Application and Network Security Report

From the report, “This research provides a comprehensive and objective review of 2015 cyber-attacks from both a business and a technical perspective. It offers best practice advice for organizations to consider when planning for cyber-attack protection in 2016."

(more available)
Added: October 15, 2018
image from GTIC Monthly Threat Report December 2017

GTIC Monthly Threat Report December 2017

This monthly threat report takes a look at the month of December 2017. Specifically, it looks at insights into Coinhive, intellectual property theft via Iranian hackers, and North Korea’s new cyberattack tools.

(more available)
Added: October 15, 2018
image from Guerilla Ad Clicker Targets Android Users

Guerilla Ad Clicker Targets Android Users

This report takes a look at a threat that specifically attacks Android users.

Added: October 15, 2018
image from Just in Time Research: Data Breaches in Higher Education

Just in Time Research: Data Breaches in Higher Education

This “Just in Time” research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about data breaches in higher education. Using data from the Privacy Rights Clearinghouse, this research analyzes data breaches attributed to higher education. The results from this review will be used to inform EDUCAUSE research, programs, products, and services.

(more available)
Added: October 15, 2018
image from Leadership Compass: Cloud Access Security Brokers

Leadership Compass: Cloud Access Security Brokers

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

(more available)
Added: October 15, 2018
image from McAfee Labs Threats Report June 2017

McAfee Labs Threats Report June 2017

In this quarterly threats report, they highlight three Key Topics: They broadly examine evasion techniques and how malware authors use them to accomplish their goals. They explore the very interesting topic of steganography in the digital world. They examine Fareit, the most famous password-stealing malware.

(more available)
Added: October 15, 2018
image from Mobile Security Index 2018

Mobile Security Index 2018

This paper discusses what organizations fear and what security measures they are taking to mitigate risks. To find out, they commissioned independent research, surveying more than 600 mobility professionals. The results were eye-opening.

(more available)
Added: October 15, 2018
image from Preventing Abuse Of Privacy Sensitive Sensors Via Operation Bindings

Preventing Abuse Of Privacy Sensitive Sensors Via Operation Bindings

System designers have long struggled with the challenge of determining how to control when untrusted applica- tions may perform operations using privacy-sensitive sen- sors securely and effectively. Current systems request that users authorize such operations once (i.e., on install or first use), but malicious applications may abuse such authorizations to collect data stealthily using such sensors. Proposed research methods enable systems to infer the op- erations associated with user input events, but malicious applications may still trick users into allowing unexpected, stealthy operations. To prevent users from being tricked, we propose to bind applications’ operation requests to the associated user input events and how they were ob- tained explicitly, enabling users to authorize operations on privacy-sensitive sensors unambiguously and reuse such authorizations.

(more available)
Added: October 15, 2018
image from Quarterly Threat Report:Third Quarter 2017

Quarterly Threat Report:Third Quarter 2017

This is Rapid7’s Quarterly Threat Report. In this report they sought to make a less chaotic picture of the events of the 3rd quarter of 2017.

(more available)
Added: October 15, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report May 2016

SecureWorks Threat Intelligence Executive Monthly Report May 2016

This report from May 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 15, 2018
image from Security Response: Insecurity in the Internet of Things

Security Response: Insecurity in the Internet of Things

The Internet of Things is becoming and area of danger for security risks. This paper discusses the cyber security issues related to the internet of things, and discusses how people should be taking action to protect their devices.

(more available)
Added: October 15, 2018
image from State Of Privacy & Security Awareness In Retail

State Of Privacy & Security Awareness In Retail

This report provides data to help understand the need of helping employees understand PCI compliance in the retail industry.

Added: October 15, 2018
image from Suspected Chinese Syber Espionage Group TEMP.Periscope Targeting U.S. Engineering and Maritime Industries

Suspected Chinese Syber Espionage Group TEMP.Periscope Targeting U.S. Engineering and Maritime Industries

This blog post takes a look at a specific Chinese threat that is impacting Engineering and Maritime corporations.

Added: October 15, 2018
image from The Rise And Fall OF Scan4You

The Rise And Fall OF Scan4You

This is exclusive research into the cyber threat that is Scan4You. It discusses the history and current outcomes of this unique threat.

(more available)
Added: October 15, 2018
image from The State of Malware Detection & Prevention

The State of Malware Detection & Prevention

From the report, “We are pleased to present the findings of The State of Malware Detection & Prevention sponsored by Cyphort. The study reveals the difficulty in preventing and detecting malware and advanced threats. The IT function also seems to lack the information and intelligence necessary to update senior executives on cybersecurity risks.”

(more available)
Added: October 15, 2018
image from Threat Intelligence Executive Reprot 2017: Volume 6

Threat Intelligence Executive Reprot 2017: Volume 6

This Threat Report takes a look at some of the events of late 2017. Specifically, it looks at self-propagating malware, a specific Microsoft Office vuln, and multiple espionage campaigns that target energy utility companies.

(more available)
Added: October 15, 2018
image from Threat Landscape Report Q1 2018

Threat Landscape Report Q1 2018

This report continues Fortinet’s excellent threat report. It discusses operational technology, Zero-day markets, malware, cryptojacking, the hacking event at the winter olympics, the rise of botnets, and Adromeda. Read On!

(more available)
Added: October 15, 2018
image from Threat Report

Threat Report

Advice in this report ranges from the tactical to the strategic. Recognize the importance of solutions that can provide specific benefits yet work as part of a unified security posture. They claim that their security recommendations will provide actionable information and guidance, while taking into account the need for organizations to grow and innovate at the same time.

(more available)
Added: October 15, 2018
  • ««
  • «
  • 65
  • 66
  • 67
  • 68
  • 69
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 16:08 UTC (build b1d7be4)