Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from SecureWorks Threat Intelligence Executive Monthly Report August 2016

SecureWorks Threat Intelligence Executive Monthly Report August 2016

This report from August 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 12, 2018
image from Security Healthcare Information Security Guide

Security Healthcare Information Security Guide

This report provides a collection of articles on Healthcare Security.

Added: October 12, 2018
image from SQL Injection Defense: There are no Silver Bullets

SQL Injection Defense: There are no Silver Bullets

In this technical whitepaper they explain why there’s no single silver bullet answer to SQL injection.

Added: October 12, 2018
image from State of Mac Security 2016:Enterprise Mac Security

State of Mac Security 2016:Enterprise Mac Security

The State of Mac Security Report takes a pulse check of Mac enterprise adoption, examines the reasons behind their increased popularity and crucially, how to overcome the security risks they pose.

(more available)
Added: October 12, 2018
image from State of the Internet Security Report Q1 2018

State of the Internet Security Report Q1 2018

This Quaterly report continues Akamai’s breakdown of the internet security events that occurred in the first Quarter of 2018.

Added: October 12, 2018
image from Taking The Offensive

Taking The Offensive

This paper discusses the necessary element of collaboration that is required for success fighting cybercrime.

Added: October 12, 2018
image from The Dirty Secrets Of Network Firewalls

The Dirty Secrets Of Network Firewalls

In late 2017, Sophos sponsored an independent research study into the state of network security in mid-sized organizations across the globe. This research program explored the experiences, concerns, and future needs of IT managers, with particular focus on firewalls and network defenses.

(more available)
Added: October 12, 2018
image from The Human Factor 2018: People Centered Threats Drive The Landscape

The Human Factor 2018: People Centered Threats Drive The Landscape

This report offers insight into the human factor and how cybercriminals have continued to recognize that the greatest vulnerability of an organization is the humans that run it.

(more available)
Added: October 12, 2018
image from The NTT Security 2018 Global Threat Intelligence Report

The NTT Security 2018 Global Threat Intelligence Report

The NTT Security 2018 Global Threat Intelligence Report highlights notable threats, incidents and trends observed during the previous year.

Added: October 12, 2018
image from The Weakest Link: Why People Are Your Network's Greatest Vulnerability

The Weakest Link: Why People Are Your Network's Greatest Vulnerability

In this white paper, they explore why people are the biggest vulnerability for most organizations, and whether it’s possible to ‘patch’ this vulnerability.

(more available)
Added: October 12, 2018
image from Threat Intelligence Executive Report 2017: Volume 3

Threat Intelligence Executive Report 2017: Volume 3

This Threat Report takes a look at some of the events of spring 2017. Specifically, it looks at criminal campaigns that leveraged exploits exposed by the Shadow Brokers, threat groups that used social media profiles, a threat group that attacked supply chains of large corporations, quickly evicting threat actors from a compromised environment.

(more available)
Added: October 12, 2018
image from Threats Report - March 2016

Threats Report - March 2016

This report discusses two key topics: 1) An Intel Security survey that found that awareness was very high and, 97% of those interviewed, said that sharing cyber intelligence was valuable and 2) They explore the Adwind Java-based Trojan. It also includes the usual key points about predictions and threat summaries.

(more available)
Added: October 12, 2018
image from US Cyber Market Update: 2017 US Cyber Insurance Profits And Performance

US Cyber Market Update: 2017 US Cyber Insurance Profits And Performance

The aim of this report is to provide insights for insurers that currently offer cyber insurance, as well as those seeking to offer it, to provide a performance benchmark, and to give perspective on the industry experience.

(more available)
Added: October 12, 2018
image from Using Deception to Hunt Cyber Attackers

Using Deception to Hunt Cyber Attackers

From the report, “Today, there are a great many detection (identification and tracking) tools. However, there is not enough emphasis on trapping, resulting in a lack of effective trapping tools and techniques. An effective technique for automating the tracking of cyber attackers and, once found, trapping them, is deception. When implemented well, deception can automate and scale the hunting process, accurately identifying and tracking attackers, and trapping them to protect valuable assets while reducing valuable human resources in this never-ending competition of wits.”

(more available)
Added: October 12, 2018
image from What CISO's Worry About In 2018

What CISO's Worry About In 2018

The purpose of the survey was to understand key concerns and opinions of Chief Information Security Officers and CIOs, focused on information security and cyber-risk, as we head into 2018.

(more available)
Added: October 12, 2018
image from Winter 2018 Netskope Cloud Report

Winter 2018 Netskope Cloud Report

This quarterly report from Netskope details information gleaned from providing cloud security to their clients.

Added: October 12, 2018
  • ««
  • «
  • 70
  • 71
  • 72
  • 73
  • 74
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)