Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Man-in-the-Middle

Below you will find reports with the tag of “Man-in-the-Middle”

image from 2022 Attack Vectors Report

2022 Attack Vectors Report

For this year’s report, we have incorporated additional data from previous years to provide an enhanced view of the present threat climate. Additionally, given the prevalence of internal compromises over external, we chose to focus the bulk of our analysis on internal attack vectors, and then compared this data to maturity scores.

(more available)
Added: August 8, 2023
image from The State of Passwordless Security 2022

The State of Passwordless Security 2022

The 2022 State of Passwordless Security Report is based on a comprehensive survey of 411 technology professionals to explore the state of conventional and passwordless authentication, key drivers and barriers to adoption, and organizations’ technology preferences. Respondents range from technical executives to IT security practitioners, representing a cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: October 17, 2022
image from 2022 Ransomware/ Malware Report

2022 Ransomware/ Malware Report

This report is based on the results of a comprehensive online survey of 225 cybersecurity professionals, to gain more insight into the latest trends, key challenges, and solutions for malware and ransomware security. The respondents range from technical executives to managers and iT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: October 14, 2022
image from State of Software Security v11: Open Source Edition

State of Software Security v11: Open Source Edition

Get best practices on managing your open source libraries in our State of Software Security v11: Open Source Edition report. Based on 13 million scans of more than 86,000 repositories, SOSS v11: Open Source Edition gives you a unique perspective on the open source libraries in codebases today, how organizations are managing the security of these libraries, and best practices on using open source code securely.

(more available)
Added: June 22, 2021
image from Zerologon: Unauthenticated Domain Controller Compromise by Subverting Netlogon Cryptography (CVE-2020-1472)

Zerologon: Unauthenticated Domain Controller Compromise by Subverting Netlogon Cryptography (CVE-2020-1472)

This whitepaper explains a new vulnerability in Windows Server that is highly exploitable.

Added: October 18, 2020
image from Go Nuclear: Breaking Radiation Monitoring Devices

Go Nuclear: Breaking Radiation Monitoring Devices

The purpose of this research is to provide a comprehensive description of the technical details and approach IOActive used to discover vulnerabilities affecting widely deployed radiation monitoring devices. Our work involved software and firmware reverse engineering, RF analysis, and hardware hacking.

(more available)
Added: March 9, 2019
image from KRACK Attack: WPA2 Wi-Fi Vulnerability

KRACK Attack: WPA2 Wi-Fi Vulnerability

This report takes a look at the “Key Reinstallation Attack” VULN that works against all modern protected Wi-Fi- networks.

Added: December 5, 2018
image from A SaaS Provider Survival Guide

A SaaS Provider Survival Guide

This report covers performance, security, and encryption essentials for online applications.

Added: October 26, 2018
image from Definitive Guide To Secure Remote Access

Definitive Guide To Secure Remote Access

The purpose of this document is to provide answers to what to look for when choosing a security tool for remote access to internal applications.

(more available)
Added: October 26, 2018
image from Threat Advisory: betFIRST mobile apps

Threat Advisory: betFIRST mobile apps

This is a threat advisory for betFIRST mobile apps

Added: October 24, 2018
image from Mobile Wi-Fi Security Report

Mobile Wi-Fi Security Report

This report is designed to inform you of the many dangers of Wi-Fi, and how to deal with them.

Added: October 21, 2018
image from TPM Genie: Interposer Attacks Against the Trusted Platform Module Serial Bus

TPM Genie: Interposer Attacks Against the Trusted Platform Module Serial Bus

This report provides an analysis of TPM Genie. TPM Genie is a serial bus interposer which has been designed to aid in the security research of Trusted Platform Module hardware. The tool demonstrates that a man-in- the-middle on the TPM serial bus can undermine many of the stated purposes of the TPM such as measured boot, remote attestation, sealed storage, and the hardware random number generator.

(more available)
Added: October 21, 2018
image from Mobile Data Report

Mobile Data Report

This report looks at data from the mobile estates of global asset management and investment firms; providing analysis, benchmarking and best practice guidance on keeping mobile devices secure and managing data consumption.

(more available)
Added: October 18, 2018
image from Evaluation Guide For Mobile App Security Testing

Evaluation Guide For Mobile App Security Testing

This book provides some good guidance for app security testing. It seeks to assist enterprises with solving the issues surrounding app security.

(more available)
Added: October 16, 2018
image from Threat Advisory: CBS mobile apps & website

Threat Advisory: CBS mobile apps & website

This is a threat advisory for CBS mobile apps & website

Added: October 13, 2018
image from Threat Advisory: CardCrypt

Threat Advisory: CardCrypt

This is a threat advisory for CardCrypt

Added: October 12, 2018
© Cyentia Institute 2025
Library updated: June 24, 2025 04:08 UTC (build b1d7be4)