Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Network Intrusion

Below you will find reports with the tag of “Network Intrusion”

image from 2024 Incident Response Report

2024 Incident Response Report

In this report, we bring you the insights from that data. It’s part of how we empower organizations to proactively navigate cyber risks, strengthen security approaches, and respond to incidents with unmatched efficiency. This report helps because it gathers real-world information from organizations like yours, so you can learn which threats really a#ect your peers–and how you can face them.

(more available)
Added: February 26, 2024
image from 2023 Elastic Global Threat Report

2023 Elastic Global Threat Report

The 2023 Elastic Global Threat Report is a summary of more than a billion data points distilled down to a small number of distinct categories. We describe the tools, tactics, and procedures of threats from the perspective of endpoints and cloud infrastructure — the most common enterprise attack surfaces — so readers with varying priorities can determine the best course of action to take next.

(more available)
Added: October 19, 2023
image from 2023 State of Mobile App Security

2023 State of Mobile App Security

Today’s apps are multifunctional, combining communication, collaboration, and commerce. The fragmentation of mobile devices, cloud computing, and third-party components and services have changed how apps store, transmit, and process data. As a result, sensitive information is at risk thanks to the expansion of the attack surface and the rapid evolution of threats.

(more available)
Added: September 21, 2023
image from 2022 State of Ransomware Preparedness Report

2022 State of Ransomware Preparedness Report

Axio researchers analyzed updated data from the Axio360 Ransomware Preparedness Assessment tool to prepare the 2022 State of Ransomware Preparedness report (2022 Study). The Ransomware Preparedness Assessment is informed by input from hundreds of ransomware events, guidance from the U.S. Department of Homeland Security, and Axio’s own research. Organizations across multiple critical infrastructure sectors have used the tool to determine the strength of their ransomware practices and controls, to identify gaps, and to prioritize improvements.

(more available)
Added: August 28, 2023
image from Security Implications of ChatGPT

Security Implications of ChatGPT

This paper aims to provide a high-level overview of the implications of ChatGPT in the cybersecurity industry, without delving into the granular details of artificial intelligence. We will explore the key concepts and domains that are crucial for understanding ChatGPT’s capabilities, as well as the potential impact on businesses.

(more available)
Added: August 3, 2023
image from 2023 State of Operational Technology and Cybersecurity Report

2023 State of Operational Technology and Cybersecurity Report

The Fortinet 2023 State of Operational Technology and Cybersecurity Report is our fifth annual study based on data from an in-depth worldwide survey of 570 OT professionals conducted by a respected third-party research company.

(more available)
Added: July 5, 2023
image from 2022 Forgerock Consumer Identity Breach Report

2022 Forgerock Consumer Identity Breach Report

Our report focuses on confirmed breaches in which confidential data is exposed and/or stolen. A confirmed breach can refer to a single record being stolen — and such a breach must be analyzed and remediated to determine the source — but because most breaches are financially driven, attackers target large caches of data that they can hold for ransom or sell on the dark web.

(more available)
Added: June 29, 2023
image from 2023 ForgeRock Identity Breach Report

2023 ForgeRock Identity Breach Report

This report focuses on confirmed breaches in which confidential data has been exposed and/or stolen, ranging from very small breaches to large caches of data that provide financial incentives to hackers to hold for ransom, sell on the dark web, or both. . Many breaches that occurred as a result of third parties (vendors, suppliers, contractors, or other organizations) were researched to determine the root causes.

(more available)
Added: June 29, 2023
image from Global Threat Landscape Report February 2023

Global Threat Landscape Report February 2023

FortiGuard Labs experts leverage Fortinet’s large global footprint to continually monitor the threat landscape and the major geopolitical events that influence it. This report presents findings and insights from six months of intense research, with recommendations for leaders and practitioners to better prepare and protect your organization.

(more available)
Added: May 3, 2023
image from Threat Intelligence Spotlight: Protecting Your Law Firm's Data, Clients, and Reputation

Threat Intelligence Spotlight: Protecting Your Law Firm's Data, Clients, and Reputation

In this threat intelligence spotlight report, eSentire’s Threat Response Unit (TRU) provides a threat analysis of the most common cyber threat detected across our global legal customer base.

(more available)
Added: May 3, 2023
image from Global Threat Report Vol. 1 2022

Global Threat Report Vol. 1 2022

This report describes threat phenomena, trends, and recommendations we believe will help organizations prepare for the future. Elastic discloses malware research, attack patterns, and clusters of malicious activity to the community -summarized in this inaugural report. Throughout this report, we observe that financially motivated threats are the most active, and the groups responsible for them are acting with increasing speed.

(more available)
Added: May 1, 2023
image from M-Trends Report 2023

M-Trends Report 2023

In releasing our annual M-Trends report, we aim to provide some of that same critical intelligence to the greater security community. M-Trends 2023 continues our tradition of offering details on the evolving cyber landscape, mitigation recommendations, and a wide variety of security incident-related metrics.

(more available)
Added: April 19, 2023
image from Cybersecurity Maturity Report 2023

Cybersecurity Maturity Report 2023

In this report, we highlight which industries and countries have the most robust cyber postures and which are lagging, as well as the most prevalent vulnerabilities. We also examine the scores across different industries, countries, and company sizes and provide recommendations and best practices on how to achieve a better cyber posture. This report is based on data gathered over two years of cyber assessments, spanning 15 countries and nearly a dozen industries. Each assessment includes an evaluation of the organization across seven different security domains, with a total of 312 data points.

(more available)
Added: April 19, 2023
image from Using data to prioritize cybersecurity investments

Using data to prioritize cybersecurity investments

For the report, Marsh McLennan paired its extensive proprietary dataset of cyber claims with the results from Marsh Cybersecurity Self-Assessment (CSA) questionnaires, which are composed of hundreds of questions and responses from individual organizations. When combined, the two datasets allow for deep insights into which cybersecurity controls have the greatest effect on the likelihood of an organization experiencing a cyber event. Such innovative use of data and analytics can help companies identify which controls to prioritize. In turn, this can help position an insured favorably during cyber insurance underwriting.

(more available)
Added: April 11, 2023
image from 2023 Threat Detection Report

2023 Threat Detection Report

This report is based on in-depth analysis of nearly 40,000 threats detected across our 800+ customers’ endpoints, networks, cloud workloads, identities, and SaaS applications over the past year. This report provide you with a comprehensive view of this threat landscape, including new twists on existing adversary techniques, and that our team has observed as adversaries continue to organize, commoditize, and ratchet up their cybersecurity operations.

(more available)
Added: March 24, 2023
image from Underground Threat Activity Report 2022

Underground Threat Activity Report 2022

In our Underground Threat Activity report, you will find detailed analyses of cyberforum activities that we have observed over the past year, from emerging trends and cybercrime statistics to TTPs employed by TAs across several industries. You can also find our recommendations to mitigate the impact of these attacks, as well as our predictions from the evolution of the threat landscape and emerging threats that we may see in the future.

(more available)
Added: March 7, 2023
image from 2023 Global Threat Report

2023 Global Threat Report

The report shows that security must parallel the slope of technology innovation. As technology matures, security has to mature and match the innovation of the technology running our organizations. The same thing can be said for the adversary. With every innovation we achieve, we can expect the adversary to actively seek ways to exploit it. From the cloud to Kubernetes, from Al to applications and more, as technology gets more complex and provides tremendous operational gains, security must evolve to protect the productivity we gain.

(more available)
Added: March 3, 2023
image from 2023 SonicWall Cyber Threat Report

2023 SonicWall Cyber Threat Report

The 2023 SonicWall Cyber Threat Report provides critical insights and actionable intelligence needed to safeguard your organization from new and emerging cyber threats. The bi-annual report includes key threat intelligence, trend analysis and changes in cybercriminal tactics - al in one in-depth resource.

(more available)
Added: March 1, 2023
image from 2022 Global Threat Analysis Report

2022 Global Threat Analysis Report

Radware’s 2022 Global Threat Analysis Report reviews the year’s most important cybersecurity events and provides detailed insights into the attack activity of 2022. The report leverages intelligence provided by Radware’s Threat Intelligence Team, and network and application attack activity sourced from Radware’s Cloud and Managed Services, Global Deception Network and Threat Research team.

(more available)
Added: February 23, 2023
image from 2022 State of the Threat

2022 State of the Threat

The purpose of this report is to share our view on how the threat landscape has evolved over the last twelve months, with a clear focus on our first-hand observations of threat actor tooling and behaviors. This report reviews changes in the ransomware landscape, and in the behavior of threat actors enabling ransomware groups with malware like loaders and stealers. It surveys significant activity by major government-sponsored threat groups. And it examines how threat actors move swiftly to exploit new vulnerabilities, and how they combine sophisticated with more basic techniques to evade detection by defenders once inside the network. The report concludes by examining how Taegis forms the backbone of this visibility.

(more available)
Added: February 14, 2023
image from Disrupting Initial Access

Disrupting Initial Access

This report summarizes the ever-changing TTPs leveraged to achieve Initial Access from security incidents thwarted by eSentire’s 24/7 SOC Analysts over a two-year period between April 2020 to April 2022. Experts from out TRU team have summarized an analysis of Initial Access trends and presented recommendations on how your organization can precent attackers from establishing initial footholds and deploying malware.

(more available)
Added: February 14, 2023
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)