Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Operating System

Below you will find reports with the tag of “Operating System”

image from Automotive Cybersecurity in 2022

Automotive Cybersecurity in 2022

In our report, we investigate the cyberthreats that have been launched on the automotive industry in 2021 and 2022. We dig into the most prominent attacks, point out high-risk areas that could be targeted in the future, and give our security recommendations and predictions for 2023.

(more available)
Added: November 29, 2022
image from The 2020 Duo Trusted Access Report

The 2020 Duo Trusted Access Report

For the 2020 Duo Trusted Access Report, our data shows that more organizations across all industries are enabling their workforces to work from home now, and potentially for an extended period of time. They’re also implementing the appropriate security controls to ensure secure access to applications. In this report, we’ll look at how companies are currently securing remote work and what makes a solid and secure remote access strategy.

(more available)
Added: June 15, 2022
image from The Red Report 2021

The Red Report 2021

The Red Report 2021 reveals an increase in the number of average malicious actions per malware. Another key finding of the report is that T1059 Command and Scripting Interpreter is the most prevalent ATT&CK technique, utilized by a quarter of all the malware samples analyzed. This report also reveals that five of the top ten ATT&CK techniques observed are categorized under the TA005 Defense Evasion tactic.

(more available)
Added: May 20, 2022
image from CyberCrime Trends and Highlights Q3 2021

CyberCrime Trends and Highlights Q3 2021

From Q2 to Q3 2021, ransomware gained increasing attention. In Q3 2021, threat actors also continued mass exploitation of vulnerabilities in systems, including those in Microsoft Exchange.

(more available)
Added: May 16, 2022
image from 2020 Threat Detection Report

2020 Threat Detection Report

This report is an in-depth analysis of tens of thousands of threats detected across our customers’ environments, this research arms security leaders and their teams with a unique understanding of the threats they’re facing.

(more available)
Added: April 19, 2022
image from 2021 Threat Detection Report

2021 Threat Detection Report

This report is based on in-depth analysis of roughly 20,000 confirmed threats detected across our customers’ environments, this research arms security leaders and their teams with actionable insights into the malicious activity and techniques we observe most frequently.

(more available)
Added: April 5, 2022
image from State of Software Security v12

State of Software Security v12

This report looks at the entire history of active applications, not just the activity associated with the application over one year. By doing so, we can view the full life cycle of applications, which results in more accurate metrics and observations. Aside from looking at the past, this report also imagines the future by considering practices that might help improve application security.

(more available)
Added: February 10, 2022
image from 2020 Unit 42 IoT Threat Report

2020 Unit 42 IoT Threat Report

This annual report looks at changes in internet of things security.

Added: November 1, 2020
image from Looking Into the Eye of the Interplanetary Storm

Looking Into the Eye of the Interplanetary Storm

This article offers a glimpse into the inner workings of the Interplanetary Storm botnet, provides an exhaustive technical analysis of the Golang-written binaries along with an overview of the protocol internals and finally, some attribution information.

(more available)
Added: October 18, 2020
image from Survey: IT Remains Blind to Millions as a Quarter of Remote Workers Would Rather Suffer in Silence than Engage Tech Teams

Survey: IT Remains Blind to Millions as a Quarter of Remote Workers Would Rather Suffer in Silence than Engage Tech Teams

This is a report based on a 2020 survey of remote workers. It emphasizes the disconnect between the company and the worker associated with remote work.

(more available)
Added: October 7, 2020
image from Vulnerability Remediation Performance Snapshot for the Manufacturing Sector

Vulnerability Remediation Performance Snapshot for the Manufacturing Sector

An extension of the Prioritization to Prediction series, this report uses a sample of over 40 manufacturing sector firms to better understand the means and metrics of vulnerability management with the sector.

(more available)
Added: September 23, 2020
image from Vulnerability Remediation Performance Snapshot for the Healthcare Sector

Vulnerability Remediation Performance Snapshot for the Healthcare Sector

An extension of the Prioritization to Prediction series, this report uses a sample of approximately 30 healthcare sector firms to better understand the means and metrics of vulnerability management with the sector.

(more available)
Added: September 23, 2020
image from Vulnerability Remediation Performance Snapshot for the Finance Sector

Vulnerability Remediation Performance Snapshot for the Finance Sector

An extension of the Prioritization to Prediction series, this report uses a sample of approximately 100 finance sector firms to better understand the means and metrics of vulnerability management with the sector.

(more available)
Added: September 23, 2020
image from Vulnerability Remediation Performance Snapshot for the Technology Sector

Vulnerability Remediation Performance Snapshot for the Technology Sector

An extension of the Prioritization to Prediction series, this report uses a sample of approximately 70 technology services to better understand the means and metrics of vulnerability management with the sector.

(more available)
Added: September 23, 2020
image from 2020 Open Source Security and Risk Analysis Report

2020 Open Source Security and Risk Analysis Report

The 2020 OSSRA includes insights and recommendations to help security, risk, legal, and development teams better understand the open source security and license risk landscape.

(more available)
Added: July 31, 2020
image from Weaving a Safer Web: The State and Significance of TLS 1.2 Support

Weaving a Safer Web: The State and Significance of TLS 1.2 Support

A deep dive into the state of deploying the latest TLS version (v1.2) and the use of this signal for correlating with broader public-facing risk surfaces and characteristics of firms.

(more available)
Added: July 6, 2020
image from 2019 HIMSS Cybersecurity Survey

2019 HIMSS Cybersecurity Survey

A survey of 166 US health information security professionals. Discusses the prevalence of significant security events (primarily e-mail based), positive advances in healthcare security, the threat of complacency when managing programs, and area where there are control gaps.

(more available)
Added: June 12, 2020
image from An Insider View to the Increasingly Complex Kingminer Botnet

An Insider View to the Increasingly Complex Kingminer Botnet

A detailed technical analysis of the Kingminer botnet malware, including the C&C network, infection vectors, payload, and auxiliary components.

Added: June 9, 2020
image from Persistent Vulnerabilities, Their Causes and the Path Forward

Persistent Vulnerabilities, Their Causes and the Path Forward

Covers the long tail of vulnerability patching, whereby vulnerabilities that are not fixed soon after detection can linger for months or more before being addressed. Makes the case for better prioritization mechanisms.

(more available)
Added: June 5, 2020
image from Securing Smart Factories

Securing Smart Factories

A look at the unique threat and risk landscape of the manufacturing industry. Discussing the challenges brought about by Industry 4.0, and recommends measures and best practices for securely reaping the benefits of connected production. We also reiterate that securing the manufacturing industry requires regular risk assessments and a resilient cybersecurity framework that is able to detect, respond to, and protect against a variety of security holes.

(more available)
Added: May 18, 2020
image from Threat Insights Report 2020

Threat Insights Report 2020

We built our 2020 Threat Insights Report on this foundation, to help guide you in protecting against what’s to come. Because moving forward, the right combination of protections is not a difference between one cybersecurity solution or another; it’s the difference between being protected against tomorrow’s threats or becoming their prey.

(more available)
Added: May 11, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 08:08 UTC (build b1d7be4)