Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Phishing

Below you will find reports with the tag of “Phishing”

image from Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

The inaugural report from AT&T Business. Leverages data from the AT&T network operations groups as well as outside research firms and network partners.

(more available)
Added: June 13, 2020
image from 2018 Global Security Report

2018 Global Security Report

Year end report from AppRiver using telemetry from the AppRiver security products and events observed by the AppRiver Security Analysts.

(more available)
Added: June 13, 2020
image from 2019 Global Security Report

2019 Global Security Report

A year in review report drawing on the events observed by AppRiver Security analysts and the telemetry from the AppRiver security platforms. Includes predictions for 2020.

(more available)
Added: June 13, 2020
image from 2018 Hacked Website Report

2018 Hacked Website Report

The annual report on trends in malware and hacked website from the incident response and malware research teams at GoDaddy Security /Sucuri.

(more available)
Added: June 13, 2020
image from Human Factor Report 2019

Human Factor Report 2019

An annual report derived from the Proofpoint customer base and the emails processed by the Proofpoint email security platform. Focuses on the “human factor” of organizational cyber security.

(more available)
Added: June 13, 2020
image from 2019 HIMSS Cybersecurity Survey

2019 HIMSS Cybersecurity Survey

A survey of 166 US health information security professionals. Discusses the prevalence of significant security events (primarily e-mail based), positive advances in healthcare security, the threat of complacency when managing programs, and area where there are control gaps.

(more available)
Added: June 12, 2020
image from Analysis of an Attack Surface: Five Ways Hackers are Targeting Organizations

Analysis of an Attack Surface: Five Ways Hackers are Targeting Organizations

A combination of data from RiskIQ’s internet telemetry network and thought analysis, this report covers changes related to the COVID-19 pandemic, organization’s public attack surface, mobile threats, and the importance of JavaScript as an attack vector.

(more available)
Added: June 11, 2020
image from Persistent Vulnerabilities, Their Causes and the Path Forward

Persistent Vulnerabilities, Their Causes and the Path Forward

Covers the long tail of vulnerability patching, whereby vulnerabilities that are not fixed soon after detection can linger for months or more before being addressed. Makes the case for better prioritization mechanisms.

(more available)
Added: June 5, 2020
image from 2019 Application Protection Report, 2nd Edition: The Virtue of Visibility

2019 Application Protection Report, 2nd Edition: The Virtue of Visibility

The second annual application protection report (APR) from F5 Labs combines data from F5’s global customer base with network telemetry from Baffin Bay to catalog and analyze the major threats facing application security practitioners. Includes recommendations for appsec professionals.

(more available)
Added: June 3, 2020
image from 2020 Data Breach Investigations Report

2020 Data Breach Investigations Report

Verizon’s 2020 edition of the keystone DBIR. Covering breaches and attack trends across the previous year.

Added: May 19, 2020
image from Protecting your personal data online at every point

Protecting your personal data online at every point

To protect the data we store on our devices and upload online, we first need to understand where the key risks may lie. This report reviews some of the main stories and tactics we have seen affecting data privacy over the past 12 months and provides advice on how individuals can keep control over their personal data at every turn.

(more available)
Added: May 18, 2020
image from Trend Micro Cloud App Security Report 2019

Trend Micro Cloud App Security Report 2019

Trend Micro looks into the email security threat landscape, looking into threat types, number of threats, etc.

Added: May 18, 2020
image from 2017 Cybercrime Report

2017 Cybercrime Report

This report goes in depth on Cybercrime in 2017.

Added: May 18, 2020
image from 2020 Threat Report

2020 Threat Report

The BlackBerry® Cylance® 2020 Threat Report contains a broad range of topics vital to the interests of businesses, governments, and end-users. It delivers the combined security insights of BlackBerry, a trailblazer in the Internet of things (IoT) and mobile security, and Cylance, an early pioneer of AI-driven cybersecurity and endpoint security market disruptor, which was purchased by BlackBerry in February 2019.

(more available)
Added: May 11, 2020
image from Hook, Line, and Sinker- Why Phishing Attacks Work

Hook, Line, and Sinker- Why Phishing Attacks Work

In this report, we’ll dig deeper into the survey results and present our own understanding of these statistics, as well as analysis from Dr. Gonzalez, insights from cybersecurity experts, real-world phishing stories from our customers and partners, and tips on how to stay safe from phishing threats.

(more available)
Added: May 11, 2020
image from Assessing "Cyber Hygiene" in the U.S.

Assessing "Cyber Hygiene" in the U.S.

Wakefield Research partnered with Webroot to conduct an online quantitative research study among U.S. consumers to:

  • Better understand attitudes, perspectives, and behaviors related to cyber hygiene
  • Based on this data, create a risk index (“Cyber Hygiene Risk Index”) to assess the risks associated with susceptibility to cybercrime in each state, ranking the states to determine the riskiest and least risky states in the U.S.
  • Further analyze respondents’ susceptibility to risk by using a series of custom demographic and psychographic metrics to get a more nuanced understanding of what is behind cyber-hygiene levels
Added: May 11, 2020
image from Surge in security concerns due to remote working during COVID-19 crisis

Surge in security concerns due to remote working during COVID-19 crisis

As people settle into the new way of working with many organizations working from home, it comes as no surprise that attention now turns to being productive as well as secure. In a recent survey, Barracuda found that almost half (46%) of global businesses have encountered at least one cybersecurity scare since shifting to a remote working model during the COVID-19 lockdown. What’s more, an astounding 49 percent say they expect to see a data breach or cybersecurity incident in the next month due to remote working.

(more available)
Added: May 11, 2020
image from 100 Days of Coronavirus

100 Days of Coronavirus

This report focuses on the changes in security threats and the effect that COVID-19 has on the overall landscape.

Added: May 8, 2020
image from Mobile Malware and APT Espionage

Mobile Malware and APT Espionage

In this report, BlackBerry researchers reveal what the focus on those groups has overshadowed: several governments with well-established cyber capabilities have long ago adapted to and exploited the mobile threat landscape for a decade or more. In this context, mobile malware is not a new or niche effort, but a longstanding part of a cross-platform strategy integrated with traditional desktop malware in diverse ways across the geopolitical sphere.

(more available)
Added: May 8, 2020
image from 2020 Trustwave Global Security Report

2020 Trustwave Global Security Report

The 2020 Trustwave Global Security Report is an annual review of the phenomena, trends and statistics affecting computer security and worldwide safety, as observed by Trustwave systems and security analysts throughout 2019. As we enter a new deacade, we take a fresh look at the changing face of the compromise, from the ways in which increasingly sophisticated threat actors adapted in recent years to improvements in threat detection and response and how people in white hats responded.

(more available)
Added: May 8, 2020
image from Top 10 Penetration Findings 2019

Top 10 Penetration Findings 2019

Lares encounters a seemingly endless number of vulnerabilities and attack vectors when we conducta penetration test or red team engagement, regardless of organization size or maturity. Though notevery engagement is identical, we have analyzed the similarities between hundreds of engagementsthroughout 2019 and the following list represents the most frequently observed penetration test findings we encountered.

(more available)
Added: May 8, 2020
  • ««
  • «
  • 10
  • 11
  • 12
  • 13
  • 14
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 08:08 UTC (build b1d7be4)