Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Phishing

Below you will find reports with the tag of “Phishing”

image from 2016 Data Breach Investigations Report

2016 Data Breach Investigations Report

Verizon’s annual report on data breaches in 2016

Added: October 25, 2018
image from Healthcare Breach Report 2016: What a Difference a Year Makes

Healthcare Breach Report 2016: What a Difference a Year Makes

This report, answers the questions, “why are hackers now targeting healthcare data?” and, “how did they conduct large scale attacks that affected millions?” It also details how healthcare organizations can use a Cloud Access Security Broker to protect data in the cloud, enable secure BYOD and remain HIPAA compliant.

(more available)
Added: October 25, 2018
image from IT Security at SMBs: 2017 Benchmarking Survey

IT Security at SMBs: 2017 Benchmarking Survey

This report presents the results of an in-depth primary market research survey of cyber security decision-makers in small to mid-sized businesses in the United States, conducted during August and September 2017. The goal of their research was to understand how SMBs, undertake decision-making in the context of their internet security, how they evaluate security solutions, and their budgetary concerns.

(more available)
Added: October 25, 2018
image from M-Trends 2018

M-Trends 2018

In this report they look at incidents that occurred between October 2016 and September 2017.

Added: October 25, 2018
image from Malware Review 2018

Malware Review 2018

This report takes a look back at 2017 and a look forward to 2018. It focuses specifically on malware attacks.

(more available)
Added: October 25, 2018
image from Minerva's 2016 Year In Review

Minerva's 2016 Year In Review

Released in 2017, this report details the cyberthreats that Minerva dealt with in 2016.

Added: October 25, 2018
image from Protecting Against Tomorrow's Malware Attacks Today

Protecting Against Tomorrow's Malware Attacks Today

This article from the UK discusses ways that organizations can protect themselves from future Malware attacks.

Added: October 25, 2018
image from Q2 2017 Phishing Trends And Intelligence Report

Q2 2017 Phishing Trends And Intelligence Report

The data and observations presented in this report are sourced from the continuous work PhishLabs does to fight back against phishing attacks and the threat actors behind them. The information highlighted in this report will help organizations better assess and mitigate the risk posed by modern phishing attacks.

(more available)
Added: October 25, 2018
image from Quarterly Threat Summary Q3 2016

Quarterly Threat Summary Q3 2016

This Quarterly report offers key takeaways from the third Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 25, 2018
image from Security Intelligence Report Volume 21

Security Intelligence Report Volume 21

This report focuses on software vulnerabilities, software vulnerability exploits, malware, and unwanted software. It is the hope that readers find the data, insights, and guidance provided in this report useful in helping them protect their organizations, software, and users.

(more available)
Added: October 25, 2018
image from 2015 Polish Internet Security Landscape

2015 Polish Internet Security Landscape

This is a yearly report based on the activities of CERT Polska for the year 2015. Polish authorities, well aware of the dangers, commissioned this report containing proposals for the organization of the defenses system of the syberspace of the Republic of Poland.

(more available)
Added: October 24, 2018
image from 2017 Breach Briefing

2017 Breach Briefing

BBR Services is on the front-lines of breach management and has attained a wealth of cyber expertise and knowledge of emerging trends. From this vantage point we have compiled the 2017 Beazley Breach Briefing, which is based on our 2016 data and provides our unique insight into key trends in data breach causes including factors that impact costs of data breaches.

(more available)
Added: October 24, 2018
image from 2018 Global Threat Report:Blurring The Lines Between Statecraft and Tradecraft

2018 Global Threat Report:Blurring The Lines Between Statecraft and Tradecraft

The issues presented in this 2018 report are Targeted Intrusions, Criminal and Hacktivist Activity, and 2018 Predictions

Added: October 24, 2018
image from 2018 Phishing Trends And Intelligence Report: Hacking The Human

2018 Phishing Trends And Intelligence Report: Hacking The Human

The purpose of this report is to provide insight on significant industry trends, tools, and techniques being used by threat actors to carry out phishing attacks. It also sheds light on why shifts are occurring and what to expect in the coming year.

(more available)
Added: October 24, 2018
image from A Best Practices Guide For Comprehensive Employee Awareness Programs

A Best Practices Guide For Comprehensive Employee Awareness Programs

This guide seeks to aid organizations in creating an effective program for helping raise awareness in employees.

Added: October 24, 2018
image from Cyber Espionage Is Alive And Well APT32

Cyber Espionage Is Alive And Well APT32

This blog post discusses APT32 and it’s targetting of global corporations for destruction.

Added: October 24, 2018
image from Cybercrime - Do You Have it Covered?

Cybercrime - Do You Have it Covered?

This paper looks at the cyber insurance market, the need for expert advice and the steps that organizations can take to ensure that they fully understand their own data risks and security vulnerabilities before taking out a policy.

(more available)
Added: October 24, 2018
image from Cybercrime Tactics And Techniques Q1 2017

Cybercrime Tactics And Techniques Q1 2017

The second edition of this report, looking at noteable threats during the first three months of the year.

Added: October 24, 2018
image from Cybersecurity Threatscape 2017

Cybersecurity Threatscape 2017

This annual report details the cybersecurity trends and threats of 2017.

Added: October 24, 2018
image from Healthcare And Life Sciences: Closing The SaaS Security Gap

Healthcare And Life Sciences: Closing The SaaS Security Gap

This paper seeks to help improve the IT situation in the Healthcare industry.

Added: October 24, 2018
image from Left Of Breach 2018

Left Of Breach 2018

Using a unique approach, this paper offers insight into how using a technique of Marine strategy can protect your company from Phishing attacks.

(more available)
Added: October 24, 2018
  • ««
  • «
  • 19
  • 20
  • 21
  • 22
  • 23
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 04:08 UTC (build b1d7be4)