Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Phishing

Below you will find reports with the tag of “Phishing”

image from Phishing In The Age Of SaaS

Phishing In The Age Of SaaS

Phishing attacks have become the primary hacking method used against organizations. In the past, there was a tendency to blame the user, but attacks have evolved to appear so genuine that even the most security-savvy recipient can be fooled. Phishing attacks have recently experienced newfound success with the proliferation of SaaS in the workplace. This paper discusses what a company can do to deal with this new reality.

(more available)
Added: October 24, 2018
image from Quarterly Threat Summary Q2 2016

Quarterly Threat Summary Q2 2016

This Quarterly report offers key takeaways from the second Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 24, 2018
image from Security Intelligence Report Volume 20

Security Intelligence Report Volume 20

This report focuses on software vulnerabilities, software vulnerability exploits, malware, and unwanted software. It is the hope that readers find the data, insights, and guidance provided in this report useful in helping them protect their organizations, software, and users.

(more available)
Added: October 24, 2018
image from State Of CyberSecurity Implications For 2016

State Of CyberSecurity Implications For 2016

This paper is the presentation of data found through a survey administered in November and December of 2015.

Added: October 24, 2018
image from Threat Intelligence Executive Report 2018: Volume 1

Threat Intelligence Executive Report 2018: Volume 1

This Threat report details some early 2018 threats like cryoticurrency mining, hardware vulns, and government sponsored cyber threats.

Added: October 24, 2018
image from Understanding The Mobile Threat Landscape In 2018

Understanding The Mobile Threat Landscape In 2018

“2017 was a huge year for mobile security. Malicious actors returned with a vengeance and cyber attacks grew rapidly in sophistication. Ransomware outbreaks like WannaCry and Petya hit enterprises globally causing unparalleled disruption, new vulnerabilities like BlueBorne were discovered and malware variants grew more aggressive and prevalent by the day. This report will summarise the key mobile security trends that emerged in 2017, and summarise thoughts for the mobile threat landscape for the year ahead.”

(more available)
Added: October 24, 2018
image from Whaling Anatomy Of An Attack: Protecting Your Organization From CEO Email Scams

Whaling Anatomy Of An Attack: Protecting Your Organization From CEO Email Scams

This book takes a look at “whaling” scams. Or largescale phishing attacks. It offers some analysis and insight into how these scams can be avoided.

(more available)
Added: October 24, 2018
image from 2017 Hacked Website Report

2017 Hacked Website Report

This is an annual report that discusses the latest malware and hacking trends in compromised websites.

Added: October 23, 2018
image from Anatomy Of A Cyber Extortion Operation

Anatomy Of A Cyber Extortion Operation

In this report, they describe FIN10’s activities and tactics, techniques and procedures (TTPs), and provide a glimpse into how they execute their operations.

(more available)
Added: October 23, 2018
image from Balancing Humans And Machines

Balancing Humans And Machines

Aaron Higbee, Co-founder and CTO, PhishMe, (now CoFense) discusses the future of phishing defence and asks which side of the fence the future of defence against phishing attacks lies: human or machine?

(more available)
Added: October 23, 2018
image from Callisto Group

Callisto Group

This White Paper is a report regarding The Callisto Group. The Callisto Group is an advanced threat actor whose known targets include military personnel, government officials, think tanks, and journalists in Europe and the South Caucasus. Their primary interest appears to be gathering intelligence related to foreign and security policy in the Eastern Europe and South Caucasus regions.

(more available)
Added: October 23, 2018
image from Custom Applications and laaS Trends 2017

Custom Applications and laaS Trends 2017

“Enterprises rely on custom applications to perform business-critical functions. Any downtime could halt operations. Our survey found that while enterprises have confidence in the security of IaaS providers’ underlying infrastructure compared with their own datacenters, data in custom applications is exposed to a wide range of threats independent of the platform. That includes accounts compromised by third parties—via phishing or another method. There are a growing number of examples such as Code Spaces where attackers have held data ransom and in some cases permanently deleted enterprise data in these applications. This report summarizes the scale of custom applications deployed today, where they are deployed, how they are secured, and who is responsible for securing them.”

(more available)
Added: October 23, 2018
image from Definitive Guide To Ransomware

Definitive Guide To Ransomware

In this whitepaper, they explore the growing threat of ransomware and what you can do to keep your organization secure.

(more available)
Added: October 23, 2018
image from Enterprise Mobile: The New Threat Vector

Enterprise Mobile: The New Threat Vector

This paper discusses the new threat vector that has been created by bringing an enterprise into the mobile age.

Added: October 23, 2018
image from Examining The Costs and Causes of Cyber Incidents

Examining The Costs and Causes of Cyber Incidents

Researchers built a number of scanning devices using Raspberry Pi minicomputers and, by taking them out to athletic events and busy public spaces, found that tracking of individuals was possible.

(more available)
Added: October 23, 2018
image from GTIC Monthly Threat Report September 2017

GTIC Monthly Threat Report September 2017

This monthly threat report takes a look at the month of September 2017. More specifically, it takes a look at VULNS, Apache Exploits, and the Equifax breach.

(more available)
Added: October 23, 2018
image from MediaPro Best Practice Series: Battling The Forgetting Curve

MediaPro Best Practice Series: Battling The Forgetting Curve

This paper seeks to provide guidance in understanding the best ways to train employees so that the don’t forget important information.

(more available)
Added: October 23, 2018
image from Mobile Access Optimization And Security For The Cloud Era

Mobile Access Optimization And Security For The Cloud Era

This short e-Book takes a look at the unique problems that are caused by mobile access in the cloud era.

(more available)
Added: October 23, 2018
image from Quarterly Report Q4 2017

Quarterly Report Q4 2017

This is a Quarterly Report that looks at Cyber security issues in New Zealand and around the world.

Added: October 23, 2018
image from Quarterly Threat Summary Q1 2016

Quarterly Threat Summary Q1 2016

This Quarterly report offers key takeaways from the first Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 23, 2018
image from Security Intelligence Report Volume 19

Security Intelligence Report Volume 19

This report focuses on software vulnerabilities, software vulnerability exploits, malware, and unwanted software. It is the hope that readers find the data, insights, and guidance provided in this report useful in helping them protect their organizations, software, and users.

(more available)
Added: October 23, 2018
  • ««
  • «
  • 20
  • 21
  • 22
  • 23
  • 24
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 04:08 UTC (build b1d7be4)