Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Phishing

Below you will find reports with the tag of “Phishing”

image from Security Practices Guide For SOC 2 Compliance

Security Practices Guide For SOC 2 Compliance

This is a short guide for helping organizations become SOC 2 compliant.

Added: October 23, 2018
image from Soft Target:The Top 10 Vulnerabilities Used by Cybercriminals

Soft Target:The Top 10 Vulnerabilities Used by Cybercriminals

This annual report takes a look at the most popular vulnerabilites used by cybercriminals. It intends to help organizations make good, informed decisions about their cyber security.

(more available)
Added: October 23, 2018
image from Sophisticated Phishing Attack Wreaks Havoc

Sophisticated Phishing Attack Wreaks Havoc

This whitepaper follows a specific Phishing attack and details the events that took place.

Added: October 23, 2018
image from The Fraud Beat 2016

The Fraud Beat 2016

This report discusses the reality that everyone is susceptible to fraudulent emails. It discusses why that is the case, and offers some solutions.

(more available)
Added: October 23, 2018
image from Threat Advisory: Tiscali App

Threat Advisory: Tiscali App

This is a threat advisory for the Tiscali App.

Added: October 23, 2018
image from What A Hacker Sees: Top 20 CIS Critical Security Controls

What A Hacker Sees: Top 20 CIS Critical Security Controls

This paper discusses the top 20 Center for Internet Security (CIS) Critical Security Controls (CSC) come into play, providing organizations with 20 key controls that they can implement to mitigate some of the threats they are facing.

(more available)
Added: October 23, 2018
image from 2015 Data Breach Investigations Report

2015 Data Breach Investigations Report

Verizon’s annual report on all data breaches in 2015

Added: October 22, 2018
image from 2017 Annual Threat Report

2017 Annual Threat Report

The object of this report is to answer the question, what will happen in 2018?

Added: October 22, 2018
image from Application Usage and Threat Report

Application Usage and Threat Report

This report examines key trends across the threat landscape and application usage, including topics on how organizations can educate users and utilize controls to effectively reduce the attack surface available to an adversary, the potential effects of non-standard network activity, the reuse of legacy attack tactics, and the benefits of open threat intelligence sharing.

(more available)
Added: October 22, 2018
image from Best Practices For Enterpise Phishing Protection

Best Practices For Enterpise Phishing Protection

This whitepaper presents 15 best practices for making users a powerful layer of phishing defense.

Added: October 22, 2018
image from Five Phishing Predictions 2018

Five Phishing Predictions 2018

This report offers some significant predictions of phishing attacks in 2018.

Added: October 22, 2018
image from Global Information Security Survey 2015 Summary

Global Information Security Survey 2015 Summary

EY’s Global Information Security Survey investigates the most important cybersecurity issues facing businesses today. It captures the responses of 1,755 participants around the globe and across sectors, and our findings and conclusions are based on those insights and on our extensive global experience working with clients to help improve their cybersecurity.

(more available)
Added: October 22, 2018
image from GTIC Monthly Threat Report October 2017

GTIC Monthly Threat Report October 2017

This monthly threat report takes a look at the month of October 2017. More specifically, it takes a look at the shift in Phishing campaigns, the WIFI WPA Security VULN, and a variety of other threats.

(more available)
Added: October 22, 2018
image from Insights Into Iranian Cyber Espionage APT33

Insights Into Iranian Cyber Espionage APT33

This blog post provides great discussion and insight into an APT operating out of Iran that is specifically targeting the Aerospace and Defense Industries.

(more available)
Added: October 22, 2018
image from ISTR Email Threats 2017

ISTR Email Threats 2017

This special report analyzes Email and the threats that occur in that environment.

Added: October 22, 2018
image from Mobile Threat Report Q3 2017

Mobile Threat Report Q3 2017

This report provides insights into the security events in mobile threats from the 3rd quarter of 2017

Added: October 22, 2018
image from Not If But When: Why Community Banks and Credit Unions Should Invest In Fraud Protection

Not If But When: Why Community Banks and Credit Unions Should Invest In Fraud Protection

From the Report, “A common refrain from community banks and credit unions is that since they are not experiencing a fraud attack at the moment, they don’t see any need to invest in fraud protection. Now apply the same logic elsewhere – it follows then, that purchasing home insurance doesn’t make sense, as my house isn’t currently on fire. This kind of reasoning is short-sighted and leaves banks and their customers vulnerable to fraud–related financial losses. It also ignores a growing, if unfortunate, precedent – that losses from cyberattacks number in the billions of dollars annually (one report put it as high as $445 billion), and it continues to rise every year.”

(more available)
Added: October 22, 2018
image from Quarterly Report Q3 2017

Quarterly Report Q3 2017

This is a quarterly report that looks at cyber security issues in New Zealand and around the world.

Added: October 22, 2018
image from Quarterly Threat Report Q4 2017

Quarterly Threat Report Q4 2017

This quarterly report offers key takeaways from the fourth quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 22, 2018
image from Social Engineering:How The Human Factor Puts Your Company At Risk

Social Engineering:How The Human Factor Puts Your Company At Risk

Positive Technologies regularly performs assessment of information security awareness among employees at major companies all over the world. This report provides statis- tics and analysis from 10 most instructive testing projects in 2016 and 2017, including examples of successful attacks against employees. These projects are based on various social engineering techniques and generally included emails, phone conversations, and communication via social networks.

(more available)
Added: October 22, 2018
image from The Nervous, The Vigilant, And The Battle-Scarred: IT Security Personas Revealed

The Nervous, The Vigilant, And The Battle-Scarred: IT Security Personas Revealed

This book offers some insight into email cybersecurity issues. It posits that email doesn’t have to be scary.

Added: October 22, 2018
  • ««
  • «
  • 21
  • 22
  • 23
  • 24
  • 25
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 12:08 UTC (build b1d7be4)