Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Phishing

Below you will find reports with the tag of “Phishing”

image from 2017 Internet Security Threat Report, Volume 22

2017 Internet Security Threat Report, Volume 22

Symantec has established the largest civilian threat collection network in the world, and through that has developed the Symantec Global Intelligence Network. Through that development comes this report based on their experiences in 2016.

(more available)
Added: October 21, 2018
image from APT37 (Reaper) The Overlooked North Korean Actor

APT37 (Reaper) The Overlooked North Korean Actor

This report takes a look at a North Korean CyberEspionage Groub.

Added: October 21, 2018
image from Email Impersonation Attacks: A Clear And Present Danger

Email Impersonation Attacks: A Clear And Present Danger

Sponsored by Valimail, Email Impersonation Attacks: A Clear & Present Danger, was conducted by Ponemon Institute to understand the challenges organizations face to protect end-users from email threats, such as impersonation attacks.

(more available)
Added: October 21, 2018
image from Enterprise Phishing Resiliency And Defense Report

Enterprise Phishing Resiliency And Defense Report

This annual report takes a specific look at phishing campaigns in 2017.

Added: October 21, 2018
image from GTIC Monthly Threat Report November 2017

GTIC Monthly Threat Report November 2017

This monthly threat report takes a look at the month of November 2017. Specifically, it looks at IoT Attacks, Hidden Cobra, and the Fancy Bear exploit of a Microsoft VULN.

(more available)
Added: October 21, 2018
image from Identity Theft In America

Identity Theft In America

This report provides an overlook at Identity Theft in America and how it can be prevented.

Added: October 21, 2018
image from Increasing Identity Security Without Increasing User Disruptions: A Case For Adaptive Authentication

Increasing Identity Security Without Increasing User Disruptions: A Case For Adaptive Authentication

Read this paper to understand: How attackers compromise organizations, How you can more quickly detect attackers, How you can increase security without disrupting users

(more available)
Added: October 21, 2018
image from Quarterly Report Q2 2017

Quarterly Report Q2 2017

This is a Quarterly Report that looks at Cyber security issues in New Zealand and around the world.

Added: October 21, 2018
image from Quarterly Threat Report Q3 2017

Quarterly Threat Report Q3 2017

This Quarterly report offers key takeaways from the third Quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 21, 2018
image from Remote Control Interloper:Analyzing New Chinese htpRAT Malware Attacks Against ASEAN

Remote Control Interloper:Analyzing New Chinese htpRAT Malware Attacks Against ASEAN

This report discusses a new kind of Remote Access Trojan at use in ASIA, and looks at its connection with the Chinese Government.

(more available)
Added: October 21, 2018
image from A Primer On File-Borne Malware Threats

A Primer On File-Borne Malware Threats

This paper will examine the ways attackers use files to deliver malware, the reasons these methods are effective, and the steps organizations should take to block these kinds of attacks.

(more available)
Added: October 20, 2018
image from APT28: Center Of The Storm

APT28: Center Of The Storm

This report details observations of APT28’s, a Russian Sponsored cyber network, targeting, and an investigation into a related breach. They also provide an update on shifts in the group’s tool development and use, and summarize the tactics APT28 employs to compromise its victims.

(more available)
Added: October 20, 2018
image from ENISA Threat Landscape Report 2017

ENISA Threat Landscape Report 2017

This report summarizes the threat landscape seen in 2017 and gives some clear recommendations for the future.

Added: October 20, 2018
image from Fighting File Based Exploits Across The Expanding Attack Surface

Fighting File Based Exploits Across The Expanding Attack Surface

This report provides insight into taking a proactive approachv against known, unkown, and zero-day exploits that serve as the starting point for multi-vector cyberattacks.

(more available)
Added: October 20, 2018
image from Internet Security Threat Report Volume 23

Internet Security Threat Report Volume 23

This paper explores threats like coin-mining attcks, spike in software supply-chain attacks, the ransomware business, the drop in zero days, and the rise in mobile malware.

(more available)
Added: October 20, 2018
image from McAfee Labs Threats Report June 2018 Infographic

McAfee Labs Threats Report June 2018 Infographic

This is the infographic based on the threat report of the same name.

Added: October 20, 2018
image from Mobile Phishing Report 2018

Mobile Phishing Report 2018

This whitepaper looks at the evolution of mobile phishing - examining why and how people get phished. It explores the prevalence and severity of enterprise phishing techniques, providing actionable advice for how best to protect your mobile device fleet.

(more available)
Added: October 20, 2018
image from Quarterly Threat Report Q2 2018

Quarterly Threat Report Q2 2018

A review of the threat trends from the second quarter of 2018 as seen via ProofPoint’s detection network.

Added: October 20, 2018
image from Biometrics: Introducing The Future Of Authentication

Biometrics: Introducing The Future Of Authentication

This report takes a look at Biometrics and how it can become a great cybersecurity measure.

Added: October 19, 2018
image from Cyber Threats to the Nordic Region

Cyber Threats to the Nordic Region

This report details some of cyber threat activity that has been observed against Denmark, Finland, Iceland, Norway, and Sweden. It explores motivations of the cyber threat and factors that could trigger future activity in the region.

(more available)
Added: October 19, 2018
image from Cyberthreat Report

Cyberthreat Report

This paper is based on a study that sought to understand the challenges associated with delivering web security, as well as to gauge receptivity to cloud-based web security solutions.

(more available)
Added: October 19, 2018
  • ««
  • «
  • 22
  • 23
  • 24
  • 25
  • 26
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 08:08 UTC (build b1d7be4)