Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Phishing

Below you will find reports with the tag of “Phishing”

image from GTIC Monthly Threat Report June 2017

GTIC Monthly Threat Report June 2017

This monthly threat report takes a look at the month of June 2017. More specifically, it takes a look at the Trickbot ‘mac1’ Phishing campaign.

(more available)
Added: October 19, 2018
image from Hospital Network Security Requirements:5 Steps Beyond Compliance

Hospital Network Security Requirements:5 Steps Beyond Compliance

As this report states, you can be compliant, but still not be secure. Read the 5 steps that can help make your hospital secure beyond the requirements for compliance.

(more available)
Added: October 19, 2018
image from Internet Security Threat Report 2016

Internet Security Threat Report 2016

This report details 6 key findings from Symantec’s breakdown of the security issues of 2016.

Added: October 19, 2018
image from Open Banking Security Considerations And Potential Risks

Open Banking Security Considerations And Potential Risks

This report takes a good look at Open Banking, it defines what it is, and considers the security implications for using it.

(more available)
Added: October 19, 2018
image from Quarterly Threat Report Q2 2017

Quarterly Threat Report Q2 2017

This Quarterly report offers key takeaways from the second Quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 19, 2018
image from The CISO's Dilemma: Security Versus Productivity

The CISO's Dilemma: Security Versus Productivity

This study looks at what today’s organizations are doing to prevent endpoint breaches targeting employees, the success of those efforts, and the associated costs that make this whole approach rather frustrating.

(more available)
Added: October 19, 2018
image from Thwarting The Tricksters Out To Get Your Money

Thwarting The Tricksters Out To Get Your Money

This small article discusses the importance of your organization getting ahead of phishing email campaigns.

Added: October 19, 2018
image from 2015 Internet Security Threat Report, Volume 20, Appendices

2015 Internet Security Threat Report, Volume 20, Appendices

The 2015 Internet Security Threat Report (ISTR) provides an overview and analysis of the year in global threat activity. (aggregating and collecting data collected from Symantec devices and customers)

(more available)
Added: October 18, 2018
image from 2015 State Of The Phish

2015 State Of The Phish

To provide a clearer idea of where, and how, organizations make themselves most vulnerable to phishing attacks, ThreatSim has prepared this 2015 report, which pools two sources of data: 1) ThreatSim’s anonymous data aggregated across our customer base, involving millions of simulated email phishing. 2) A survey of information technology executives, administrators, and information security professionals.

(more available)
Added: October 18, 2018
image from 2017 Bitdefender Ransomware Reprot

2017 Bitdefender Ransomware Reprot

This is a solid breakdown of the Ransomware issues as seen in 2017.

Added: October 18, 2018
image from 2017 Ransomware Report

2017 Ransomware Report

From The Report, “With global ransomware damages predicted to exceed $5 billion this year, it is no surprise that ransomware is the fastest growing security threat. As this year’s global attacks have made national news, businesses of all sizes have become increasingly aware of the looming ransomware threat and the challenge of staying protected. Infected companies race the clock to minimize data loss, downtime, and reputation damage. With the seemingly endless profitability, anonymity and ease of execution it doesn’t appear cybercriminals will be turning their back on ransomware anytime soon. Companies are right to expect another year filled with attacks and new variants. The question is how can companies block these attacks before ransom is demanded, and their data along with their reputation is put at risk.”

(more available)
Added: October 18, 2018
image from Cloudy With A Change of Breach: Forecasting Cyber Security Incidents

Cloudy With A Change of Breach: Forecasting Cyber Security Incidents

In this study they characterize the extent to which cyber security incidents, such as those referenced by Verizon in its annual Data Breach Investigations Reports (DBIR), can be predicted based on externally observable prop- erties of an organization’s network.

(more available)
Added: October 18, 2018
image from CyberArk Global Advanced Threat Landscape Survey 2018: The Business View Of Security

CyberArk Global Advanced Threat Landscape Survey 2018: The Business View Of Security

What do business leaders make of security? How do they perceive its practice and importance? Where are the gaps between business and security leaders? Part two of the CyberArk Global Advanced Threat Landscape Report 2018 explores these issues via responses from individuals including IT security decision-makers and line of business owners, from organizations ranging in size from 500 employees to 5,000 or more workers.

(more available)
Added: October 18, 2018
image from Espionage As A Service

Espionage As A Service

This brief takes a look at the espionage as a service industry and how it can help businesses become secure.

(more available)
Added: October 18, 2018
image from GTIC Monthly Threat Report July 2017

GTIC Monthly Threat Report July 2017

This monthly threat report takes a look at the month of July 2017. More specifically, it takes a look at why the GDPR matters, observations from the Cyber Kill Chain, and buffer flow VULNS.

(more available)
Added: October 18, 2018
image from Mobile Data Report

Mobile Data Report

This report looks at data from the mobile estates of global asset management and investment firms; providing analysis, benchmarking and best practice guidance on keeping mobile devices secure and managing data consumption.

(more available)
Added: October 18, 2018
image from Phishing Reference Guide

Phishing Reference Guide

This very well put together report takes a look at phishing attacks and how they can be avoided.

Added: October 18, 2018
image from Remote Access Trojan KONNI Targeting North Korea Technical Analysis And Solution

Remote Access Trojan KONNI Targeting North Korea Technical Analysis And Solution

This report looks at a remote access Trojan named KONNI that was targeting North Korea.

Added: October 18, 2018
image from Security Response: The Waterbug Attack Group

Security Response: The Waterbug Attack Group

This report takes a look at the Waterbug Attack Group and their impact in 2016.

Added: October 18, 2018
image from 2017 Government Internet Security Threat Report, Volume 22

2017 Government Internet Security Threat Report, Volume 22

This is the Government focussed version of the annual 2017 Security Threat Report from Symantec.

Added: October 17, 2018
image from 2017 Phishing Response Trends US Region

2017 Phishing Response Trends US Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 17, 2018
  • ««
  • «
  • 23
  • 24
  • 25
  • 26
  • 27
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 00:08 UTC (build b1d7be4)