Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Phishing

Below you will find reports with the tag of “Phishing”

image from 2017 Quarterly Threat Report Q3

2017 Quarterly Threat Report Q3

This report takes a look at the cyber threats that took place in the 3rd Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 17, 2018
image from 2017 State Of Privacy Security Awareness

2017 State Of Privacy Security Awareness

This report offers analysis of survey results that sought to understand that the general public knows about privacy and cybersecurity.

(more available)
Added: October 17, 2018
image from Building A Threat Intelligence Programme UK Edition

Building A Threat Intelligence Programme UK Edition

The report is based on research findings on the best practices and impacts of building a threat intelligence programme.

Added: October 17, 2018
image from Cyber Threats To The Healthcare And Health Insurance Industries

Cyber Threats To The Healthcare And Health Insurance Industries

Learn about current and impending cyber threats to the healthcare and health insurance industry.

Added: October 17, 2018
image from External Threats: Security Beyond The Perimeter

External Threats: Security Beyond The Perimeter

The Purpose of this study is to understand companies’ ability to analyze and mitigate online incidents and cyber attacks that are beyond the traditional security perimeter.

(more available)
Added: October 17, 2018
image from Internet Of Things Cybersecurity Readiness

Internet Of Things Cybersecurity Readiness

This report provides the results of a unique survey designed to analyze their IoT technologies and the struggles and challenges of providing and preparing for security issues related to thos devices.

(more available)
Added: October 17, 2018
image from Mobile Data Report

Mobile Data Report

This report pays particular attention to the state of mobile security in law firms.

Added: October 17, 2018
image from Office 365 Exchange Online: Research Report December 2016

Office 365 Exchange Online: Research Report December 2016

This ebook provides a report on the results of a survey that was conducted to discover information on 4 issues related to Office 365.

(more available)
Added: October 17, 2018
image from Past And Present Of Underground Network Industry

Past And Present Of Underground Network Industry

This document presents the definition, category, means, and examples of the underground network industry, as well as protection measures.

Added: October 17, 2018
image from Qaurterly Threat Report Q! 2017

Qaurterly Threat Report Q! 2017

The Proofpoint Quarterly Threat Report captures threats, trends and transformations we see within our customer base and in the wider security market.

(more available)
Added: October 17, 2018
image from Trusted Access Report 2018

Trusted Access Report 2018

This report takes a closer look at user authentications and how users behave in phishing simulations, as well as shedding light on the security health of users’ devices used to log into enterprise applications.

(more available)
Added: October 17, 2018
image from Two Years Of Pawn Storm: Examining An Increasingly Relevant Threat

Two Years Of Pawn Storm: Examining An Increasingly Relevant Threat

This paper is exclusively dedicated to the cyber threat, Pawn Storm.

Added: October 17, 2018
image from 2016 State Of Privacy & Security Awareness

2016 State Of Privacy & Security Awareness

From the report, “Good privacy and security practices are often common sense—but ensuring that this common sense is applied consistently and rigorously makes all the difference in the world. In a truly risk-aware organization, employees combine policy know-how, common sense, and a keen eye for detail as they regularly align their actions with your organizations security and privacy principles. How will you ensure that you’ve got such a culture?”

(more available)
Added: October 16, 2018
image from 2017 Phishing Response Trends UK Region

2017 Phishing Response Trends UK Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 16, 2018
image from 2017 Quarterly Threat Report Q2

2017 Quarterly Threat Report Q2

This report takes a look at the cyber threats that took place in the 2nd Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 16, 2018
image from Buidling a Business Driven Financial SOC

Buidling a Business Driven Financial SOC

This whitepaper outlines the unique challenges that business-driven financial SOCs deal with, and provides tools and tips on how to manage and resolve these challenges.

(more available)
Added: October 16, 2018
image from Digging Deeper: An In Depth Analysis Of A Fast Flux Network

Digging Deeper: An In Depth Analysis Of A Fast Flux Network

This whitepaper provides some insight into a Fast Flux Network and its ability to deal with attacks.

Added: October 16, 2018
image from GTIC Monthly Threat Report February 2018

GTIC Monthly Threat Report February 2018

This monthly threat report takes a look at the month of February 2018. Specifically, it looks at how Agent Tesla works, cryptocurreny malware, ransomware’s refusal to die, and Turla APT updating their malware after public advisories.

(more available)
Added: October 16, 2018
image from Quarterly Threats Report March 2018

Quarterly Threats Report March 2018

In this quarterly report, they discuss the fact that criminals have shifted their tactics and have now moved to power shifting, crypto-currency, and ransomware, as their main focus of cyberthreat.

(more available)
Added: October 16, 2018
image from Tracking Trends In Business Email Compromise

Tracking Trends In Business Email Compromise

This report takes a look at Business Email Compromise attacks and examines why the FBI was able to report that it has become a billion dollar industry.

(more available)
Added: October 16, 2018
image from Trusted Access Report 2017

Trusted Access Report 2017

This paper discusses the evolution of enterprise security.

Added: October 16, 2018
  • ««
  • «
  • 24
  • 25
  • 26
  • 27
  • 28
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 00:08 UTC (build b1d7be4)