Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Phishing

Below you will find reports with the tag of “Phishing”

image from 2017 Internet Crime Report

2017 Internet Crime Report

The 2017 Internet Crime Report emphasizes the IC3’s efforts in monitoring trending scams such as Business Email Compromise (BEC), Ransomware, Tech Support Fraud, and Extortion. The report also highlights the Elder Justice Initiative promoting justice for the nation’s seniors. In 2017, IC3 received a total of 301,580 complaints with reported losses exceeding $1.4 Billion.

(more available)
Added: October 15, 2018
image from 2017 Phishing Response Trends South Africa Region

2017 Phishing Response Trends South Africa Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 15, 2018
image from 2017 Quarterly Threat Report Q1

2017 Quarterly Threat Report Q1

This report takes a look at the cyber threats that took place in the 1st Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 15, 2018
image from Be Compromise Ready 2017 Data Security Incident Response Report

Be Compromise Ready 2017 Data Security Incident Response Report

From the Report, “Cybersecurity carries a certain mystique. This comes from a combination of people not being “tech savvy,” sensationalized or incorrect headlines (“Guests Locked in Their Hotel Rooms by Ransomware”), superficial advice from so-called experts and technology-driven cure-alls. The reality is that if you focus on the basics, you will be better positioned to be “Compromise Ready.” Like other material risks companies face, cybersecurity readiness requires an enterprise wide approach tailored to the culture and industry of the company. There is no one-size-fits-all solution.”

(more available)
Added: October 15, 2018
image from Cryptowall Report

Cryptowall Report

This is a report that deals with the CryptoWall Malware. The focus of this report is to study the prevalence and global impact of CryptoWall.

(more available)
Added: October 15, 2018
image from DMARC Intelligence Report 2016

DMARC Intelligence Report 2016

In this annual report, they track the progress of Domain-based Message Authentication, Reporting, and Conformance (DMARC)

Added: October 15, 2018
image from Email Fraud and DMARC Adoption Trends Second Half 2017

Email Fraud and DMARC Adoption Trends Second Half 2017

In this inaugural report, they take a look at the state of DMARC, leveraging Agari’s Email Threat Center, and its unique global and sector view into our customers’ DMARC traffic over the last 6 months of 2017. They also explore publicly available statistics and trends on DMARC usage. Finally, for a global view on email domains not visible to the Threat Center, they incorporate intelligence from Farsight Security, the world’s largest provider of historical and real-time passive DNS data. Farsight DNSDB provides an unmatched view into the diverse and often volatile DMARC policies located in global DNS records.

(more available)
Added: October 15, 2018
image from Federal Information Security Modernization Act Report to Congress

Federal Information Security Modernization Act Report to Congress

The President of the United States’ Office of Management and Budget, prepared this report. This report covers the period from October 1, 2014, through September 30, 2015, and provides an update of ongoing information security initiatives, a review of Fiscal Year 2015 information security incidents, Inspector General assessments of agencies’ progress in implementing information security capabilities, and the Federal Government’s progress in meeting key information security performance measures based on agency submitted data.

(more available)
Added: October 15, 2018
image from Impersonation Protect: A Whale Of A Tale: How To Stop The Rising Tide Of Impersonation Attacks

Impersonation Protect: A Whale Of A Tale: How To Stop The Rising Tide Of Impersonation Attacks

This report takes a look at whaling attacks and considers what can be done to stop these kinds of attacks.

(more available)
Added: October 15, 2018
image from Spear Phishing Report

Spear Phishing Report

This report takes a very deep look at the subject of Spear Phishing and the impact it is having on business.

(more available)
Added: October 15, 2018
image from State Of Privacy & Security Awareness In Retail

State Of Privacy & Security Awareness In Retail

This report provides data to help understand the need of helping employees understand PCI compliance in the retail industry.

Added: October 15, 2018
image from The Danger Within: Unmasking Insider Threats

The Danger Within: Unmasking Insider Threats

This eBook outlines the who, what, why and how of the insider threat to expose risks you may not be considering, and provides guidance to help you prevent and detect these costly attacks.

(more available)
Added: October 15, 2018
image from Threat Intelligence Executive Reprot 2017: Volume 6

Threat Intelligence Executive Reprot 2017: Volume 6

This Threat Report takes a look at some of the events of late 2017. Specifically, it looks at self-propagating malware, a specific Microsoft Office vuln, and multiple espionage campaigns that target energy utility companies.

(more available)
Added: October 15, 2018
image from X-Force Threat Intelligence Index 2018

X-Force Threat Intelligence Index 2018

In this report, IBM culled the data collected between 01 January 2017 and 31 December 2017, to deliver insightful information about the global threat landscape and apprise security professionals about the threats most relevant to their organizations.

(more available)
Added: October 15, 2018
image from 2016 State Of Privacy & Security Awareness: The Story Behind The Story

2016 State Of Privacy & Security Awareness: The Story Behind The Story

From the report, “Good privacy and security practices are often common sense—but ensuring that this common sense is applied consistently and rigorously makes all the difference in the world. In a truly risk-aware organization, employees combine policy know-how, common sense, and a keen eye for detail as they regularly align their actions with your organizations security and privacy principles. How will you ensure that you’ve got such a culture?”

(more available)
Added: October 14, 2018
image from 2017 Phishing Response Trends Singapore Region

2017 Phishing Response Trends Singapore Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 14, 2018
image from Advanced Precision Threat (APT) Protection: Market Quadrant 2018

Advanced Precision Threat (APT) Protection: Market Quadrant 2018

This report discusses APT Protection and how it impacts a certain quadrant of the Market.

Added: October 14, 2018
image from BREACH REPORT 2015: Protected Health Information

BREACH REPORT 2015: Protected Health Information

This is Redspin’s 6th annual Breach Report: Protected Health Information (PHI). At the conclusion of each year, they analyze the complete statistical data set of large breaches that have been reported to HHS. In the report, they assess the overall effectiveness of the current policies and controls designed to safeguard PHI. In 2105, they identify significant trends and draw attention to the specific areas most in need of improvement. They then offer Redspin’s recommendations for preventive measures and corrective actions to address any critical gaps or weaknesses. Their goal is to help the healthcare industry continually improve its ability to protect patient information.

(more available)
Added: October 14, 2018
image from Business Email Compromise (BEC) Attack Trends Report

Business Email Compromise (BEC) Attack Trends Report

This report is a breakdown of Agari’s experience with Business Email Compromise and attacks.

Added: October 14, 2018
image from FSecure 2017 State Of Cyber Security

FSecure 2017 State Of Cyber Security

This report gives detailed ideas behind having the proper plans for how to deal with Cybersecurity breaches.

Added: October 14, 2018
image from How To Fight The Phishing Epidemic And Win

How To Fight The Phishing Epidemic And Win

This ebook takes a look at the Phishing Epidemic and offers some solutions to help organizations win that battle.

Added: October 14, 2018
  • ««
  • «
  • 25
  • 26
  • 27
  • 28
  • 29
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 00:08 UTC (build b1d7be4)