Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Phishing

Below you will find reports with the tag of “Phishing”

image from How To Keep Cyberattacks In Check

How To Keep Cyberattacks In Check

This small report offers some simple guidelines that can help your organization keep cyberattacks at bay.

Added: October 14, 2018
image from M-Trends 2017

M-Trends 2017

From the report, “For our M-Trends® 2017 report, we took a look at the incidents we investigated last year and provided a global and regional (the Americas, Asia Pacific (APAC) and Europe, Middle East, Africa (EMEA)) analysis focused on attack trends and defensive and emerging trends. For the second consecutive year, we have included insights from our FireEye as a Service (FaaS) teams. FaaS monitors organizations 24/7, which gives them a unique perspective into the current threat landscape. Additionally, this year we partnered with law firm DLA Piper for a discussion of the upcoming changes in EMEA data protection laws.”

(more available)
Added: October 14, 2018
image from Report Q1 2015 (January - March 2015)

Report Q1 2015 (January - March 2015)

A breakdown of the data, and types of, cyber attacks that occurred in the first quarter of 2015.

Added: October 14, 2018
image from Southeast Asia: Cyber Threat Landscape

Southeast Asia: Cyber Threat Landscape

This report discusses trends in the cyber security environment in Southeast Asia from January to June 2015. We will review some recent cases of attempted breaches on companies and governments, and provide an update on a group we first identified in 2013 as APT.Nineblog.

(more available)
Added: October 14, 2018
image from Table Of Experts: Cybersecurity

Table Of Experts: Cybersecurity

This article asks some experts local to the Boston area about CyberSecurity. It provides for interesting discussion and insight.

Added: October 14, 2018
image from The Cloud Email Security Challenge

The Cloud Email Security Challenge

This paper takes a look at how automating email security can create better security for an organization.

Added: October 14, 2018
image from The Cyber Attackers' Playbook: A Look at How One Common Attack Pattern Left 225k Ukraine Residents in the Dark

The Cyber Attackers' Playbook: A Look at How One Common Attack Pattern Left 225k Ukraine Residents in the Dark

In this ebook, they examine a specific cyber attack on a Ukrainian utility company in detail, and identify common steps that are used time and again during advanced attacks.

(more available)
Added: October 14, 2018
image from The Essential Guide To Securing Remote Access

The Essential Guide To Securing Remote Access

This guide will cover the different threats to each area with real-world examples, including exploits that affect remote access software and storage, and provide solutions and security best practice recommendations to help your organization protect against a data breach.

(more available)
Added: October 14, 2018
image from The Future of Cybercrime and Security

The Future of Cybercrime and Security

From the report, “This research will present some general trends in cybercrime, as well as indicating the potential global cost of malicious software use. It will discuss specific threats to financial and device-based businesses, as well as providing analyses of the current and future trends in cybercriminal activity, alongside general advice on how to prevent and/or minimise the impact of cybercrime.”

(more available)
Added: October 14, 2018
image from Threat Intelligence Executive Report 2017: Volume 5

Threat Intelligence Executive Report 2017: Volume 5

This Threat Report takes a look at some of the events of mid 2017. Specifically, it looks at the use of social platforms to target victims, espionage that targets law firms, weakness in business processes, and phishing.

(more available)
Added: October 14, 2018
image from Webroot Threat Report 2017

Webroot Threat Report 2017

The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users over the past year.

(more available)
Added: October 14, 2018
image from 2015 Internet Security Threat Report, Volume 20

2015 Internet Security Threat Report, Volume 20

This annual Threat Report, gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future.

(more available)
Added: October 13, 2018
image from 2017 Phishing Response Trends Europe Region

2017 Phishing Response Trends Europe Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 13, 2018
image from Annual Report 2015

Annual Report 2015

This report concludes that in 2015, cyber attacks grew at an alarming rate, and makes the prediction that Cryptolocker will continue to be a cyber threat. It also discusses the Internet of Things and how those devices can be turned into tools for cyber criminals. It also concluded that the data thefts that have occurred make it clear that businesses have a protection deficit that they need to work on immediately.

(more available)
Added: October 13, 2018
image from Businesses At Work

Businesses At Work

Businesses @ Work takes an in-depth look into how organizations and people work today—exploring employees, partners, contractors, and customers, and the apps and services they use to be productive.

(more available)
Added: October 13, 2018
image from Conversational Office 365 Risk Mitigation: A Conversational Geek Book

Conversational Office 365 Risk Mitigation: A Conversational Geek Book

This ebook provides a casual approach to cloud mitigation. It offers information in a conversational method, allowing for the reader to be able to more effectively communicate with those in his organization who need the information.

(more available)
Added: October 13, 2018
image from Malware Review Q1 2017

Malware Review Q1 2017

Between the beginning of 2017 and close of its first quarter, PhishMe IntelligenceTM completed analysis of 749 sets of phishing emails delivering nearly ten thousand unique malware samples supported by over fourteen thousand online resources. These indicators of compromise, as well as a full assessment of the phishing email tactics and malware capabilities, were profiled in in reports and Strategic Analysis documents designed to highlight techniques being used across the threat landscape. Several trends defined the phishing threat landscape in the first quarter of 2017.

(more available)
Added: October 13, 2018
image from Microlearning: Small Bites, Big Cybersecurity Impact

Microlearning: Small Bites, Big Cybersecurity Impact

This whitepaper covers the six things every organization must have to “move the security awareness training” needle.

Added: October 13, 2018
image from Phishing Activity Trends Report, 1st-3rd Quarters 2015

Phishing Activity Trends Report, 1st-3rd Quarters 2015

The APWG Phishing Activity Trends Report analyzes phishing attacks reported to the APWG by its member companies, its Global Research Partners, through the organization’s website at http://www.apwg.org, and by e-mail submissions to reportphishing@antiphishing.org. APWG also measures the evolution, proliferation, and propagation of crimeware by drawing from the research of our member companies.

(more available)
Added: October 13, 2018
image from Quarterly Threat Report:First Quarter 2017

Quarterly Threat Report:First Quarter 2017

This is Rapid7’s Quarterly Threat Report. In this report they have created additional views by day, hour, and event type by industry to give you a glimpse into both the workload variety and volume facing these unsung heroes of cybersecurity.

(more available)
Added: October 13, 2018
image from The Cloud Threat Funnel: Suspicious User Behavior That Matters

The Cloud Threat Funnel: Suspicious User Behavior That Matters

For this cybersecurity report, the Cloudlock CyberLab analyzed daily behavior across 10 million users, 1 billion files, and 101,000 apps to surface insightful trends and help organizations detect signs of threat. On the following pages, we’ll walk you through the CyberLab’s Cloud Threat Funnel, designed to help security teams narrow their focus onto user activities that are the most indicative of true threat.

(more available)
Added: October 13, 2018
  • ««
  • «
  • 25
  • 26
  • 27
  • 28
  • 29
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 00:08 UTC (build b1d7be4)