Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Phishing

Below you will find reports with the tag of “Phishing”

image from The Guide To Secure Mobile Gateways

The Guide To Secure Mobile Gateways

According to Statcounter, mobile data internet traffic surpassed desktop based traffic for the first time in 2016. With Gartner estimating one-third of all malware coming from mobile devices in 2019 and less than 10% of organizations implementing Mobile Threat Defense solutions1, the threat landscape for mobility is ripe for hackers. Read the report to find out more about how organizations can defend themselves against these threats.

(more available)
Added: October 13, 2018
image from Threat Summary And Year In Review Q4 2016

Threat Summary And Year In Review Q4 2016

This Quarterly report offers key takeaways from the fourth Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 13, 2018
image from Tracking Down The [A]pache Fishing Kit

Tracking Down The [A]pache Fishing Kit

In our latest research into the dark and dangerous world of phishing kits, Check Point Research and CyberInt have joined forces to show you how one of the most advanced phishing kits, the [A]pache Next Generation Advanced Phishing Kit, is currently being promoted and used on the Dark Net.

(more available)
Added: October 13, 2018
image from Webroot Cyber Threats To Small and Medium Sized Businesses in 2017

Webroot Cyber Threats To Small and Medium Sized Businesses in 2017

The ever-changing cyber threat environment is forcing IT decision-makers (ITDMs) to re- evaluate their security strategies. How well equipped are SMBs to protect their data? How are they adapting their approaches to keep pace with a barrage of new cyber threats? To find out, Webroot commissioned a study of ITDMs in the US, UK, and Australia to evaluate the current security concerns and strategies of SMBs around the world. This report discusses the results of that survey.

(more available)
Added: October 13, 2018
image from 2016 Norton Cyber Security Insights Report

2016 Norton Cyber Security Insights Report

This report finds that victims of cybercrime within the past year often continued their unsafe behavior. This report details and discusses this issue.

(more available)
Added: October 12, 2018
image from 2017 Data Breach Investigations Report

2017 Data Breach Investigations Report

As always, this report is comprised of real-world data breaches and security incidents—either investigated by us or provided by one of our outstanding data contributors.

(more available)
Added: October 12, 2018
image from 2017 Phishing Response Trends Australia Region

2017 Phishing Response Trends Australia Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 12, 2018
image from Australian Companies Leaving Themselves Exposed On Security And Compliance:Survey

Australian Companies Leaving Themselves Exposed On Security And Compliance:Survey

This paper presents the results of a survey conducted in Australia to understand how prepared companies were for cyber breach situations, and compliance.

(more available)
Added: October 12, 2018
image from Don't Take The Bait

Don't Take The Bait

In this paper, we’ll dive into the evolution of phishing in recent years, how it works, and what it looks like. And as cybercriminals continue to prey on employees through their technology, we’ll make an argument for the importance of a multi-layered defense against phishing attacks: combining advanced security technologies with educated, phishing-aware employees.

(more available)
Added: October 12, 2018
image from GDPR Cheat Sheet For Cybersecurity Professionals

GDPR Cheat Sheet For Cybersecurity Professionals

This paper provides a simple approach to understanding and implementing GDPR compliance.

Added: October 12, 2018
image from Hackerpocalypse: A Cybercrime Revelation

Hackerpocalypse: A Cybercrime Revelation

From the report, “The primary goal of our report is to spark major discussion around cybercrime — and cyber defense — from local, national, and global political and business leaders. We invite broadcasters, publishers, editors, reporters, and bloggers to borrow generously from our report in their efforts raise up cybersecurity in the public’s consciousness.”

(more available)
Added: October 12, 2018
image from Hacking Is Not Random:A Case Control Study of Webserver Compromise Risk

Hacking Is Not Random:A Case Control Study of Webserver Compromise Risk

This paper investigates many observable characteristics of web-servers that may affect the likelihood of compromise.

Added: October 12, 2018
image from Report Malware PI

Report Malware PI

This report takes a look at Malware in the cloud and offers some solutions to the problem.

Added: October 12, 2018
image from Security Healthcare Information Security Guide

Security Healthcare Information Security Guide

This report provides a collection of articles on Healthcare Security.

Added: October 12, 2018
image from State of the Internet Security Report Q1 2018

State of the Internet Security Report Q1 2018

This Quaterly report continues Akamai’s breakdown of the internet security events that occurred in the first Quarter of 2018.

Added: October 12, 2018
image from The Four Pillars Of Modern Vulnerability Management

The Four Pillars Of Modern Vulnerability Management

This report breaks down four strategic pillars of handling vulnerability management.

Added: October 12, 2018
image from The Human Factor 2018: People Centered Threats Drive The Landscape

The Human Factor 2018: People Centered Threats Drive The Landscape

This report offers insight into the human factor and how cybercriminals have continued to recognize that the greatest vulnerability of an organization is the humans that run it.

(more available)
Added: October 12, 2018
image from The Weakest Link: Why People Are Your Network's Greatest Vulnerability

The Weakest Link: Why People Are Your Network's Greatest Vulnerability

In this white paper, they explore why people are the biggest vulnerability for most organizations, and whether it’s possible to ‘patch’ this vulnerability.

(more available)
Added: October 12, 2018
image from Threat Intelligence Executive Report 2017: Volume 3

Threat Intelligence Executive Report 2017: Volume 3

This Threat Report takes a look at some of the events of spring 2017. Specifically, it looks at criminal campaigns that leveraged exploits exposed by the Shadow Brokers, threat groups that used social media profiles, a threat group that attacked supply chains of large corporations, quickly evicting threat actors from a compromised environment.

(more available)
Added: October 12, 2018
image from What CISO's Worry About In 2018

What CISO's Worry About In 2018

The purpose of the survey was to understand key concerns and opinions of Chief Information Security Officers and CIOs, focused on information security and cyber-risk, as we head into 2018.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 25
  • 26
  • 27
  • 28
  • 29
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 16:08 UTC (build b1d7be4)