Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Phishing

Below you will find reports with the tag of “Phishing”

image from Threat Intelligence Report 2023

Threat Intelligence Report 2023

Our annual Threat Intelligence Report is aimed at anyone interested in cybersecurity, from the technical specialist to the senior CISO. The main focus, however, is to guide decision-makers responsible for developing strategic plans for their organization’s cybersecurity to ensure that resources are well invested. Our report last year focused on technical challenges; this year’s report will focus on real-world changes and how they can impact your organization’s cybersecurity.

(more available)
Added: October 20, 2023
image from 2023 Comcast Business Cybersecurity Threat Report

2023 Comcast Business Cybersecurity Threat Report

The 2023 Comcast Business Cybersecurity Threat Report was developed to help technology and security leaders get a deeper understanding of trends in cybersecurity threats—and the steps they can take to help protect their organizations from an evolving set of threats. Our goal is to provide insights from billions of threat data points and context around common ways that cybersecurity attacks arise and unfold.

(more available)
Added: October 18, 2023
image from 2023 Microsoft Digital Defense Report

2023 Microsoft Digital Defense Report

In this fourth annual edition of the Microsoft Digital Defense Report, we draw on our unique vantage point to share insights on how the threat landscape has evolved and discuss the shared opportunities and challenges we all face in securing a resilient online ecosystem which the world can depend on.

(more available)
Added: October 10, 2023
image from The 2023 OpenText Cybersecurity Threat Report

The 2023 OpenText Cybersecurity Threat Report

The 2023 OpenText Cybersecurity Threat Report is based on data continuously and automatically captured by the BrightCloud Platform — the proprietary machine learning based architecture that powers all of our Webroot protection and BrightCloud services. This data comes from over 95 million real-world endpoints and sensors, specialized third party databases, and intelligence from end users protected by our technology partners. In this report, we’ll break down a broad range of threat activity, offer insights into the trends we’ve observed, discuss wide reaching impacts for industries, geographies, companies, and individuals, and reveal what our threat experts expect to see in the coming year.

(more available)
Added: September 26, 2023
image from 2023 RSA ID IQ Report

2023 RSA ID IQ Report

With security threats putting everything from personal information to critical infrastructure at risk, and with the incidence of ransomware attacks and other data breaches increasing, the 2023 RSA ID IQ Report provides cybersecurity professionals with insights into users’ understanding and behavior. By reviewing users’ answers on the identity components needed to develop a zero trust framework, multi-factor authentication, the vulnerability of mobile devices, and other cybersecurity threats, leaders can prioritize actions and implement best practices to keep their organizations secure.

(more available)
Added: September 1, 2023
image from Ransomware on the Move: Evolving Exploitation Techniques and the Active Pursuit of Zero-Days

Ransomware on the Move: Evolving Exploitation Techniques and the Active Pursuit of Zero-Days

We lay out the ransomware landscape in this State of the Internet (SOTI) report by exploring some of the most effective attack techniques and tools that ransomware groups are utilizing to achieve initial access through exfiltration. We also provide an extensive list of safeguarding techniques and recommendations. It is crucial that both industries and individuals protect themselves from the new wave of ransomware attacks, and this report will help provide insights for better defense and risk management of this growing concern.

(more available)
Added: August 11, 2023
image from Security Implications of ChatGPT

Security Implications of ChatGPT

This paper aims to provide a high-level overview of the implications of ChatGPT in the cybersecurity industry, without delving into the granular details of artificial intelligence. We will explore the key concepts and domains that are crucial for understanding ChatGPT’s capabilities, as well as the potential impact on businesses.

(more available)
Added: August 3, 2023
image from 2023 Mid-Year Horizon Report

2023 Mid-Year Horizon Report

In this 2023 Mid-Year Horizon Report, we delve into the significant cybersecurity issues that are affecting the healthcare industry. We cover topics such as emerging data theft tactics, the use of risk-based identity alerting to strengthen security, and the potential impact of using ChatGPT on healthcare data security.

(more available)
Added: July 28, 2023
image from 2022 Black Hat USA Survey Report

2022 Black Hat USA Survey Report

Gurucul conducted a survey of attendees at the 2022 Black Hat USA security conference focused on the Security Operations Center (SOC). We asked security professionals who worked in the SOC about what they needed to be successful, the technologies and attacks they’re most focused on, and their plans for the SOC in the next year.

(more available)
Added: July 22, 2023
image from 2023 Cyber Security Report

2023 Cyber Security Report

In our Security Report, we discuss a few more trends observed by cp throughout the year. The Russia-Ukraine war demonstrated how the traditional, kinetic, war can be augmented by a cybernetic war. It has also influenced the broader threat landscape in the rapid changes of hacktivism and how independent threat actors choose to work for state-affiliated missions.

(more available)
Added: July 22, 2023
image from 2023 Global Mobile Threat Report

2023 Global Mobile Threat Report

The Zimperium 2023 Global Mobile Threat Report examines the trends that shaped the mobile security landscape over the last year and analyzes research from Zimperium’s zLabs team, as well as third-party industry data, partner insights, and observations from leading industry experts. The findings in this report will help security teams evaluate their mobile security environment and improve defenses to ensure a mobile-first security strategy.

(more available)
Added: July 6, 2023
image from The State of Email Security 2023

The State of Email Security 2023

Mimecast’s seventh annual State of Email Security report comes as organizations all over the world grow more skittish over rising economic volatility and intensifying geopolitical tensions. Now is definitely not the time to become lax on cybersecurity.

(more available)
Added: July 5, 2023
image from Enisa Threat Landscape 2022

Enisa Threat Landscape 2022

This is the tenth edition of the ENISA Threat Landscape (ETL) report, an annual report on the status of the cybersecurity threat landscape. It identifies the top threats, major trends observed with respect to threats, threat actors and attack techniques, as well as impact and motivation analysis. It also describes relevant mitigation measures.

(more available)
Added: July 5, 2023
image from 2022 Everywhere Workplace Report

2022 Everywhere Workplace Report

This report features some of the most compelling data from our survey and gives actionable insights to leaders hoping to accelerate progress and enhance the employee experience in the Everywhere Workplace.

(more available)
Added: June 29, 2023
image from A CISO's Guide to Email Security in 2023

A CISO's Guide to Email Security in 2023

CISOs are facing increased challenges in an escalating threat landscape, with email as the primary target for attacks. This white paper breaks down the requirements for modern email security in protecting organizations from advanced and novel threats – moving from historically-trained tools to a behavioral, AI-driven approach.

(more available)
Added: June 29, 2023
image from 2021 ForgeRock Consumer Identity Breach Report

2021 ForgeRock Consumer Identity Breach Report

This report shares detailed insights and data on the breaches impacting consumers in 2020 and provides year-over-year comparisons to breaches affecting consumers in the U.S. in 2019. It clearly demonstrates the need for organizations to adopt a comprehensive identity and access management (IAM) solution to help prevent identity-related data breaches, protect their brands, and preserve customer relationships.

(more available)
Added: June 29, 2023
image from 2022 Forgerock Consumer Identity Breach Report

2022 Forgerock Consumer Identity Breach Report

Our report focuses on confirmed breaches in which confidential data is exposed and/or stolen. A confirmed breach can refer to a single record being stolen — and such a breach must be analyzed and remediated to determine the source — but because most breaches are financially driven, attackers target large caches of data that they can hold for ransom or sell on the dark web.

(more available)
Added: June 29, 2023
image from 2023 ForgeRock Identity Breach Report

2023 ForgeRock Identity Breach Report

This report focuses on confirmed breaches in which confidential data has been exposed and/or stolen, ranging from very small breaches to large caches of data that provide financial incentives to hackers to hold for ransom, sell on the dark web, or both. . Many breaches that occurred as a result of third parties (vendors, suppliers, contractors, or other organizations) were researched to determine the root causes.

(more available)
Added: June 29, 2023
image from Managing Security Risk: Cybersecurity Solutions for Mid-Sized Businesses

Managing Security Risk: Cybersecurity Solutions for Mid-Sized Businesses

There is a new security reality facing mid-sized business leaders and security professionals today. In this guide, you’ll find answers to these challenges and how an MDR solution can help you efficiently maximize security investments and effectively manage security risks to your business.

(more available)
Added: June 28, 2023
image from 2023 Annual Threat Report

2023 Annual Threat Report

In our annual Threat Report, the Deepwatch Adversary Tactics and Intelligence (ATI) team provides data on the leading cybersecurity threats that SOC security analysts faced in 2022, and offers predictions of what teams will likely face in 2023. With analysis from ATI research and Deepwatch customer engagements, we review the types of volumes of threats, look at the challenges in visualization and identification, and consider what lingering or growing threats SOC teams should prioritize.

(more available)
Added: June 28, 2023
image from 2023 Insider Risk Investigations Report

2023 Insider Risk Investigations Report

This Insider Risk Investigations Report highlights the expertise of our team, who has been providing insights from real hands-on investigations since 2017. As always, we are pleased to present our findings in the spirit of sharing these insights as we work towards building greater resilience from insider risk for our customers.

(more available)
Added: June 28, 2023
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 16:08 UTC (build b1d7be4)