Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Ransomware

Below you will find reports with the tag of “Ransomware”

Thank you to CISA for sponsoring our efforts to expand our ransomware coverage!

image from 2017 Midyear Security Roundup: The Cost Of Compromise

2017 Midyear Security Roundup: The Cost Of Compromise

This report reviews the cyber security threats that occurred in the first half of 2017.

Added: October 23, 2018
image from 2017 Ransomware Defense Survey

2017 Ransomware Defense Survey

Some statistics that jump out from this report, 76% of respondents see ransomware as significant business threat, 52% rate their organizations at above average or superior when it comes to detecting or blocking ransomware before it locks or encrypts data in their systems, 57% say they are more likely to be a ransomware target in 2017.

(more available)
Added: October 23, 2018
image from Annual Ransomware Report 2017

Annual Ransomware Report 2017

Druva conducted its annual ransomware survey to better understand what impact ransomware has had on organizations, how they have responded to breaches, and what their outlook is regarding the future of these types of malware attacks.

(more available)
Added: October 23, 2018
image from Definitive Guide To Ransomware

Definitive Guide To Ransomware

In this whitepaper, they explore the growing threat of ransomware and what you can do to keep your organization secure.

(more available)
Added: October 23, 2018
image from Security In The Golden Age Of Cybercrime

Security In The Golden Age Of Cybercrime

This paper offers insight into an exploration of network cybersecurity in the U.S. Federal Government.

Added: October 23, 2018
image from State Of The Channel Ransomware Report

State Of The Channel Ransomware Report

Datto surveyed 1,100 MSPs about ransomware and cybersecurity and published the key findings in this report. We aim to provide the Channel perspective on this growing epidemic and highlight the current prevalence of the malware, its behavior, its target, and its impact within the global small business community. In the end, we’ll provide best practices and solutions for businesses looking to ensure total data protection, business continuity and disaster recovery.

(more available)
Added: October 23, 2018
image from Winning The War On Ransomware

Winning The War On Ransomware

This is an infographic that can help your organization understand and win the war on Ransomware.

Added: October 23, 2018
image from 2017 Annual Threat Report

2017 Annual Threat Report

The goal of the SonicWall Annual Threat Report is to define the cybersecurity battlefield in order to enable companies and individuals around the world to mount an impenetrable defense in 2017 and beyond.

(more available)
Added: October 22, 2018
image from The Surge Of Cyber Threats: What Higher Education Needs To Know

The Surge Of Cyber Threats: What Higher Education Needs To Know

This report takes a specific look at cyber threats on the campuses of higher learning facilities.

Added: October 22, 2018
image from Enterprise Phishing Resiliency And Defense Report

Enterprise Phishing Resiliency And Defense Report

This annual report takes a specific look at phishing campaigns in 2017.

Added: October 21, 2018
image from KSN Report:Ransomware in 2016-2017

KSN Report:Ransomware in 2016-2017

This report has been prepared using depersonalized data processed by Kaspersky Security Network (KSN). The metrics are based on the number of distinct users of Kaspersky Lab products with the KSN feature enabled, who encountered ransomware at least once in a given period, as well as research into the ransomware threat landscape by Kaspersky Lab experts.

(more available)
Added: October 21, 2018
image from Quarterly Report Q2 2017

Quarterly Report Q2 2017

This is a Quarterly Report that looks at Cyber security issues in New Zealand and around the world.

Added: October 21, 2018
image from Quarterly Threat Report Q3 2017

Quarterly Threat Report Q3 2017

This Quarterly report offers key takeaways from the third Quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 21, 2018
image from 2015 Cyber Security Survey: Major Australian Businesses

2015 Cyber Security Survey: Major Australian Businesses

A report that was created by the 2015 Australian Cyber Security Centre (ACSC) Cyber Security Survey of major Australian businesses was conducted to obtain a better picture of Australian organisations’ understanding of cyber threats and how they are positioned to secure their networks.

(more available)
Added: October 20, 2018
image from A Primer On File-Borne Malware Threats

A Primer On File-Borne Malware Threats

This paper will examine the ways attackers use files to deliver malware, the reasons these methods are effective, and the steps organizations should take to block these kinds of attacks.

(more available)
Added: October 20, 2018
image from CyberThreat Report: The Malware Wars Are Heating Up

CyberThreat Report: The Malware Wars Are Heating Up

The purpose of this report is to help businesses better understand the risks that they are facing. This report asks businesses to be mindful that they should take the new security landscape seriously.

(more available)
Added: October 20, 2018
image from Global Survey On Internet Security And Trust

Global Survey On Internet Security And Trust

This report is based on a survey that involved over one thousand individuals in twenty four countries.

Added: October 20, 2018
image from Internet Security Threat Report Volume 23

Internet Security Threat Report Volume 23

This paper explores threats like coin-mining attcks, spike in software supply-chain attacks, the ransomware business, the drop in zero days, and the rise in mobile malware.

(more available)
Added: October 20, 2018
image from Prepare For The Growing Threats Of Mobile Security

Prepare For The Growing Threats Of Mobile Security

This review of the events of 2016, seeks to offer insight into the future of 2017.

Added: October 20, 2018
image from Quarterly Threat Report Q2 2018

Quarterly Threat Report Q2 2018

A review of the threat trends from the second quarter of 2018 as seen via ProofPoint’s detection network.

Added: October 20, 2018
image from Ransomware As A Service (RaaS): Deconstructing Philadelphia

Ransomware As A Service (RaaS): Deconstructing Philadelphia

This report provides a thorough analysis of Philadelphia, a a chilling example of ransomware as a service.

Added: October 20, 2018
  • ««
  • «
  • 6
  • 7
  • 8
  • 9
  • 10
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 04:08 UTC (build b1d7be4)