Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Reconnaissance

Below you will find reports with the tag of “Reconnaissance”

image from Under the Hoodie 2019

Under the Hoodie 2019

A review of 180 engagements performed by Rapid7 consulting, supplemented by a survey of questions given to all Rapid7 consulting customers. (more available)
Added: August 28, 2020
image from 2020 Global Threat intelligence Report

2020 Global Threat intelligence Report

A report derived from NTT’s managed SOC service, seeking to identify modern and emerging trends observed across industries and regions.
Added: June 21, 2020
image from Overwatch 2019 mid-year report

Overwatch 2019 mid-year report

An analysis of threat actors and key action patterns based upon CrowdStrike’s threat hunting human analyst team over the first half of 2019. (more available)
Added: November 25, 2019
image from Dark Web 201: How to Leverage External Threat Hunting to Prevent Cyberattacks

Dark Web 201: How to Leverage External Threat Hunting to Prevent Cyberattacks

A necessary pillar of an effective cyber defense strategy is the capability to detect and mitigate threats at the earliest stages of the cyber kill chain. (more available)
Added: September 18, 2019
image from Healthcare's Legacy Infrastructure Of Unmanaged Devices Exposes A Vulnerable Attack Surface

Healthcare's Legacy Infrastructure Of Unmanaged Devices Exposes A Vulnerable Attack Surface

This specialized report offers insights into the Healthcare industry and the gaps in policies and procedures that could lead to damaging cyber events within the industry. (more available)
Added: May 18, 2019
image from Attacker Behavior Industry Report

Attacker Behavior Industry Report

This report examines a wide range of cyberattack detections and trends from a sample of 354 Vectra customers with more than 3 million devices and workloads per month from nine different industries. (more available)
Added: May 18, 2019
image from Military and Security Developments Involving the People's Republic of China 2019

Military and Security Developments Involving the People's Republic of China 2019

A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2000, as Amended
Added: May 18, 2019
image from Holiday Shopping Season Threat Activity: 2018 Snapshot

Holiday Shopping Season Threat Activity: 2018 Snapshot

This brief but important report offers information into the events and data from the holiday shopping season of 2018.
Added: February 27, 2019
image from Critical Watch Report: The State Of Threat Detection 2018

Critical Watch Report: The State Of Threat Detection 2018

From the report, “With its customer base of over 4,000 organizations, Alert Logic has first-hand insight into the state of threat detection and response. (more available)
Added: February 8, 2019
image from Enterprise Network Compromise Via Social Media Exploitation

Enterprise Network Compromise Via Social Media Exploitation

This report offers the following highlights - Case study of a Fortune 50 organization breached via social media, Deep dive into each layer of the new attack chain, A detailed look at impersonation accounts and hijacked accounts, a new staple in the attack lifecycle, Tactics, techniques, and procedures (TTPs) used by the modern attacker on social media, Recommendations and best practices for updating your security posture. (more available)
Added: February 7, 2019
image from The Increased Risk Of Cyberattacks Against Manufacturing Organizations: 2018 Spotlight Report

The Increased Risk Of Cyberattacks Against Manufacturing Organizations: 2018 Spotlight Report

This report offers insight into cyberattack behavior in the manufacturing industry. It discusses the severity of attacks, botnets, and other important issues related to the manufacturing industry. (more available)
Added: February 7, 2019
image from The Hidden Threat Of Cyberattacks In The Energy And Utilities Industry: 2018 Spotlight Report

The Hidden Threat Of Cyberattacks In The Energy And Utilities Industry: 2018 Spotlight Report

This report offers research on analysis and lifecycle of an attack on critical infrastructure. It discusses command and control, internal reconnaissance, lateral movement, and targeting the ICS and SCADA infrastructure. (more available)
Added: February 7, 2019
image from Attacker Behavior Industry Report: 2018 Black Hat Edition

Attacker Behavior Industry Report: 2018 Black Hat Edition

The Black Hat Edition of the Vectra® Attacker Behavior Industry Report provides a first-hand analysis of active and persistent attacker behaviors inside cloud, data center and enterprise environments of Vectra customers from January through June 2018. (more available)
Added: February 7, 2019
image from Attacker Behavior Industry Report: 2018 RSA Conference Edition

Attacker Behavior Industry Report: 2018 RSA Conference Edition

The 2018 RSA Conference Edition of the Vectra Attacker Behavior Industry Report provides a first-hand analysis of active and persistent attacker behaviors inside cloud, data center and enterprise environments of Vectra customers from August 2017 through January 2018. (more available)
Added: February 7, 2019
image from MEDJACK.4 Medical Device Hijacking

MEDJACK.4 Medical Device Hijacking

This report takes an inside look at the Cyber Security challenge for healthcare today and more specifically looks at the medical device security challenge. (more available)
Added: February 6, 2019
image from Anatomy Of An Attack: Iranian Nation State Interdiction

Anatomy Of An Attack: Iranian Nation State Interdiction

This report offers deep insight into the threat actor known as Oilrig.
Added: February 6, 2019
image from 2018 Legal Threat Report

2018 Legal Threat Report

From the one page report, “From trade secrets to client information, legal services and law firms have an ethical and legal obligation to protect privileged data. (more available)
Added: February 5, 2019
image from The Dark Side Of Asia

The Dark Side Of Asia

In this research report, they uncover the Dark Side of Asia to provide you with an inside look into key trends, laws, motivations and threat actors of the increasingly threatening Asian Internet community. (more available)
Added: January 25, 2019
image from Beyond Malware: Detecting The Undetectable

Beyond Malware: Detecting The Undetectable

This report discusses a key issue in a Malware-centric defense approach; it will leave you vulnerable to attacks that don’t leverage malware. (more available)
Added: January 1, 2019
image from Operation Sharpshooter

Operation Sharpshooter

This report takes a look at a new global campaign targeting nuclear, defense, energy, and financial companies.
Added: December 29, 2018
image from Cobalt Group

Cobalt Group

Fidelis Threat Research analysts have discovered a new version of ThreadKit, malware notorious for it’s use by the cybercrime organization known as Cobalt Group. (more available)
Added: December 14, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2021
Library updated: February 27, 2021 00:06 UTC (build 7e736b2)