Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Reconnaissance

Below you will find reports with the tag of “Reconnaissance”

image from Mass Internet Exploitation Report 2025

Mass Internet Exploitation Report 2025

The GreyNoise 2025 Mass Internet Exploitation Report provides security leaders, SOC analysts, vulnerability managers, and threat intelligence teams with actionable insights. Attackers are industrializing reconnaissance and exploitation. Security teams must adapt. This report provides the intelligence needed to prioritize, respond, and defend against the next wave of mass exploitation.

(more available)
Added: February 28, 2025
image from 2025 Cyber Threat Report

2025 Cyber Threat Report

This report gives a detailed analysis of key adversarial behaviors, techniques, and trends we saw in 2024, highlighting the escalating risks that non-enterprise businesses and managed service providers (MSPs) need to be aware of This analysis will empower organizations of all sizes to strengthen their defenses against modern cyber threats by giving them actionable insights into a constantly evolving threat landscape.

(more available)
Added: February 19, 2025
image from How defenders can address targeted attacks with new honeypot techniques.

How defenders can address targeted attacks with new honeypot techniques.

In the second quarter of 2023 GreyNoise researchers observed a substantial change in the behavior of some regular internet scanning idioms. Inventory scans—where both benign and malicious actors perform regular checks for a given technology or specific vulnerability being present—significantly reduced in frequency and scale. These targeted attacks threaten to circumvent existing defense capabilities and expose organizations to a new wave of disruptive breaches. Defenders must evolve in response.

(more available)
Added: June 4, 2024
image from Hacker-Powered Security Report Financial Services Edition 2022

Hacker-Powered Security Report Financial Services Edition 2022

In this year’s Hacker-Powered Security Report: Financial Services, we look at what drives ethical hackers, where they focus their energies, and what they’re doing to help financial services companies improve their security profile. In the past year, the hacking community has found over 65,000 customer vulnerabilities. Financial services continues to be among the most popular industries for ethical hackers to work on, and vulnerabilities in web applications are by far the most commonly reported issues in the industry

(more available)
Added: May 21, 2024
image from runZero Research Report Vol. 1 May 2024

runZero Research Report Vol. 1 May 2024

In this report we share runZero’s observations from our unique perspective as an applied security research team. Our goal is to provide insight into how the security landscape is changing, and recommendations on what you can do to get ahead of these changes.

(more available)
Added: May 14, 2024
image from 2023 Honeypotting in the Cloud Report

2023 Honeypotting in the Cloud Report

This research aims to equip cloud security professionals, DevOps, DevSecOps, CISOs, and development leaders with valuable insights and practical recommendations for safeguarding their cloud environments, and in doing so, help to secure the cloud for everyone. In some ways, our study confirmed what is already widely known: attackers are constantly scanning the Internet for lucrative opportunities.

(more available)
Added: March 5, 2024
image from OT Cybersecurity The 2023 Year In Review

OT Cybersecurity The 2023 Year In Review

Dragos started the Year in Review to highlight significant trends in the OT cybersecurity community. This year’s report aims to go further by offering practitioners and leaders the most up-to-date data, along with perspectives from the field, to help them better defend critical infrastructure around the world. These perspectives are focused on providing actionable insights that have been tried and tested to help organizations effectively defend against and respond to industrial cyber threats.

(more available)
Added: February 29, 2024
image from Advanced Threat Research Report January 2022

Advanced Threat Research Report January 2022

As we look ahead in this new year, we must acknowledge a threatscape that left us all exhausted from a particularly challenging end to 2021. In our new company’s first threat report, we acknowledge the issue that dominated not only headlines, but the focus of defenders and enterprise security teams. We also look back at the third and fourth quarters of 2021, but let’s first detail our weather of resources available to help you combat Log4j.

(more available)
Added: February 27, 2023
image from Trellix Threat Labs Research Report April 2022

Trellix Threat Labs Research Report April 2022

Our latest Trellix Threat Lab Research Report includes our findings from Q4 2021, our identification of a multi-stage espionage attack on high-ranking government officials, and our recent analysis of cyberattacks targeting Ukraine and the newly identified HermeticWiper during Q1.

(more available)
Added: May 11, 2022
image from 2020 Threat Detection Report

2020 Threat Detection Report

This report is an in-depth analysis of tens of thousands of threats detected across our customers’ environments, this research arms security leaders and their teams with a unique understanding of the threats they’re facing.

(more available)
Added: April 19, 2022
image from Under the Hoodie 2019

Under the Hoodie 2019

A review of 180 engagements performed by Rapid7 consulting, supplemented by a survey of questions given to all Rapid7 consulting customers. Addresses lessons learned from this events.

(more available)
Added: August 28, 2020
image from 2020 Global Threat intelligence Report

2020 Global Threat intelligence Report

A report derived from NTT’s managed SOC service, seeking to identify modern and emerging trends observed across industries and regions.

(more available)
Added: June 21, 2020
image from Overwatch 2019 mid-year report

Overwatch 2019 mid-year report

An analysis of threat actors and key action patterns based upon CrowdStrike’s threat hunting human analyst team over the first half of 2019.

(more available)
Added: November 25, 2019
image from Dark Web 201: How to Leverage External Threat Hunting to Prevent Cyberattacks

Dark Web 201: How to Leverage External Threat Hunting to Prevent Cyberattacks

A necessary pillar of an effective cyber defense strategy is the capability to detect and mitigate threats at the earliest stages of the cyber kill chain. While internal and perimeter security solutions are critical to your security program, external threat intelligence gives you the ability to defend forward by eliminating threats outside the wire. This ebook is designed to provide a framework for security professionals on how to conduct effective external threat hunting on the dark web.

(more available)
Added: September 18, 2019
image from Healthcare's Legacy Infrastructure Of Unmanaged Devices Exposes A Vulnerable Attack Surface

Healthcare's Legacy Infrastructure Of Unmanaged Devices Exposes A Vulnerable Attack Surface

This specialized report offers insights into the Healthcare industry and the gaps in policies and procedures that could lead to damaging cyber events within the industry.

(more available)
Added: May 18, 2019
image from Attacker Behavior Industry Report

Attacker Behavior Industry Report

This report examines a wide range of cyberattack detections and trends from a sample of 354 Vectra customers with more than 3 million devices and workloads per month from nine different industries. This report takes a multidisciplinary approach that spans all strategic phases of the attack lifecycle.

(more available)
Added: May 18, 2019
image from Military and Security Developments Involving the People's Republic of China 2019

Military and Security Developments Involving the People's Republic of China 2019

A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2000, as Amended

Added: May 18, 2019
image from Holiday Shopping Season Threat Activity: 2018 Snapshot

Holiday Shopping Season Threat Activity: 2018 Snapshot

This brief but important report offers information into the events and data from the holiday shopping season of 2018.

Added: February 27, 2019
image from Critical Watch Report: The State Of Threat Detection 2018

Critical Watch Report: The State Of Threat Detection 2018

From the report, “With its customer base of over 4,000 organizations, Alert Logic has first-hand insight into the state of threat detection and response. Drawing from more than a billion security anomalies, millions of security events, and over a quarter million verified security incidents from April 2017 to June 2018, our research has identified five key insights that every business leader, IT leader, and IT practitioner should be aware of: 1. The initial phases of the cyber killchain are merging to accelerate targeted attacks 2. Industry and size are no longer reliable predictors of threat risk 3. Attack automation and “spray and pray” techniques are aiming at everything with an IP address 4. Cryptojacking is now rampant 5. Web applications remain the primary point of initial attack” Read on to find out more.

(more available)
Added: February 8, 2019
image from Enterprise Network Compromise Via Social Media Exploitation

Enterprise Network Compromise Via Social Media Exploitation

This report offers the following highlights - Case study of a Fortune 50 organization breached via social media, Deep dive into each layer of the new attack chain, A detailed look at impersonation accounts and hijacked accounts, a new staple in the attack lifecycle, Tactics, techniques, and procedures (TTPs) used by the modern attacker on social media, Recommendations and best practices for updating your security posture.

(more available)
Added: February 7, 2019
image from The Increased Risk Of Cyberattacks Against Manufacturing Organizations: 2018 Spotlight Report

The Increased Risk Of Cyberattacks Against Manufacturing Organizations: 2018 Spotlight Report

This report offers insight into cyberattack behavior in the manufacturing industry. It discusses the severity of attacks, botnets, and other important issues related to the manufacturing industry.

(more available)
Added: February 7, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)