Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Annual Threat Monitor 2022

Annual Threat Monitor 2022

2022 was another year that kept us on our toes. The threat landscape was heavily influenced by the conflict between Russia and Ukraine, during which we have seen the whole arsenal of offensive cyber capabilities, deployed by criminals, hacktivists, and nation state groups.We saw the overall number of ransomware incidents dip by around 5% compared to the previous year. But, this slight dip does not mean we collectively declare ‘job done’. As a result, we have witnessed several coordinated operations in 2022 that saw arrests of key members of prolific cyber-criminal operations, as well as the disbanding of long-established groups. Least of all Conti, which was 2021’s most active group.”

(more available)
Added: March 7, 2023
image from Underground Threat Activity Report 2022

Underground Threat Activity Report 2022

In our Underground Threat Activity report, you will find detailed analyses of cyberforum activities that we have observed over the past year, from emerging trends and cybercrime statistics to TTPs employed by TAs across several industries. You can also find our recommendations to mitigate the impact of these attacks, as well as our predictions from the evolution of the threat landscape and emerging threats that we may see in the future.

(more available)
Added: March 7, 2023
image from Cyber Security Trends Forecast 2023

Cyber Security Trends Forecast 2023

The cybercrime industry is very dynamic and develops and morphs daily. As a result, new trends keep on emerging that demand us to be on top of things in order to keep our organizations safe and secure. This report will focus on all the major and relevant security trends of 2022 that we can learn from, as well as what can we conclude and predict about how these threats could reveal themselves and change in 2023.

(more available)
Added: March 7, 2023
image from EY global third-party risk management survey highlights 2019-20

EY global third-party risk management survey highlights 2019-20

In the summer and fall of 2019, EY surveyed 246 global institutions that had a third-party risk management (TPRM) function in various sectors, including but not limited to, retail and commercial banking, investment banking, insurance, advanced manufacturing and mobility, technology, media and entertainment, power and utilities, and health.

(more available)
Added: March 7, 2023
image from States of Third-Party Risk Management

States of Third-Party Risk Management

For our seventh annual survey, Venminder surveyed individuals from a wide variety of organizations and industries, including financial services, fintech, retail, food services, insurance, healthcare, information technology, and more in a nice balance of different sizes ranging from less than $1B assets of less than 100 employees to more than $10B assets or more than 5,000 employees.

(more available)
Added: March 7, 2023
image from Tenable's 2020 Threat Landscape Retrospective

Tenable's 2020 Threat Landscape Retrospective

Tenable Research takes that approach to equip our customers and the industry at large with the tools, awareness and intelligence to effectively reduce risk. To further those goals, SRT has complied this 2020 Threat Landscape Retrospective, which offers both a macro look at the trends that shaped the year as well as the detailed compendium of key vulnerabilities. The insights and data provided in these pages are designed to help cyber defenders learn from the past in order to build cybersecurity strategies that protect critical infrastructures, supply chains and data while respecting privacy.

(more available)
Added: March 7, 2023
image from The Ransomware Ecosystem

The Ransomware Ecosystem

Our goal with this report is to help demystify the ransomware ecosystem by exploring the key players involved, as well as the techniques and tactics utilized by ransomware operations and their affiliates to infiltrate organizations and distribute ransomware payloads. We also provide a list of the most common vulnerabilities likely to be exploited as part as a ransomware attack, to help security practitioners prioritize remediation.

(more available)
Added: March 6, 2023
image from Tenable 2022 Threat Landscape Report

Tenable 2022 Threat Landscape Report

Tenable’s Security Response Team (SRT) continuously monitors the threat landscape throughout the year, putting us at the forefront of trending vulnerabilities and security threats. From this vantage point, we complied and categorized our data from this annual report. In a year marked by tense geopolitics, hacktivism, ransomware and attacks targeting critical infrastructure - all alongside a turbulent macroeconomic environment - organizations struggled to keep pace with the demands on their cybersecurity teams and resources.

(more available)
Added: March 6, 2023
image from 2023 Global Threat Report

2023 Global Threat Report

The report shows that security must parallel the slope of technology innovation. As technology matures, security has to mature and match the innovation of the technology running our organizations. The same thing can be said for the adversary. With every innovation we achieve, we can expect the adversary to actively seek ways to exploit it. From the cloud to Kubernetes, from Al to applications and more, as technology gets more complex and provides tremendous operational gains, security must evolve to protect the productivity we gain.

(more available)
Added: March 3, 2023
image from 2022 Vulnerability Intelligence Report

2022 Vulnerability Intelligence Report

Rapid7’s Vulnerability Intelligence Report examines notable vulnerabilities and high-impact attacks from 2022 in order to highlight exploitation trends, explore attackers use cases, and offer a framework for understanding new security threats as they arise. Our aim is the contextualize the vulnerabilities that introduce serious risk to a wide range of organizations. The report examines 50 vulnerabilities that pose considerable risk to organizations of all sizes. In total, this report includes 45 vulnerabilities that were exploited in the wild 2022, of which 44% arose from zero-day exploits.

(more available)
Added: March 3, 2023
image from State of Cloud Threat Detection and Response Report March 2023

State of Cloud Threat Detection and Response Report March 2023

Our State of Cloud Threat Detection and Response report summaries the survey responses of 400 security leaders and SecOps practitioners in North America regarding the capabilities, practices, and behaviors of protecting against, identifying, and remediating cloud-based threats. The report looks at the differences between cloud threats detection and response behaviors and their on-premises counterparts, and the connection between cloud transformation and security transformation. We conclude with guidance on how to incorporate these lessons into your company’s current operations and considerations for the future.

(more available)
Added: March 3, 2023
image from State of Enterprise Cybersecurity: Invest Now, or Pya Big Later

State of Enterprise Cybersecurity: Invest Now, or Pya Big Later

In this report, we analyze data from Dark Reading’s survey that shows how security teams are struggling to keep up with the transformational changes to their business model and infrastructure. Many are partnering with security service providers, but they often struggle to get the most value from these partnerships. We show how organizations can optimize - and get the most out of - the relationships with their security solution provider partners.

(more available)
Added: March 1, 2023
image from 2023 SonicWall Cyber Threat Report

2023 SonicWall Cyber Threat Report

The 2023 SonicWall Cyber Threat Report provides critical insights and actionable intelligence needed to safeguard your organization from new and emerging cyber threats. The bi-annual report includes key threat intelligence, trend analysis and changes in cybercriminal tactics - al in one in-depth resource.

(more available)
Added: March 1, 2023
image from What Decision - Makers Need to Know About Ransomware Risk

What Decision - Makers Need to Know About Ransomware Risk

This research paper is a joint effort between Trend Micro and Waratah Analytics, a data-modeling, risk-analysis, and exposure management services provider. It analyzes the modern ransomware ecosystem using data-science approaches and leverages information collected from network-based and host-based telemetry, underground forums, bitcoin and financial transactions, and chat logs - together with a deep analysis of criminal business processes - to find trends, new developments, and choke points in the ransomware ecosystem.

(more available)
Added: February 28, 2023
image from Open Source Security and Risk Analysis Report 2023

Open Source Security and Risk Analysis Report 2023

In its 8th edition this year, the 2023 “Open Source Security and Risk Analysis” (OSSRA) report delivers our annual in-depth look at the current state of open source security, compliance, licensing, and code quality risks in commercial software. We share these findings with the goal of helping security, legal, risk, and development team better understand the open source security and license risk landscape.

(more available)
Added: February 27, 2023
image from Advanced Threat Research Report Oct 2021

Advanced Threat Research Report Oct 2021

As 2021 progressed through its second quarter and into the third, cyber criminals introduced new - and updated - threats and tactics in campaigns targeting prominent sectors. Ransomware campaigns maintained their prevalence while evolving their business models to extract valuable data and millions in ransoms from enterprises big and small. REvil/Sodinokibi topped our list of ransomware detection in Q2 of 2021.

(more available)
Added: February 27, 2023
image from Advanced Threat Research Report January 2022

Advanced Threat Research Report January 2022

As we look ahead in this new year, we must acknowledge a threatscape that left us all exhausted from a particularly challenging end to 2021. In our new company’s first threat report, we acknowledge the issue that dominated not only headlines, but the focus of defenders and enterprise security teams. We also look back at the third and fourth quarters of 2021, but let’s first detail our weather of resources available to help you combat Log4j.

(more available)
Added: February 27, 2023
image from The Threat Report Summer 2022

The Threat Report Summer 2022

The first quarter of 2022 in cybersecurity was more about evolution than revolution. The techniques and prevalence of ransomware attacks advanced while Russian cyberattacks continues a slow-building evolution fed by the continuing conflict in Ukraine. Our latest Trellix Threat Report includes our findings from Q1 2022 and other vital research included the evolution of Russian cybercrime, ransomware in the United States, and email security trends. We also share our team’s recent research into vulnerabilities found in building access control systems, and risks unquie to connected healthcare.

(more available)
Added: February 27, 2023
image from Cyber Threat Predictions for 2023

Cyber Threat Predictions for 2023

Last year, we made several predictions about how the threat landscape would evolve, ranging from attackers spending more effort on pre-attack activities to an increasing number of attack attempts impacting operational technology (OT). Lets look at how some of our predictions fared and how we expect these threats to evolve as we plan for 2023.

(more available)
Added: February 22, 2023
image from X-Force Threat Intelligence Index 2023

X-Force Threat Intelligence Index 2023

The IBM Security X-Force Threat Intelligence Index 2023 tracks new and existing trends and attack patterns and includes billions of datapoints ranging from network and endpoint devices, incident response (IR) engagements, vulnerability and exploit databases and more. This report is a comprehensive collection of our research data from January to December 2022.

(more available)
Added: February 22, 2023
image from 2022 Cyberthreat Defense Report

2022 Cyberthreat Defense Report

CyberEdge’s annual Cyberthreat Defense Report (CDR) plays a unique role in the IT security industry. Other surveys do a great job of collecting statistics on cyberattacks and data breaches and exploring the techniques of cybercriminals and other bad actors. Our mission is to provide deep insight into the minds of IT security professionals.

(more available)
Added: February 21, 2023
  • ««
  • «
  • 14
  • 15
  • 16
  • 17
  • 18
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 04:08 UTC (build b1d7be4)