Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Cyber Bank Heists: Threats to the financial sector

Cyber Bank Heists: Threats to the financial sector

This annual report sheds light on the cybersecurity threats facing the financial sector. The report provides cyber ground truth, specifically manifesting an eye-opening perspective on the changing behavior of cybercriminal cartels and the defensive shift of the financial sector. In this year’s report, financial sector security leaders from around the world revealed during a series of interviews the type of attacks they’re currently seeing, what threats they’re most concerned about and how they’re adjusting their security strategy.

(more available)
Added: February 21, 2023
image from 2023 Cybersecurity Risk Report

2023 Cybersecurity Risk Report

The RiskLens Cybersecurity Risk Report is designed to provide references estimate for the probability, loss, and loss exposure of common cyber events. It summarizes the findings by industry and event themes, and details how actionable variables, such as security stance and data retention management, can reduce risk exposure.

(more available)
Added: February 21, 2023
image from The Biggest Cyber Security Threats Coming in 2022

The Biggest Cyber Security Threats Coming in 2022

Our findings should serve as a wake-up call to both the mid-market segment and the cyber security industry that is currently underserving it. In just the past two years, attacks against mid-sized companies overall have increased by 150%, with attacks against specific sectors ranging from just about doubling to nearly tripling over that two-year period. At the same-time, mid-market companies’ defenses against these growing attacks have not kept pace.

(more available)
Added: February 17, 2023
image from National Cyber Threat Assessment 2023-2024

National Cyber Threat Assessment 2023-2024

The National Cyber Threat Assessment 2023-2024 will help Canadians understand current cyber security trends, and how they are likely to evolve. The NCTA is especially helpful for Canadian decision-makers as the focus is on cyber threats most relevant to Canada.

(more available)
Added: February 15, 2023
image from Comparison of Public and Private Sector Cybersecurity and IT Workforces

Comparison of Public and Private Sector Cybersecurity and IT Workforces

In this report, we update the research summarized in the Capstone Report with current job opening data to compare the civilian cybersecurity and IT workforces with those in the U.S. government and the private sector. We also extend the DoD-private industry comparison research summarized in the Capstone Report by further examining the proportion of workers across a common taxonomy of cyber work roles, salaries paid across work roles, and demand for these jobs. Thus, this report both updates and expands upon the research presented in the Capstone Report.

(more available)
Added: February 15, 2023
image from 2022 Identity Breach Report

2022 Identity Breach Report

Constella’s 2022 Breach Report offers key insights into these cyber threats and the staggering impact of malign activities fueled by breach data circulating on the deep and dark web. The following key findings represent the most significant and relevant trends for individuals, businesses, brands, and public organizations. This report also includes an extended analysis examining the ongoing conflict in Ukraine.

(more available)
Added: February 15, 2023
image from Great eXpeltations: Cyber trends and predictions 2023

Great eXpeltations: Cyber trends and predictions 2023

This report, co-authored by our security operations center (SOC) leadership team, aggregates data from the incidents we investigated in 2022. It covers our full customer base, from small and midsize companies to enterprise organizations at every phase of the security journey across every industry we serve.

(more available)
Added: February 15, 2023
image from 2022 State of the Threat

2022 State of the Threat

The purpose of this report is to share our view on how the threat landscape has evolved over the last twelve months, with a clear focus on our first-hand observations of threat actor tooling and behaviors. This report reviews changes in the ransomware landscape, and in the behavior of threat actors enabling ransomware groups with malware like loaders and stealers. It surveys significant activity by major government-sponsored threat groups. And it examines how threat actors move swiftly to exploit new vulnerabilities, and how they combine sophisticated with more basic techniques to evade detection by defenders once inside the network. The report concludes by examining how Taegis forms the backbone of this visibility.

(more available)
Added: February 14, 2023
image from Disrupting Initial Access

Disrupting Initial Access

This report summarizes the ever-changing TTPs leveraged to achieve Initial Access from security incidents thwarted by eSentire’s 24/7 SOC Analysts over a two-year period between April 2020 to April 2022. Experts from out TRU team have summarized an analysis of Initial Access trends and presented recommendations on how your organization can precent attackers from establishing initial footholds and deploying malware.

(more available)
Added: February 14, 2023
image from Global Perspectives on Threat Intelligence

Global Perspectives on Threat Intelligence

This first-of-its-kind report offers insight into how organizations are navigating the global cyber security threat landscape. Findings are drawn from extensive interviews with 1,350 business and IT leaders who make security decisions for organizations with at least 1,000 employees. Respondents were based in 13 countries across three regions and in 18 sectors - including financial services, healthcare and government.

(more available)
Added: February 13, 2023
image from Ransomware Variants Intelligence Bulletin

Ransomware Variants Intelligence Bulletin

Intel 471 reported 34 ransomware variants were used to conduct 722 attacks from October 2021 to December 2021, an increase of 110 and 129 attacks from the third and second quarters of 2021, respectively.

(more available)
Added: February 9, 2023
image from Leading Ransomware Variants Q3 2022

Leading Ransomware Variants Q3 2022

Intel 471 reported 27 ransomware variants were used to conduct 455 attacks from July 2022 to September 2022, a decrease of 38 attacks from the second quarter of 2022 and 134 from the first quarter of 2022. The daily average of reported LockBit breaches was two - the same trend we observed from the ransomware group in the third and fourth quarters of 2021 and the first and second quarters of 2022.

(more available)
Added: February 9, 2023
image from Gaming Cyber Threats

Gaming Cyber Threats

Intel 471 can help your organization defend against a wide variety of cyber threats by providing deep insights and comprehensive expertise into cybercriminal actors and related activity. This report provides a brief exploration of our unique insight into the cyber underground, highlighting how we can proactively help you stay ahead of the curve, enabling you to fight cybercrime and win.

(more available)
Added: February 9, 2023
image from UK Cyber Threats

UK Cyber Threats

This report provides a strategic-level overview of threats identified impacting the U.K. and U.K. based businesses, including ransomware and initial access brokers (IABs). as well as common threat actors tactics, techniques and procedures (TTPs) observed.

(more available)
Added: February 9, 2023
image from 2022 Year In Review

2022 Year In Review

Our research and collection methods largely are driven by our GIRs, however, we continue to acknowledge that new trends in our reporting, recurring requests for information (FRIs) and other significant activity from or against underground threat actors and/or services are equally important to our research into trending topics.

(more available)
Added: February 8, 2023
image from Sysdig 2023 Cloud-Native Security and Usage Report

Sysdig 2023 Cloud-Native Security and Usage Report

This report is based on data gathered from billions of containers, thousands of cloud accounts, and hundreds of thousands of applications that our customers operated over the course of the last year. Our findings provide signs of hope for overburdened developers, as the data showed opportunities to focus remediation efforts on vulnerable packages loaded at runtime.

(more available)
Added: February 7, 2023
image from Director Sentiment Monitor Quarterly Members' Survey Q4 2022

Director Sentiment Monitor Quarterly Members' Survey Q4 2022

In this Director Sentiment Monitor for Q4 2022, 41% of respondents told us their primary organization has experienced a cyber attack. Interestingly, 36% of respondents said their primary organization had cyber security as a standing item at all board meeting, while 27% said it was discussed quarterly. Among other findings, it is also encouraging that 81% of respondents said their primary organization has a cyber security response plan in place.

(more available)
Added: February 2, 2023
image from Close Encounters of the Third (and Fourth) Party Kind

Close Encounters of the Third (and Fourth) Party Kind

This report offers an in-depth examination of the underlying condition that enables such incidents to take place-the widespread interdependence of modern digital supply chains. We analyzed data from over 230,000 organizations to investigate the prevalence of security incidents among third parties. We then measure the extent of vendor relationships and explore the effects of that exposure. Finally, we compare the security posture of organizations to that of their third and fourth-parties to yield data-driven insights on how to identify risky vendors and better manage exposure.

(more available)
Added: February 1, 2023
image from 2023 Global Future of Cyber Security

2023 Global Future of Cyber Security

We are excited about the future of cyber, and I invite you to join us in exploring some of the key finding in this report. In addition to data derived from the survey results, the report also includes observation and insights taken directly from survey respondents, as well as additional Deloitte insights on cyber, cloud, and other technologies enabling the future of business.

(more available)
Added: January 30, 2023
image from Global Cybersecurity Outlook 2023

Global Cybersecurity Outlook 2023

The World Economic Forum’s Global Cybersecurity Outlook 2023, in collaboration with Accenture, examines the cybersecurity trends that will impact our economies and societies in the year to come.

(more available)
Added: January 30, 2023
image from The Total Economic Impact Of Mimecast

The Total Economic Impact Of Mimecast

This study documents and quantifies how Mimecast protects organizations against threats. Cybercrime affects every organization no matter the size or type, and it’s a threat that is growing and changing constantly.

(more available)
Added: January 30, 2023
  • ««
  • «
  • 15
  • 16
  • 17
  • 18
  • 19
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 04:08 UTC (build b1d7be4)