Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Skimmers

Below you will find reports with the tag of “Skimmers”

image from Threat Intelligence Executive Report 2020 Vol. 4

Threat Intelligence Executive Report 2020 Vol. 4

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2020, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.

(more available)
Added: April 20, 2022
image from 2020 State of Malware Report

2020 State of Malware Report

This report goes in-depth into the changes in malware attacks for 2020, using data collected from honey pots, telemetry, and research conducted by threat analysts and reporters in 2019.

(more available)
Added: September 28, 2020
image from 2019 Website Threat Research Report

2019 Website Threat Research Report

Our 2019 Threat Research Report is a deep dive into our logs, experiences, and collected analysis. It summarizes and identifies the latest tactics, techniques, and procedures seen by the Malware Research team, Vulnerability Research team, Threat Intel Research team and Remediation Groups at Sucuri/GoDaddy.

(more available)
Added: March 29, 2020
image from Fortinet Quarterly Threat Landscape Report Q2 2019

Fortinet Quarterly Threat Landscape Report Q2 2019

This is quarterly publication from Fortinet that looks in the current cyber security threats from April 1 to July 1.

(more available)
Added: October 1, 2019
image from Retail and Hospitality Threat Trend Report

Retail and Hospitality Threat Trend Report

This report covers trends in retail and hospitality in 2019. It covers Cyber espionage that impacts hospitality, how virtual skimming threat data poses risk to payment card data, and an analysis and comparison of point-of-sale malware companies.

(more available)
Added: September 18, 2019
image from 7 Secrets Of Online Fraud

7 Secrets Of Online Fraud

This is a handy guide that provides information useful for understanding online fraud.

Added: February 13, 2019
image from The Q3 2018 Mobile Threat Landscape Report

The Q3 2018 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. Q3 showed a nearly 220 percent increase in blocklisted apps over Q2. Due to a surge in total apps observed, the percentage of blocklisted apps dropped from 4% in Q2 to 3% in Q3.

(more available)
Added: January 25, 2019
image from Threat Intelligence Bulletin

Threat Intelligence Bulletin

This report offers information related to an ATM Jackpotting kit for sale on darknet.

Added: December 5, 2018
image from Underground Hacker Markets

Underground Hacker Markets

For our 3rd Annual Underground Hacker Markets Report, Dell SecureWorks engaged two of our top intelligence analysts from our CISO INTEL Team. The team members spend time tracking hackers on the numerous underground hacker forums and marketplaces all over the world. While much of the cybercrime hitting organizations throughout the world is the result of cooperation by hackers working outside the confines of publicly-accessible marketplaces, these underground forums provide a small window into the world cybercriminals occupy. In this report, we concentrated on marketplaces located on the Russian Underground and on English-speaking marketplaces between Q3 2015 and Q1 2016.

(more available)
Added: October 16, 2018
© Cyentia Institute 2025
Library updated: June 26, 2025 08:08 UTC (build b1d7be4)