Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Social Engineering

Below you will find reports with the tag of “Social Engineering”

image from Remote Access Trojan KONNI Targeting North Korea Technical Analysis And Solution

Remote Access Trojan KONNI Targeting North Korea Technical Analysis And Solution

This report looks at a remote access Trojan named KONNI that was targeting North Korea.

Added: October 18, 2018
image from Security Response: The Waterbug Attack Group

Security Response: The Waterbug Attack Group

This report takes a look at the Waterbug Attack Group and their impact in 2016.

Added: October 18, 2018
image from 2017 Phishing Response Trends US Region

2017 Phishing Response Trends US Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 17, 2018
image from 2017 Quarterly Threat Report Q3

2017 Quarterly Threat Report Q3

This report takes a look at the cyber threats that took place in the 3rd Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 17, 2018
image from Cyber Threats To The Healthcare And Health Insurance Industries

Cyber Threats To The Healthcare And Health Insurance Industries

Learn about current and impending cyber threats to the healthcare and health insurance industry.

Added: October 17, 2018
image from External Threats: Security Beyond The Perimeter

External Threats: Security Beyond The Perimeter

The Purpose of this study is to understand companies’ ability to analyze and mitigate online incidents and cyber attacks that are beyond the traditional security perimeter.

(more available)
Added: October 17, 2018
image from Mobile Data Report

Mobile Data Report

This report pays particular attention to the state of mobile security in law firms.

Added: October 17, 2018
image from Office 365 Exchange Online: Research Report December 2016

Office 365 Exchange Online: Research Report December 2016

This ebook provides a report on the results of a survey that was conducted to discover information on 4 issues related to Office 365.

(more available)
Added: October 17, 2018
image from Past And Present Of Underground Network Industry

Past And Present Of Underground Network Industry

This document presents the definition, category, means, and examples of the underground network industry, as well as protection measures.

Added: October 17, 2018
image from Qaurterly Threat Report Q! 2017

Qaurterly Threat Report Q! 2017

The Proofpoint Quarterly Threat Report captures threats, trends and transformations we see within our customer base and in the wider security market.

(more available)
Added: October 17, 2018
image from Trusted Access Report 2018

Trusted Access Report 2018

This report takes a closer look at user authentications and how users behave in phishing simulations, as well as shedding light on the security health of users’ devices used to log into enterprise applications.

(more available)
Added: October 17, 2018
image from Two Years Of Pawn Storm: Examining An Increasingly Relevant Threat

Two Years Of Pawn Storm: Examining An Increasingly Relevant Threat

This paper is exclusively dedicated to the cyber threat, Pawn Storm.

Added: October 17, 2018
image from Under The Hoodie: Lessons From A Season Of Penetration Testing

Under The Hoodie: Lessons From A Season Of Penetration Testing

This report offers insight from the research and results of Rapid7’s repeated penetration testing.

Added: October 17, 2018
image from 2016 State Of Privacy & Security Awareness

2016 State Of Privacy & Security Awareness

From the report, “Good privacy and security practices are often common sense—but ensuring that this common sense is applied consistently and rigorously makes all the difference in the world. In a truly risk-aware organization, employees combine policy know-how, common sense, and a keen eye for detail as they regularly align their actions with your organizations security and privacy principles. How will you ensure that you’ve got such a culture?”

(more available)
Added: October 16, 2018
image from 2017 Phishing Response Trends UK Region

2017 Phishing Response Trends UK Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 16, 2018
image from Digging Deeper: An In Depth Analysis Of A Fast Flux Network

Digging Deeper: An In Depth Analysis Of A Fast Flux Network

This whitepaper provides some insight into a Fast Flux Network and its ability to deal with attacks.

Added: October 16, 2018
image from Tracking Trends In Business Email Compromise

Tracking Trends In Business Email Compromise

This report takes a look at Business Email Compromise attacks and examines why the FBI was able to report that it has become a billion dollar industry.

(more available)
Added: October 16, 2018
image from Trusted Access Report 2017

Trusted Access Report 2017

This paper discusses the evolution of enterprise security.

Added: October 16, 2018
image from 2017 Phishing Response Trends South Africa Region

2017 Phishing Response Trends South Africa Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 15, 2018
image from 2017 Quarterly Threat Report Q1

2017 Quarterly Threat Report Q1

This report takes a look at the cyber threats that took place in the 1st Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 15, 2018
image from DMARC Intelligence Report 2016

DMARC Intelligence Report 2016

In this annual report, they track the progress of Domain-based Message Authentication, Reporting, and Conformance (DMARC)

Added: October 15, 2018
  • ««
  • «
  • 14
  • 15
  • 16
  • 17
  • 18
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 08:08 UTC (build b1d7be4)