Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Social Engineering

Below you will find reports with the tag of “Social Engineering”

image from X-Force Threat Intelligence Index 2024

X-Force Threat Intelligence Index 2024

The biggest shift the IBM X-Force team observed in 2023 was a pronounced surge in cyberthreats targeting identities. Attackers have a historical inclination to choose the path of least resistance in pursuit of their objectives. In this era, the focus has shifted towards logging in rather than hacking in, highlighting the relative ease of acquiring credentials compared to exploiting vulnerabilities or executing phishing campaigns. Lack of identity protections was corroborated by IBM X-Force penetration testing data for 2023, which ranked identification and authentication failures as the second most common finding.

(more available)
Added: February 29, 2024
image from Workplace Identity Security Trends and Challenges to Watch in 2024

Workplace Identity Security Trends and Challenges to Watch in 2024

The Workplace Identity Security Trends and Challenges report investigates the identity security landscape and challenges facing organizations today. The research finds that many struggle to build an integrated and comprehensive identity security strategy, relying on disconnected tools and practices that create inefficiencies and leave organizations seriously vulnerable to attacks and breaches.

(more available)
Added: February 26, 2024
image from 2024 Fortra State of Cybersecurity Survey Results

2024 Fortra State of Cybersecurity Survey Results

Our respondents were asked to open up about the challenges they’ve faced while securing their digital enterprises over the past year. We are at a critical juncture in digital transformation. The distributed workforce is now the norm, and companies must support remote productivity of which cloud will play a key role. This requires leaders to plan security for hybrid infrastructure – a distinct departure from the inherited on-premises strategies of most organizations. That’s why there is a lot to learn from this year’s temperature check on the industry.

(more available)
Added: February 14, 2024
image from 2024 Security Awareness Predictions

2024 Security Awareness Predictions

This report aims, simply, to help you build a proactive defense that anticipates and thwarts tomorrow’s threats. So, for the second year running we rallied the community for the largest predictions survey the cybersecurity awareness community has seen. We’ve harnessed their expertise, experience, and frontline intel.

(more available)
Added: February 14, 2024
image from Expel Annual Threat Report 2024

Expel Annual Threat Report 2024

This report is broken into four different threat types: identity, cloud, computer-based, and phishing. Keep in mind, though, that these threats are tightly related. Compromise of user identities can occur through phishing and can impact an organization’s cloud assets and endpoints, or malicious activity on an endpoint may be indicative of an exploited vulnerability. We’ll highlight that interconnectivity throughout.

(more available)
Added: January 30, 2024
image from 2024 Cyber Security Report

2024 Cyber Security Report

By leveraging its huge user dataset, Hornet security is uniquely positioned to conduct a detailed examination of email-based threats and distill this into important insights for IT security professionals. Email continues to be an essential communication channel. However, in our analysis of more than 45 billion emails, 36.4% are categorized as “unwanted.” 96.4% of unwanted emails are spam or rejected outright due to external indicators, and just over 3.6% were flagged as malicious.

(more available)
Added: January 12, 2024
image from Cyber Security Report 2023

Cyber Security Report 2023

The Cyber Security Report (formerly Cyber Threat Report) is an annual analysis of the current cyber threat landscape based on real-world data collected and studied by Hornet security’s dedicated Security Lab team. Hornet security processes more than two billion emails every month. By analyzing the threats identified in these communications, combined with a detailed knowledge of the wider threat landscape, the Security Lab reveals major trends and can make informed projections for the future of Microsoft 365 security threats, enabling businesses to act accordingly. Those findings and data are contained within this report.

(more available)
Added: January 12, 2024
image from Hiscox Cyber Readiness Report 2021

Hiscox Cyber Readiness Report 2021

The Hiscox Cyber Readiness Report 2021 reveals that US firms are a global leader in cyber readiness, with more classified as ’cyber experts,’ (25%) compared to other countries. But there is still work to be done when it when it comes to dealing with ransomware and phishing emails, as US businesses are the most likely to pay a ransom. In this year’s report, we saw a disparity when it came to the level of cyber expertise US businesses have versus the actions they take when an attack actually occurs.

(more available)
Added: December 19, 2023
image from The Annual Cybersecurity Attitudes and Behaviors Report 2023

The Annual Cybersecurity Attitudes and Behaviors Report 2023

In this report, CybSafe and The National Security Alliance surveyed over 6,000 people across the United States, Canada, the United Kingdom, Germany, France, and New Zealand to get a better understanding of the security behaviors and attitudes. They asked the people about their knowledge of cybersecurity risks, their security best practices, and challenges they face in staying safe online. Cybercriminals know if they want to target an organization, they need to target its people. They believe this report will help organizations to better protect themselves and their people.

(more available)
Added: November 29, 2023
image from Threat landscape for industrial automation systems: H1 2023

Threat landscape for industrial automation systems: H1 2023

The report presents the findings of the analysis of statistical data obtained using the Kaspersky Security Network (KSN) distributed antivirus network. The data was received from those KSN users who gave their voluntary consent to have data anonymously transferred from their computers and processed for the purpose described in the KSN Agreement for the Kaspersky product installed on their computer.

(more available)
Added: November 17, 2023
image from 2023 State of Cybersecurity Automation Adoption

2023 State of Cybersecurity Automation Adoption

This is the third edition of ThreatQuotient’s annual survey of senior cybersecurity professionals, exploring the topic of cybersecurity automation adoption. Read this report to understand how CISOs and senior cybersecurity professionals are handling the incorporation of cybersecurity automation into their strategies to protect the complex, extended enterprise – and their analyst teams – from the pressures of escalating cyber threats.

(more available)
Added: November 15, 2023
image from 2023 Identity Threat Report: The Unpatchables

2023 Identity Threat Report: The Unpatchables

The purpose of this report is to assess and summarize the current threat landscape facing organizations as a result of the digital identities that they issue to legitimate users. We called this report “The Unpatchables” because digital identities represent a source of technical risk that is impossible to completely mitigate even in theory.

(more available)
Added: November 2, 2023
image from 2023 Human Risk Review

2023 Human Risk Review

In this study on general phishing awareness, over 9,000 simulated phishing emails were sent to users who signed up in 2022. Participants were sent three simulated attacks over the course of a week- all classified as moderate in terms of complexity. The users had to identify these emails. If they clicked, they were forwarded to contextual learning resources.

(more available)
Added: October 25, 2023
image from The 2023 OpenText Cybersecurity Threat Report

The 2023 OpenText Cybersecurity Threat Report

The 2023 OpenText Cybersecurity Threat Report is based on data continuously and automatically captured by the BrightCloud Platform — the proprietary machine learning based architecture that powers all of our Webroot protection and BrightCloud services. This data comes from over 95 million real-world endpoints and sensors, specialized third party databases, and intelligence from end users protected by our technology partners. In this report, we’ll break down a broad range of threat activity, offer insights into the trends we’ve observed, discuss wide reaching impacts for industries, geographies, companies, and individuals, and reveal what our threat experts expect to see in the coming year.

(more available)
Added: September 26, 2023
image from 2023 RSA ID IQ Report

2023 RSA ID IQ Report

With security threats putting everything from personal information to critical infrastructure at risk, and with the incidence of ransomware attacks and other data breaches increasing, the 2023 RSA ID IQ Report provides cybersecurity professionals with insights into users’ understanding and behavior. By reviewing users’ answers on the identity components needed to develop a zero trust framework, multi-factor authentication, the vulnerability of mobile devices, and other cybersecurity threats, leaders can prioritize actions and implement best practices to keep their organizations secure.

(more available)
Added: September 1, 2023
image from CISC Engagement and Decision Drivers Study Report II, 2nd Half, 2022

CISC Engagement and Decision Drivers Study Report II, 2nd Half, 2022

In this report, we dive into measuring engagement, along with the most popular content types, and a roundup of the events that resonated most with audiences, offering key marketing takeaways on everything from intent topics to what has generated the most engagement through Q3 2022. We have also highlighted the brands generating the most engagement from their content marketing efforts. And we factor in how newsworthy cybersecurity events impact audience engagement, and content preferences.

(more available)
Added: August 3, 2023
image from Security Implications of ChatGPT

Security Implications of ChatGPT

This paper aims to provide a high-level overview of the implications of ChatGPT in the cybersecurity industry, without delving into the granular details of artificial intelligence. We will explore the key concepts and domains that are crucial for understanding ChatGPT’s capabilities, as well as the potential impact on businesses.

(more available)
Added: August 3, 2023
image from 2022 Everywhere Workplace Report

2022 Everywhere Workplace Report

This report features some of the most compelling data from our survey and gives actionable insights to leaders hoping to accelerate progress and enhance the employee experience in the Everywhere Workplace.

(more available)
Added: June 29, 2023
image from A CISO's Guide to Email Security in 2023

A CISO's Guide to Email Security in 2023

CISOs are facing increased challenges in an escalating threat landscape, with email as the primary target for attacks. This white paper breaks down the requirements for modern email security in protecting organizations from advanced and novel threats – moving from historically-trained tools to a behavioral, AI-driven approach.

(more available)
Added: June 29, 2023
image from Managing Security Risk: Cybersecurity Solutions for Mid-Sized Businesses

Managing Security Risk: Cybersecurity Solutions for Mid-Sized Businesses

There is a new security reality facing mid-sized business leaders and security professionals today. In this guide, you’ll find answers to these challenges and how an MDR solution can help you efficiently maximize security investments and effectively manage security risks to your business.

(more available)
Added: June 28, 2023
image from 2023 OpenText Cybersecurity Email Threat Report

2023 OpenText Cybersecurity Email Threat Report

Attackers persistently adapted their email-based techniques throughout 2022, cycling through new and old tactics in the hopes of evading human and cyber security measures.

(more available)
Added: June 27, 2023
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 20:08 UTC (build b1d7be4)