Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Social Engineering

Below you will find reports with the tag of “Social Engineering”

image from The State of Remote Work Security

The State of Remote Work Security

The State of Remote Work Security Report reveals the status of organizations’ efforts to secure the new workforce, key challenges, and unique security threats faced by organizations, technology gaps and preferences, investment priorities, and more. The need to secure the remote workforce has never been more critical. A year into the pandemic, organizations are still grappling with how to protect their assets.

(more available)
Added: October 24, 2022
image from 2021 SOAR Report

2021 SOAR Report

The 2021 SOAR Report is based on a comprehensive survey of cybersecurity professionals to uncover the latest trends, use cases, and benefits of SOAR solutions.

(more available)
Added: October 24, 2022
image from The State of Authentication in the Finance Industry

The State of Authentication in the Finance Industry

This report shines an important spotlight on the perceptions of global financial institutions around authentication. As the study findings show, these remains much to do to close these security gaps, and traditional MFA methods are not delivering the security that we all need.

(more available)
Added: October 24, 2022
image from 2021 Threat Hunting Report

2021 Threat Hunting Report

The 2021 Threat Hunting Report explores the challenges, technology preferences, and benefits of threat hunting to gain deeper insights into the maturity and evolution of the security practice. Threat hunting continues to evolve as an innovative cybersecurity tactic that focues on proactively detecting and isolating Advanced Persistent Threats (APTs) that might otherwise go undetected by tradition, reactive security technologies.

(more available)
Added: October 24, 2022
image from 2021 Business Email Compromise Report

2021 Business Email Compromise Report

This report is designed to explore the state of evolving email threats and how organizations are responding to protect themselves. Business Email Compromise attacks are one of the financially most damaging cyber crimes. They typically involve phishing emails and social engineering tactics to attack organizations and trick unsuspecting employees and executives into conducting tasks under the guise of legitimate business activity, often appearing to come from a trust sender.

(more available)
Added: October 18, 2022
image from 2021 Malware Report

2021 Malware Report

The 2021 Malware Report is to reveal the latest malware security trends, challenges, and investment priorities. Malware is continuously evolving and organizations are facing significant challenges in responding to the threat and protecting their IT environments against new types of viruses, worms, spyware, ransomware, and crypto-jacking malware.

(more available)
Added: October 18, 2022
image from Email Security: The Confidence Game 2022

Email Security: The Confidence Game 2022

The Email Security in 2022: Confidence Game report is based on the results of a comprehensive online global survey of 294 cybersecurity professionals, conducted in Fall 2021, to gain deep insight into the latest trends, key challenges, and solutions for email security. The respondents range from technical executives to managers and IT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: October 17, 2022
image from The State of Passwordless Security 2022

The State of Passwordless Security 2022

The 2022 State of Passwordless Security Report is based on a comprehensive survey of 411 technology professionals to explore the state of conventional and passwordless authentication, key drivers and barriers to adoption, and organizations’ technology preferences. Respondents range from technical executives to IT security practitioners, representing a cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: October 17, 2022
image from Threat Horizons September 2022

Threat Horizons September 2022

The Google Cloud Threat Horizons Report brings decision-makers strategic intelligence on current and likely future threats to cloud enterprise users and the best original cloud-relevant research and security recommendations from across Google’s intelligence and security teams.

(more available)
Added: October 14, 2022
image from The State of Encrypted Attacks

The State of Encrypted Attacks

The Zscaler Zero Trust Exchange houses the largest security data set in the world, collected from over 300 trillion signals and 160 billion daily transactions - more than 15x the volume of Google searches each day. Zscaler’s ThreatLabz threat research team analyzed this data from the last nine months of 2021, assessing threats in encrypted traffic over the span.

(more available)
Added: September 27, 2022
image from Cyber Claims Study 2019

Cyber Claims Study 2019

This study, based on over 2,000 cyber claims, provides a comprehensive view of recent cyber claim events. The 2019 report also included data from NetDiligence studies published in 2015-2018, representing 1,008 events that occurred in 2014 to 2017. After the elimination claims that were less than $1,000, the combined dataset included 2,081 events, each one a data breach insurance claim.

(more available)
Added: September 20, 2022
image from Gaming in a Pandemic

Gaming in a Pandemic

In this edition, we look at the attacks and trends in the gaming industry during 2020. It was a volatile year, and we’re not just speaking about the pandemic. Web attacks targeting the gaming industry were up 340% year over year between 2019 and 2020, and credentials stuffing attacks were up 224%. Strangely enough, DDoS attacks against the gaming industry fell by nearly 20% during the same period.

(more available)
Added: September 14, 2022
image from Quarterly Threat Report Q1 2022

Quarterly Threat Report Q1 2022

The report surfaces the most significant data we’re seeing in our threat detection and response effort, curates that data into trends that can impact your cybersecurity posture, and offers resilience recommendations to protect your organization.

(more available)
Added: August 25, 2022
image from Quarterly Threat Report Q2 2022

Quarterly Threat Report Q2 2022

These reports provide data and insights on the attack we’re seeing, how to spot them, and the top ways you can protect your organization. These trends are based on incidents our security operations center (SOC) identifies through investigations into alerts, emails submissions, and threat hunting leads in the second quarter (Q2) of 2022. We analyzed incidents across our customer base, spanning organizations of various shapes, sizes, and industries, from April 1, 2022 to June 30, 2022.

(more available)
Added: August 25, 2022
image from The Human Factor 2022

The Human Factor 2022

This report will look at how ransomware caused gas shortages on the east coast, why a Justin Bieber tour might have put on the phone with a malware distributor, and what an increase in SMS phishing means for mobile security. We’ll also explore the evolving relationship between malware distributors and one of the world’s most successful ransomware gangs, and how legitimate cloud services now provide the infrastructure for a majority of malicious activity.

(more available)
Added: August 11, 2022
image from 2022 State of the Phish Report

2022 State of the Phish Report

In this, our eighth annual State of the Phish report, we explore user vulnerabilities from multiple angles. We look at issues driven by poor cyber hygiene and those that could result from a lack of knowledge and clear communication. We discuss ways organizations can become more attuned to their risks. And we outline opportunities to build and sustain engaging security awareness training initiatives in the challenging climate.

(more available)
Added: August 11, 2022
image from X-Force Threat Intelligence Index 2022

X-Force Threat Intelligence Index 2022

The IBM Security X-Force Threat Intelligence Index maps new trends and attack patterns we observed and analyzed from our data - drawing from billions of datapoints ranging from network and endpoint detection devices, incident response (IR) engagements, domain name tracking and more. This report represents the culmination of that research based on data collected from January to December 2021.

(more available)
Added: August 8, 2022
image from Targeted attack on industrial enterprises and public institutions

Targeted attack on industrial enterprises and public institutions

In January 2022, Kaspersky ICS CERT experts detected a wave of targeted attacks on military industrial complex enterprises and public institutions in several Eastern European countries and Afghanistan. In the course of our research, we were able to identify over a dozen of attacked organizations. An analysis of information obtained during our investigation indicates that cyberespionage was the goal of this series of attacks.

(more available)
Added: August 8, 2022
image from Nuspire Threat Landscape Report Q1 2022

Nuspire Threat Landscape Report Q1 2022

At Nuspire, we’re still witnessing threat actors using malicious files and cashing in on newly announced vulnerabilities. Threat actors are opportunistic for the most part and seek the easiest access for the least amount of effort. We explore these ideas and cover some of the most prevalent ways we’ve see threat actors attempt to breach the gates. After we dig into the data, we’ll provide you with actionable takeaways you can apply to your network to harden your defenses.

(more available)
Added: June 2, 2022
image from 2021 State of Phishing & Online Fraud Annual Report

2021 State of Phishing & Online Fraud Annual Report

This 2021 State of Phishing and Online Fraud Report highlights the key trends that drove digital scams using data gathered from analyzing more than one billion sites. A multitude of factors drove record growth in fraud campaign activity in 2020 with an increase of 185% from what was observed in 2019.

(more available)
Added: May 13, 2022
image from 2021 Webroot BrightCloud Threat Report

2021 Webroot BrightCloud Threat Report

The threat intelligence, trends and details presented in the 2021 Webroot BrightCloud Threat Report are based on data continuously and automatically captured by the Webroot Platform, which is the proprietary machine learning-based architecture that powers all of our Webroot protection and BrightCloud services.

(more available)
Added: April 25, 2022
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 12:08 UTC (build b1d7be4)