Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Social Engineering

Below you will find reports with the tag of “Social Engineering”

image from 2020 Threat Detection Report

2020 Threat Detection Report

This report is an in-depth analysis of tens of thousands of threats detected across our customers’ environments, this research arms security leaders and their teams with a unique understanding of the threats they’re facing.

(more available)
Added: April 19, 2022
image from Adversarial Threat Report

Adversarial Threat Report

This report is Meta’s quarterly adversarial threat report that provides a broad view into the risks we see worldwide and across multiple policy violations.

(more available)
Added: April 8, 2022
image from 2022 BrightCloud Threat Report

2022 BrightCloud Threat Report

This is the 2022 BrightCloud Threat Report.

Added: April 8, 2022
image from 2022 Global Mobile Threat Report

2022 Global Mobile Threat Report

A review of mobile device application security, based upon a combination of data from Zimperium’s product and suvey based results.

(more available)
Added: April 6, 2022
image from The Size and Shape of Workforce Risk

The Size and Shape of Workforce Risk

A deep dive into the profiles of workforce members, identifying the characteristics of greater and less cyberrisk.

Added: March 9, 2022
image from Cyber Signals

Cyber Signals

A cyberthreat intelligence brief informed by the latest Microsoft threat data and research. This content offers an expert perspective into the current threat landscape, discussing trending tactics, techniques and strategies used by the world’s most prolific threat actors.

(more available)
Added: February 9, 2022
image from Cybersecurity is Shifting: 8 Essential Trends for 2022

Cybersecurity is Shifting: 8 Essential Trends for 2022

The pandemic has changed everything. What strategies are CISOs and other security leaders implementing to ensure their organizations are secure in today’s uncertain environment? This report contains the 8 trends worth following to more effectively mitigate human risk in 2022.

(more available)
Added: January 12, 2022
image from DomainTools Report: Fall 2021

DomainTools Report: Fall 2021

A review of domain registration, hosting, and content-related data on attack patterns and trends.

Added: December 10, 2021
image from 2021 Cyber Security Threat Trends

2021 Cyber Security Threat Trends

The data used in this report comes from Cisco Umbrella, Cisco’s cloud delivered security service that includes DNS-layer security, secure web gateway, firewall, cloud access security broker (CASB) functionality, and threat intelligence.

(more available)
Added: December 9, 2021
image from The Annual Cybersecurity Behaviors and Attitudes Report 2021

The Annual Cybersecurity Behaviors and Attitudes Report 2021

This report examines cybersecurity attitudes and behaviors of the general public, shedding light on one of the most important aspects of cyber risk - the human factor. This research applies scientific rigor and robust data analysis to help academics, practitioners, and policy makers around the world better understand people-related security issues as they relate to enhancing awareness, influencing security behavior and improving security culture.

(more available)
Added: November 22, 2021
image from The Human Factor 2021

The Human Factor 2021

Using Proofpoint deployments across the globe over 2020, this report reviews the email messages, URLs, and attachments being communicated and what these mean for email and cyber security. An additional 300 customers provided information on privilege abuse concerns for a section of this report.

(more available)
Added: August 11, 2021
image from Egress Data Loss Prevention Report 2021

Egress Data Loss Prevention Report 2021

A survey of 500 IT leaders and 2000 remote-working employees within the UK and US on data losses. Focusing on human interaction issues such as email and insider threat events

(more available)
Added: July 15, 2021
image from Elevating Human Attack Surface Management

Elevating Human Attack Surface Management

Every year, enterprises spend millions on security technology and training — only to be caught on the hamster wheel of responding to incidents caused by recurrent human errors. Incredibly, human error has played a role in 88% of the total losses from the largest cyber incidents of the last 5 years.

(more available)
Added: May 12, 2021
image from Hiscox Cyber Readiness Report 2021

Hiscox Cyber Readiness Report 2021

This annual cyber readiness report focusing on the threats and losses as reported via a survey of over 6,000 organizations.

(more available)
Added: April 22, 2021
image from SOTI: Adapting to the Unpredictable

SOTI: Adapting to the Unpredictable

This edition of the SOTI focuses on malicious activity detected and managed over the course of 2020 via DNS filtering.

(more available)
Added: March 10, 2021
image from Phishing Activity Trends Report Q4 2020

Phishing Activity Trends Report Q4 2020

This report analyzes phishing attacks and other identity theft techniques used in Q4 2020.

Added: February 24, 2021
image from A Constant State of Flux: Trend Micro 2020 Annual Cybersecurity Report

A Constant State of Flux: Trend Micro 2020 Annual Cybersecurity Report

This report examines the most important stories, issues, and trends that affected the cybersecurity landscape in 2020.

Added: February 24, 2021
image from Follow the Money: Qualifying Opportunism Behind Cyberattacks During the COVID-19 Pandemic

Follow the Money: Qualifying Opportunism Behind Cyberattacks During the COVID-19 Pandemic

This report covers the cybersecurity threats tied to COVID-19 pandemic observed over the past year, detailing the socioeconomic drivers that contributed to the threat landscape.

(more available)
Added: January 29, 2021
image from Covid-19 Clicks: How Phishing Capitalized on a Global Crisis

Covid-19 Clicks: How Phishing Capitalized on a Global Crisis

This report is based off of a survey of 7,000 office workers around the world. It looks at worker’s understanding of phishing and email clicking habits. It also looks at changes in phishing since the COVID-19 pandemic. They reveal real-world concerns from workers around the globe and offer steps to help businesses and individuals resilient against phishing attacks.

(more available)
Added: December 18, 2020
image from Spear Phishing: Top Threats and Trends

Spear Phishing: Top Threats and Trends

This report looks at spear-phishing attacks affecting organizations today. It identifies the 13 biggest threats, and how to defend against them.

(more available)
Added: December 18, 2020
image from 2020 State of Data Security Report- 10 Trends to Watch

2020 State of Data Security Report- 10 Trends to Watch

This report is based on a survey aimed at understanding how businesses keep information safe. They outline 10 data breach trends and how they have changed in 2020.

(more available)
Added: December 16, 2020
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 12:08 UTC (build b1d7be4)