Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Social Engineering

Below you will find reports with the tag of “Social Engineering”

image from SOTI/Security: A Year in Review

SOTI/Security: A Year in Review

Akamai’s end of year review of the key events of 2020 affecting information security. Compiles findings from other SOTI reports with additional commentary and data from the Akamai service footprint.

(more available)
Added: December 9, 2020
image from Microsoft Digital Defense Report

Microsoft Digital Defense Report

This report looks at cybercrime in 2020, going into the changes in cybercrime, nationwide threats, security involving remote work, and how to improve security.

(more available)
Added: December 1, 2020
image from Market Analysis: Brave the New Normal

Market Analysis: Brave the New Normal

This report is a market analysis of companies in Asia-Pacific. It aims to look at new security challenges they face due to remote work.

(more available)
Added: December 1, 2020
image from 2020 State of Encrypted Attacks

2020 State of Encrypted Attacks

This report shares key insights on how attackers are accelerating their use of SSL/TLS encryption to bypass traditional defenses.

Added: December 1, 2020
image from 2020 Phishing and Fraud Report

2020 Phishing and Fraud Report

The 2020 edition of this annual report reviews five years of phishing events from F5’s Security Operations Center. This data is supplemented with active and confirmed phishing sites from Webroot and darkweb market data from Vigilante for a broad view of the volume and techniques of phishing activity.

(more available)
Added: November 16, 2020
image from 2020 Year in Review: ENISA Threat Landscape

2020 Year in Review: ENISA Threat Landscape

This is the 8th annual Year in Review Report. It looks at cyber threat intelligence, sectoral and thematic threats, emerging trends, and the biggest incidents worldwide from the past year.

(more available)
Added: November 1, 2020
image from Company-Issued Computers: What Are Employees Really Doing With Them?

Company-Issued Computers: What Are Employees Really Doing With Them?

This report comes from a survey of more than 1,000 businesspeople around the world that have a company-issued computing device. It looks into what people are using their work computers for, and how that can leave them vulnerable to cyber threats.

(more available)
Added: October 29, 2020
image from Threat Spotlight: Spear-phishing Attacks Targeting Education Sector

Threat Spotlight: Spear-phishing Attacks Targeting Education Sector

This report looks into spear-phishing attacks as the education sector has moved to be remote. It looks at trends in ways they are targeting schools, as well as solutions organizations can use to defend against these attacks.

(more available)
Added: October 29, 2020
image from Online Security Survey

Online Security Survey

This infographic is based off of a survey of 3,000 US consumer to better understand behaviors and beliefs around online security.

(more available)
Added: October 25, 2020
image from Phishing Attack Landscape Report 2020

Phishing Attack Landscape Report 2020

This report shows the latest trends, challenges, and best practices for email security, designed to help organizations better protect against today’s threats.

(more available)
Added: October 20, 2020
image from 2020 End User Phishing Report: Business Beware

2020 End User Phishing Report: Business Beware

This report is based on the results of a comprehensive interactive survey of 1,123 users in the United States, conducted in September 2020, who received 10 emails and were asked to identify whether each email was authentic or a phishing attack. The results provide insights into the latest trends in user behavior, challenges and gaps related to phishing attacks.

(more available)
Added: October 20, 2020
image from Phishing Landscape 2020: A Study of the Scope and Distribution of Phishing

Phishing Landscape 2020: A Study of the Scope and Distribution of Phishing

This study captures and analyzes a large set of information about phishing attacks, in order to better understand how much phishing is taking place, where it is taking place, and to see if the data suggests better ways to fight phishing.

(more available)
Added: October 14, 2020
image from ACSC Annual Cyber Threat Report: July 2019 to June 2020

ACSC Annual Cyber Threat Report: July 2019 to June 2020

This report outlines key cyber threats and statistics over the period 1 July 2019 to 30 June 2020. Over this period, the ACSC responded to 2,266 cyber security incidents and received 59,806 cybercrime reports at an average of 164 cybercrime reports per day, or one report every 10 minutes.

(more available)
Added: September 28, 2020
image from Protecting People 2019: A global Cybersecurity Analysis of Vulnerability, Attacks and Privilege

Protecting People 2019: A global Cybersecurity Analysis of Vulnerability, Attacks and Privilege

This report examines which employees, departments, and industries are the most vulnerable in 2019. It analyzes which ones receive the most targeted threats, and how their privilege might be abused.

(more available)
Added: September 28, 2020
image from ECSO Barometer 2020: "Cybersecurity In Light of COVID-19"

ECSO Barometer 2020: "Cybersecurity In Light of COVID-19"

This is a report on a survey conducted by the ECSO from March 2020 to May 2020, with members of the cybersecurity community. It found many shifts in European cybersecurity interests after the impact of the COVID-19 pandemic.

(more available)
Added: September 28, 2020
image from McAfee Labs COVID-19 Threats Report July 2020

McAfee Labs COVID-19 Threats Report July 2020

A deep dive threat report into COVID-19 related attacks.

Added: September 27, 2020
image from State of the Internet: Security Report: Volume 6, Issue 2 - Gaming

State of the Internet: Security Report: Volume 6, Issue 2 - Gaming

Using Akamai’s global visibility and content delivery networks, this report covers the security threats present in the gaming industry. An exploration of how gamers are a growing lucrative target for criminals, including methods, geography, and recommendations.

(more available)
Added: September 23, 2020
image from Understand the Mistakes that Compromise your Company's Cybersecurity

Understand the Mistakes that Compromise your Company's Cybersecurity

Tessian’s research reveals how distraction, stress and fatigue influence people’s ability to consistently make good cybersecurity decisions, and how the events of 2020 have highlighted why now - more than ever - businesses need to protect their employees.

(more available)
Added: September 8, 2020
image from Cybercrime: COVID-19 Impact

Cybercrime: COVID-19 Impact

Interpol’s Cybercrime Directorate produced this Global Assessment Report on COVID-19 related Cybercrime based on data from 194 countries and private partners to provide a comprehensive overview of the cybercrime landscape amid the pandemic.

(more available)
Added: September 3, 2020
image from H2 2020 Email Fraud & Identity Deception Trends

H2 2020 Email Fraud & Identity Deception Trends

This biannual report from Agari goes in-depth on changes and trends in email and identity fraud for the second half of 2020.

(more available)
Added: September 2, 2020
image from Claroty Biannual ICS Risk & Vulnerability Report: 1H 2020

Claroty Biannual ICS Risk & Vulnerability Report: 1H 2020

The objective of this report is to provide nuanced insight into the ICS risk and vulnerability landscape, the challenges it poses to operational technology (OT) security practitioners, and what conclusions can be drawn from publicly available data.

(more available)
Added: September 2, 2020
  • ««
  • «
  • 4
  • 5
  • 6
  • 7
  • 8
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 04:08 UTC (build b1d7be4)