Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Social Media

Below you will find reports with the tag of “Social Media”

image from Ericsson Mobility Report

Ericsson Mobility Report

By the end of 2022, 5G subscriptions are expected to reach 1 billion, and more smart 5G devices with additional capabilities are expected in the market during 2023. Our outlook for 2028 is that 5G subscriptions will pass 5 billion and Fixed Wireless Access (FWA) connections will reach 200 million, where 5G will account for almost 80 percent of FWA connections.

(more available)
Added: February 15, 2023
image from Close Encounters of the Third (and Fourth) Party Kind

Close Encounters of the Third (and Fourth) Party Kind

This report offers an in-depth examination of the underlying condition that enables such incidents to take place-the widespread interdependence of modern digital supply chains. We analyzed data from over 230,000 organizations to investigate the prevalence of security incidents among third parties. We then measure the extent of vendor relationships and explore the effects of that exposure. Finally, we compare the security posture of organizations to that of their third and fourth-parties to yield data-driven insights on how to identify risky vendors and better manage exposure.

(more available)
Added: February 1, 2023
image from 2023 State of Security Report

2023 State of Security Report

The 2023 State of Security Report surveyed over 240 cybersecurity professionals from North American to reveal the key challenges cybersecurity teams are facing, how they solve cyber issues, and the security technologies organizations prioritize.

(more available)
Added: January 23, 2023
image from 2023 Security Service Edge Adoption Report

2023 Security Service Edge Adoption Report

The 2023 Security Service Edge Adoption Report delivers insight on the shift away from legacy access solutions and the rapidly growing SSE market in light of the modern workplace.

(more available)
Added: January 23, 2023
image from 2021 Trends In Identity

2021 Trends In Identity

The Trends in Identity Report that looks at the wide range of identity crimes committed against individuals as reported by the victims of those crimes. You’ll learn first-hand of the identity scams we see and how criminals convince people to willingly share information they know should be protected.

(more available)
Added: January 4, 2023
image from 2022 Consumer Impact Report

2022 Consumer Impact Report

The 2022 Consumer Impact Report goes beyond the known financial implications of identity crimes and explores the lost opportunities, as well as the emotional, physical and psychological impacts experienced by victims resulting from the crimes.

(more available)
Added: January 4, 2023
image from 2022 Business Impact Report

2022 Business Impact Report

Our 2022 Business Impact Report looks into what happens specifically to small businesses and solopreneurs following a data or security breach. For the report, the ITRC surveyed 447 small business owners, leaders, and employees to paint a picture of small organizations and individuals that are significantly impacted by cybercrimes, often multiple times in a short period of time.

(more available)
Added: January 4, 2023
image from The 2022 VOID Report

The 2022 VOID Report

The past year, the VOID grew from 2,000 to nearly 10,000 incident reports from close to 600 organizations. We rigorously collect the same metadata, along with a new value: severity. This enabled us to investigate whether there is a relationship between the reported length of the incident and the impact (or severity) of the incident.

(more available)
Added: December 21, 2022
image from Enterprise Application Security

Enterprise Application Security

The goal of this Trend Report is to equip developers with the tools, best practices, and advice they need to help implement security at every stage of the SDLC.

(more available)
Added: December 16, 2022
image from Balancing Risk & Reward

Balancing Risk & Reward

This report is based on cybercrime attacks detected by the Digital Identity Network from July-December 2021, during near real-time analysis of consumer interactions across the customer journey, from new account creations, logins, payments and other non-core transactions such as password resets and transfers.

(more available)
Added: September 28, 2022
image from 2022 State of the Phish Report

2022 State of the Phish Report

In this, our eighth annual State of the Phish report, we explore user vulnerabilities from multiple angles. We look at issues driven by poor cyber hygiene and those that could result from a lack of knowledge and clear communication. We discuss ways organizations can become more attuned to their risks. And we outline opportunities to build and sustain engaging security awareness training initiatives in the challenging climate.

(more available)
Added: August 11, 2022
image from Meta's Adversarial Threat Report Q2 2022

Meta's Adversarial Threat Report Q2 2022

This report is to share notable trends and investigations to help inform our community’s understanding of the evolving security threats we see. During some quarters, our reporting may focus more on a particular adversarial trend or tactics we see emerge across different threat actors. During other quarters, we may dive into an especially complex investigation or walk through a novel policy application and relate threat disruptions.

(more available)
Added: August 8, 2022
image from State of Cybersecurity 2022

State of Cybersecurity 2022

This survey report focuses on the current trends in cybersecurity workforce development, staffing, cybersecurity budgets, threat landscape and cyber-maturity. The survey findings reinforce past reporting and, in certain instances, mirror prior year data. Staffing levels, ease of hiring and retention remain pain points across the globe, and declining optimism about cybersecurity budgets reversed course this year.

(more available)
Added: June 10, 2022
image from Cisco Global Hybrid Work Study 2022

Cisco Global Hybrid Work Study 2022

This research aimed to uncover insights into how employees have fared over the past two years, where hybrid and remote working has been commonplace. It reveals the significant benefits that hybrid working has brought to both employees and employers, despite the challenges anticipated at the start of the pandemic.

(more available)
Added: May 31, 2022
image from 2021 State of Phishing & Online Fraud Annual Report

2021 State of Phishing & Online Fraud Annual Report

This 2021 State of Phishing and Online Fraud Report highlights the key trends that drove digital scams using data gathered from analyzing more than one billion sites. A multitude of factors drove record growth in fraud campaign activity in 2020 with an increase of 185% from what was observed in 2019.

(more available)
Added: May 13, 2022
image from The State of Stalkerware in 2021

The State of Stalkerware in 2021

This report shows data from 2021 that was affected by stalkerware globally.

Added: April 13, 2022
image from Adversarial Threat Report

Adversarial Threat Report

This report is Meta’s quarterly adversarial threat report that provides a broad view into the risks we see worldwide and across multiple policy violations.

(more available)
Added: April 8, 2022
image from State of Software Security v12

State of Software Security v12

This report looks at the entire history of active applications, not just the activity associated with the application over one year. By doing so, we can view the full life cycle of applications, which results in more accurate metrics and observations. Aside from looking at the past, this report also imagines the future by considering practices that might help improve application security.

(more available)
Added: February 10, 2022
image from Prioritization to Prediction Volume 8: Measuring and Minimizing Exploitability

Prioritization to Prediction Volume 8: Measuring and Minimizing Exploitability

We do two very important and timely things in this report. We first explore ways to measure exploitability for individual vulnerabilities—and far more importantly—entire organizations. Second, we create a simulation that seeks to minimize organizational exploitability under varying scenarios combining vulnerability prioritization strategies and remediation capacity. Bottom line: If you’re looking for proven ways to squeeze the most risk reduction from your vulnerability management (VM) efforts, this report is for you.

(more available)
Added: January 20, 2022
image from 2021 Cloud Application Security

2021 Cloud Application Security

As remote employees use work devices for personal activities, and personal devices for work activities, cloud-based apps – especially unauthorized cloud apps – are more popular than ever. But they also deliver significant risk, with Remote Desktop Protocol (RDP) alone serving as the vehicle of choice for as much as 55% of ransomware attacks. This report explores how cloud-based apps – from storage services to social media apps – threaten your network security.

(more available)
Added: December 10, 2021
image from SOTI: Adapting to the Unpredictable

SOTI: Adapting to the Unpredictable

This edition of the SOTI focuses on malicious activity detected and managed over the course of 2020 via DNS filtering.

(more available)
Added: March 10, 2021
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 23, 2025 16:08 UTC (build b1d7be4)