Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Social Media

Below you will find reports with the tag of “Social Media”

image from 2016 State of Vulnerability Risk Management

2016 State of Vulnerability Risk Management

The goal of this report is to shed some light on the current threat landscape for organizations, assess the strengths and weaknesses of current vulnerability evaluation systems such as CVSS, (Common Vulnerability Scoring System) and explore additional metrics for determining the risk of a vulnerability.

(more available)
Added: October 25, 2018
image from Avast Data Protection Report 2017

Avast Data Protection Report 2017

This simple little report takes a look at a survey conducted among 11,417 Avast users worldwide, Avast gauged people’s views regarding the value of their data stored in online accounts like email, shopping and social networking sites, and their habits when it comes to protecting their data. The results show that, while many respondents view their data as having actual financial value, they aren’t taking proper measures when affected by a data breach.

(more available)
Added: October 25, 2018
image from Q2 2017 Phishing Trends And Intelligence Report

Q2 2017 Phishing Trends And Intelligence Report

The data and observations presented in this report are sourced from the continuous work PhishLabs does to fight back against phishing attacks and the threat actors behind them. The information highlighted in this report will help organizations better assess and mitigate the risk posed by modern phishing attacks.

(more available)
Added: October 25, 2018
image from Quarterly Threat Summary Q3 2016

Quarterly Threat Summary Q3 2016

This Quarterly report offers key takeaways from the third Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 25, 2018
image from SilverTerrier: Rise Of Nigerian Business Email Compromise

SilverTerrier: Rise Of Nigerian Business Email Compromise

With unique and specialized analysis, this paper discusses Nigerian cyber crime actors, their growth, collaboration, and the direction they are headed.

(more available)
Added: October 25, 2018
image from 2018 Phishing Trends And Intelligence Report: Hacking The Human

2018 Phishing Trends And Intelligence Report: Hacking The Human

The purpose of this report is to provide insight on significant industry trends, tools, and techniques being used by threat actors to carry out phishing attacks. It also sheds light on why shifts are occurring and what to expect in the coming year.

(more available)
Added: October 24, 2018
image from Cybercrime Tactics And Techniques Q1 2017

Cybercrime Tactics And Techniques Q1 2017

The second edition of this report, looking at noteable threats during the first three months of the year.

Added: October 24, 2018
image from Left Of Breach 2018

Left Of Breach 2018

Using a unique approach, this paper offers insight into how using a technique of Marine strategy can protect your company from Phishing attacks.

(more available)
Added: October 24, 2018
image from Lessons From Others For Future U.S. Army Operations In And Through The Information Environment

Lessons From Others For Future U.S. Army Operations In And Through The Information Environment

This project sought to draw lessons from the efforts of others (both nation-state and nonstate actors) in and through the IE for future U.S. Army force planning and investment. These case studies of other forces can help the Army (1) identify capabilities and practices that it should consider adopting and (2) identify adversary capabilities and practices that it must be prepared to counter in future operations in and through the IE.

(more available)
Added: October 24, 2018
image from Quarterly Threat Summary Q2 2016

Quarterly Threat Summary Q2 2016

This Quarterly report offers key takeaways from the second Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 24, 2018
image from Russian Federation Country Profile 2017

Russian Federation Country Profile 2017

This paper gives a profile of the Russian Federation.

Added: October 24, 2018
image from Breaking Down The Complexity Of Retail Security

Breaking Down The Complexity Of Retail Security

This report takes a look at retail security. It discusses the challenges, and options available to help solve some of the problems involved in defending retail markets.

(more available)
Added: October 23, 2018
image from Exploring Strategic Risk

Exploring Strategic Risk

This paper discusses the strategic risks facing coroporations today.

Added: October 23, 2018
image from Lessons From Others For Future U.S. Army Operations In And Through The Information Environment

Lessons From Others For Future U.S. Army Operations In And Through The Information Environment

This report offers the case studies used for the official report of the same name.

Added: October 23, 2018
image from MediaPro Best Practice Series: Battling The Forgetting Curve

MediaPro Best Practice Series: Battling The Forgetting Curve

This paper seeks to provide guidance in understanding the best ways to train employees so that the don’t forget important information.

(more available)
Added: October 23, 2018
image from Quarterly Threat Summary Q1 2016

Quarterly Threat Summary Q1 2016

This Quarterly report offers key takeaways from the first Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 23, 2018
image from Six Strategies To Strengthen Your Company's Digital DNA

Six Strategies To Strengthen Your Company's Digital DNA

Digital transformation is a journey, not a destination. And every journey has a starting point. What you do next depends on where you begin. Use this self-assessment to find out where your company is today, then use the associated road map report in this playbook to help chart your course forward.

(more available)
Added: October 23, 2018
image from The Fraud Beat 2016

The Fraud Beat 2016

This report discusses the reality that everyone is susceptible to fraudulent emails. It discusses why that is the case, and offers some solutions.

(more available)
Added: October 23, 2018
image from The State of Online Privacy 2016

The State of Online Privacy 2016

This is a press release regarding a s study that finds more British Internet users are concerned about data privacy than losing their income.

(more available)
Added: October 23, 2018
image from Threat Advisory: Anato

Threat Advisory: Anato

This is a threat advisory for Anato

Added: October 23, 2018
image from Application Usage and Threat Report

Application Usage and Threat Report

This report examines key trends across the threat landscape and application usage, including topics on how organizations can educate users and utilize controls to effectively reduce the attack surface available to an adversary, the potential effects of non-standard network activity, the reuse of legacy attack tactics, and the benefits of open threat intelligence sharing.

(more available)
Added: October 22, 2018
  • ««
  • «
  • 6
  • 7
  • 8
  • 9
  • 10
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 23, 2025 20:08 UTC (build b1d7be4)