Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Spam

Below you will find reports with the tag of “Spam”

image from Adversarial Threat Report

Adversarial Threat Report

This report is Meta’s quarterly adversarial threat report that provides a broad view into the risks we see worldwide and across multiple policy violations. (more available)
Added: April 8, 2022
image from DomainTools Report: Fall 2021

DomainTools Report: Fall 2021

A review of domain registration, hosting, and content-related data on attack patterns and trends.
Added: December 10, 2021
image from Phishing Landscape 2020: A Study of the Scope and Distribution of Phishing

Phishing Landscape 2020: A Study of the Scope and Distribution of Phishing

This study captures and analyzes a large set of information about phishing attacks, in order to better understand how much phishing is taking place, where it is taking place, and to see if the data suggests better ways to fight phishing. (more available)
Added: October 14, 2020
image from Abnormal Quarterly BEC Report Q2 2020

Abnormal Quarterly BEC Report Q2 2020

The second Abnormal Security Quarterly BEC Report examines the business email compromise (BEC) threat landscape during what may be the most tumultuous quarter in modern business history: the first full quarter of the COVID-19 pandemic. (more available)
Added: September 1, 2020
image from Global Cybersecurity Index 2018

Global Cybersecurity Index 2018

A survey driven review of 25 indicators via 50 questions spanning nearly 160 respondents. This attempts to focus on factors influencing cybersecurity strategy design and implementation on a year-over-year basis. (more available)
Added: August 1, 2020
image from 2019 Paid Ransomware Report

2019 Paid Ransomware Report

A review of 63 events where Kivu participated in payouts of ransomware events on behalf of clients engaged via a post-incident response. (more available)
Added: July 27, 2020
image from 2018 Hacked Website Report

2018 Hacked Website Report

The annual report on trends in malware and hacked website from the incident response and malware research teams at GoDaddy Security /Sucuri. (more available)
Added: June 13, 2020
image from 2020 Trustwave Global Security Report

2020 Trustwave Global Security Report

The 2020 Trustwave Global Security Report is an annual review of the phenomena, trends and statistics affecting computer security and worldwide safety, as observed by Trustwave systems and security analysts throughout 2019. (more available)
Added: May 8, 2020
image from 2019 Website Threat Research Report

2019 Website Threat Research Report

Our 2019 Threat Research Report is a deep dive into our logs, experiences, and collected analysis. It summarizes and identifies the latest tactics, techniques, and procedures seen by the Malware Research team, Vulnerability Research team, Threat Intel Research team and Remediation Groups at Sucuri/GoDaddy. (more available)
Added: March 29, 2020
image from Threat Landscape Report Q4 2019

Threat Landscape Report Q4 2019

This is the threat landscape report from Fortinet for the 4th quarter of 2019. It goes into changes in this quarter, including threat detection changes and attack changes. (more available)
Added: March 15, 2020
image from X-Force Threat Intelligence Index

X-Force Threat Intelligence Index

X-Force Incident Response and Intelligence Services (IRIS) compiled IBM Security software and security services analyses from the past year, which show that 2019 was a year of reemerging old threats being used in new ways. (more available)
Added: February 14, 2020
image from 2019 Threat Report

2019 Threat Report

A long form narrative on several threat trends seen in recent months.
Added: February 14, 2020
image from Email: Click with Caution

Email: Click with Caution

This report offers insights into the 40 year history of spam. It discusses what this means for business, and how the new spam has surpassed the spam of 40 years ago. (more available)
Added: July 10, 2019
image from Attacker Behavior Industry Report

Attacker Behavior Industry Report

This report examines a wide range of cyberattack detections and trends from a sample of 354 Vectra customers with more than 3 million devices and workloads per month from nine different industries. (more available)
Added: May 18, 2019
image from 2019 Trustwave Global Security Report

2019 Trustwave Global Security Report

This report promises to allow you to use the vast insights and hard data contained in the report to help bolster your security posture and better understand the nature of the threats we face today. (more available)
Added: May 18, 2019
image from Bromium Insights Report: April 2019

Bromium Insights Report: April 2019

This report from Bromium offers insights into notable threats and events from 2019.
Added: May 18, 2019
image from Defending Against Today's Critical Threats: A 2019 Threat Report

Defending Against Today's Critical Threats: A 2019 Threat Report

As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. (more available)
Added: May 3, 2019
image from State of Application Services 2019 Report/ Focus On Americas

State of Application Services 2019 Report/ Focus On Americas

This report from F5 offers insights into key data regarding application services in the Americas.
Added: March 16, 2019
image from Industry Cyber-Exposure Report: Fortune 500

Industry Cyber-Exposure Report: Fortune 500

From the report, “To understand current levels of exposure and resiliency, Rapid7 Labs measured 4532 of the 2017 Fortune 500 List3 for: • Overall attack surface (the number of exposed servers/devices); • Presence of dangerous or insecure services; • Phishing defense posture; • Evidence of system compromise; • Weak public service and metadata configurations; and • Joint third-party website dependency risks. (more available)
Added: February 9, 2019
image from Social Media Privacy: Settings User Guide

Social Media Privacy: Settings User Guide

This helpful guide provides insight into the settings you should maintain on all of the major social networks. Read on to learn more. (more available)
Added: February 7, 2019
image from Attacker Behavior Industry Report: 2018 Black Hat Edition

Attacker Behavior Industry Report: 2018 Black Hat Edition

The Black Hat Edition of the Vectra® Attacker Behavior Industry Report provides a first-hand analysis of active and persistent attacker behaviors inside cloud, data center and enterprise environments of Vectra customers from January through June 2018. (more available)
Added: February 7, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2022
Library updated: May 19, 2022 12:08 UTC (build d6199b1)