Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Spam

Below you will find reports with the tag of “Spam”

image from Quarterly Threats Report March 2018

Quarterly Threats Report March 2018

In this quarterly report, they discuss the fact that criminals have shifted their tactics and have now moved to power shifting, crypto-currency, and ransomware, as their main focus of cyberthreat.

(more available)
Added: October 16, 2018
image from Threat Advisory: Lycos Mail

Threat Advisory: Lycos Mail

This ia a threat advisory for Lycos Mail

Added: October 16, 2018
image from Threat Report 2015

Threat Report 2015

The Proofpoint Threat Report explores threats, trends, and transformations that they see within their customer base and in the wider security marketplace.

(more available)
Added: October 16, 2018
image from Tracking Trends In Business Email Compromise

Tracking Trends In Business Email Compromise

This report takes a look at Business Email Compromise attacks and examines why the FBI was able to report that it has become a billion dollar industry.

(more available)
Added: October 16, 2018
image from 2017 Quarterly Threat Report Q1

2017 Quarterly Threat Report Q1

This report takes a look at the cyber threats that took place in the 1st Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 15, 2018
image from DMARC Intelligence Report 2016

DMARC Intelligence Report 2016

In this annual report, they track the progress of Domain-based Message Authentication, Reporting, and Conformance (DMARC)

Added: October 15, 2018
image from Email Fraud and DMARC Adoption Trends Second Half 2017

Email Fraud and DMARC Adoption Trends Second Half 2017

In this inaugural report, they take a look at the state of DMARC, leveraging Agari’s Email Threat Center, and its unique global and sector view into our customers’ DMARC traffic over the last 6 months of 2017. They also explore publicly available statistics and trends on DMARC usage. Finally, for a global view on email domains not visible to the Threat Center, they incorporate intelligence from Farsight Security, the world’s largest provider of historical and real-time passive DNS data. Farsight DNSDB provides an unmatched view into the diverse and often volatile DMARC policies located in global DNS records.

(more available)
Added: October 15, 2018
image from The Rise And Fall OF Scan4You

The Rise And Fall OF Scan4You

This is exclusive research into the cyber threat that is Scan4You. It discusses the history and current outcomes of this unique threat.

(more available)
Added: October 15, 2018
image from H2 2017 Global Cyber Attack Trends Report

H2 2017 Global Cyber Attack Trends Report

This report takes a look back at the events of the last year and ponders what might occur in 2018.

(more available)
Added: October 14, 2018
image from X-Force Threat Intelligence Index 2017

X-Force Threat Intelligence Index 2017

The Threat Intelligence Index outlines the security threat landscape based on data gathered for the entire year of 2016. It uses data developed by analyzing “billions" of events, monitored by IBM security services, in more than 100 countries.

(more available)
Added: October 14, 2018
image from 2014 Internet Crime Report

2014 Internet Crime Report

The 2014 Internet Crime Report highlights the IC3’s efforts to prevent and reduce the prevalence and impact of Internet crimes, and reveals at least two budding Internet crime trends. First, the increased use of social media has provided a quintessential goldmine of personal data for perpetrators. More victims are submitting complaints documenting how social media was utilized to perpetrate frauds, or indicating the perpetrator initiated a relationship through social engineering. Second, the emerging popularity of virtual currency has attracted perpetrators, who are capitalizing on the vulnerabilities of the digital currency systems.

(more available)
Added: October 13, 2018
image from 2015 Internet Security Threat Report, Volume 20

2015 Internet Security Threat Report, Volume 20

This annual Threat Report, gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future.

(more available)
Added: October 13, 2018
image from 2017 Phishing Response Trends Europe Region

2017 Phishing Response Trends Europe Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 13, 2018
image from Phishing Activity Trends Report, 1st-3rd Quarters 2015

Phishing Activity Trends Report, 1st-3rd Quarters 2015

The APWG Phishing Activity Trends Report analyzes phishing attacks reported to the APWG by its member companies, its Global Research Partners, through the organization’s website at http://www.apwg.org, and by e-mail submissions to reportphishing@antiphishing.org. APWG also measures the evolution, proliferation, and propagation of crimeware by drawing from the research of our member companies.

(more available)
Added: October 13, 2018
image from Ransomware:How To Predict, Prevent, Detect And Respond

Ransomware:How To Predict, Prevent, Detect And Respond

This report asserts that, “Many organizations still follow an outdated approach to cyber security, relying solely on a defensive perimeter to protect their infrastructure.” The report recommends a more robust, iterative approach, which can be broken down into four phases, Predict, Prevent, Detect, and Respond.

(more available)
Added: October 13, 2018
image from Security Response: Dridex Tidal Waves Of Spam Pushing Dangerous Financial Trojan

Security Response: Dridex Tidal Waves Of Spam Pushing Dangerous Financial Trojan

This report takes a look a the Trojan, Dridex.

Added: October 13, 2018
image from 2015 Annual Security Report

2015 Annual Security Report

The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming ever-weaker links in the security chain.

(more available)
Added: October 12, 2018
image from 2016 Trustwave Global Security Report

2016 Trustwave Global Security Report

This report summarizes the goals and activities of the initiative, the history and status of the initiative and key cyber value-at-risk concept foundations.

(more available)
Added: October 12, 2018
image from The Fake News Machine: How Propagandists Abuse The Internet And Manipulate The Public

The Fake News Machine: How Propagandists Abuse The Internet And Manipulate The Public

This paper studies and explores the techniques and methods used by actors to spread fake news and manipulate public opinion to serve various motives ranging from personal and financial to political. It also discusses the three legs of the fake news triangle: the services that enable them, their appearance on social media sites, and the motivations behind these activities.

(more available)
Added: October 12, 2018
image from The Weakest Link: Why People Are Your Network's Greatest Vulnerability

The Weakest Link: Why People Are Your Network's Greatest Vulnerability

In this white paper, they explore why people are the biggest vulnerability for most organizations, and whether it’s possible to ‘patch’ this vulnerability.

(more available)
Added: October 12, 2018
image from Threats Report - March 2016

Threats Report - March 2016

This report discusses two key topics: 1) An Intel Security survey that found that awareness was very high and, 97% of those interviewed, said that sharing cyber intelligence was valuable and 2) They explore the Adwind Java-based Trojan. It also includes the usual key points about predictions and threat summaries.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 00:08 UTC (build b1d7be4)