Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Spoofing

Below you will find reports with the tag of “Spoofing”

image from The Cato  CTRL SASE Threat Report Q1 : 2024

The Cato CTRL SASE Threat Report Q1 : 2024

This report offers insights onto the threats and suspicious activity across those flows. It also provides strategic, tactical, and operational information on all traffic in all directions utilizing the MITRE ATT&CK framework. In additional, the report highlights the applications, protocols, and tools running on these networks.

(more available)
Added: June 26, 2024
image from The State of Email & Collaboration Security 2024

The State of Email & Collaboration Security 2024

The State of Email & Collaboration Security 2024 report is based on an in-depth global survey of 1,100 information technology and cybersecurity professionals. Mimecast commissioned UK-based research firm Vanson Bourne to conduct the survey, which took place during October and November 2023.Survey participants worked at organizations ranging from 250 to 500 employees to more than 10,000 employees.

(more available)
Added: April 12, 2024
image from The State of Email Security 2023

The State of Email Security 2023

Mimecast’s seventh annual State of Email Security report comes as organizations all over the world grow more skittish over rising economic volatility and intensifying geopolitical tensions. Now is definitely not the time to become lax on cybersecurity.

(more available)
Added: July 5, 2023
image from 2023 Annual Report: Cybersecurity Trends & Insights

2023 Annual Report: Cybersecurity Trends & Insights

In this report, Perception Point analyzes the most pervasive attacks its advanced threat detection platform detected in 2022, noting a particular increase in account takeover attacks in the latter half of the year as well as an ongoing growth in phishing attacks. This report examines cyber threats through distinct lenses based on the intelligence gathered by Perception Point’s proprietary detection engines and its managed incident response service.

(more available)
Added: June 1, 2023
image from 2021 Business Email Compromise Report

2021 Business Email Compromise Report

This report is designed to explore the state of evolving email threats and how organizations are responding to protect themselves. Business Email Compromise attacks are one of the financially most damaging cyber crimes. They typically involve phishing emails and social engineering tactics to attack organizations and trick unsuspecting employees and executives into conducting tasks under the guise of legitimate business activity, often appearing to come from a trust sender.

(more available)
Added: October 18, 2022
image from DDoS Threat Report 2021 Q3

DDoS Threat Report 2021 Q3

Q3 saw a notable trend in which attackers launched DDoS attacks at single targets within a CSP, attributing an attack size increase of 544% QoQ and 232% YoY. Over 55% of attackers focused on hitting specific service with high volumes of traffic simultaneously. Due to the dramatic increase in attack size, this shift to employing high-penetration volumetric attacks can potentially lead to additional impact to CSP networks, regionally.

(more available)
Added: October 11, 2022
image from DDoS Threat Report FHY 2021

DDoS Threat Report FHY 2021

In the first half of 2021, we found that 99.09% of attacks were smaller than 10Gbps and 95.62% of attacks were smaller than 1Gbps, of which we believe a majority were launched using readily available and inexpensive DDoS-for-hire services.

(more available)
Added: October 11, 2022
image from DDoS Threat Report 2020 Q3

DDoS Threat Report 2020 Q3

In this edition of our quarterly report, there will be a special feature story that focuses on the DDoS issues surrounding the online gaming industry, in particular, why it is an industry to keep an eye on - especially the service providers to this industry. And why the popularity of online gaming has skyrocketed in Q3.

(more available)
Added: October 11, 2022
image from DDoS Threat Report 2020 Q2

DDoS Threat Report 2020 Q2

In this report, we’re going to discuss how bit-and-piece attacks have continued to evolve, and are able to successfully evade DDoS mitigation schemes when blended with multiple attack vectors, and the challenges that these advanced attack tactics present to the cybersecurity world.

(more available)
Added: October 11, 2022
image from 2022 DDoS Threat Report

2022 DDoS Threat Report

The 2022 A10 Networks DDoS Threat Report provides insights into DDoS activity during the past six months including origins of activity; the growth of DDoS weapons and botnets; the role of malware in the propagation of DDoS weapons and attacks; and the steps organizations can take to protect against such activities.

(more available)
Added: October 11, 2022
image from DDoS Threat Report 2019 Q4

DDoS Threat Report 2019 Q4

In Q4 2019 an unprecedented concentration of DDoS attacks on US networks was observed, with more than 1,000 victims identified in various states. Whether motivated by politics, profiteering, crime or other malicious purposes, attacks were frequent and impactful.

(more available)
Added: October 11, 2022
image from DDoS Statistical Report 1HY 2022

DDoS Statistical Report 1HY 2022

In this report, the analysis conducted by our research team identifies vulnerabilities and measures attack trends worldwide to provide a comprehensive view of DDoS threats. Nexusguard is able to evaluate DDoS events in a manner that is not biased by any single set of customer or industries. Many zero-day threats are first seen on our global research network.

(more available)
Added: October 11, 2022
image from The State of Email Security 2022

The State of Email Security 2022

Mimecast’s State of Email Security 2022 (SOES) study sheds light on the gains in cyber resilience that many companies are making, even as it reveals shortfalls and places where there is considerable room for improvement.

(more available)
Added: September 13, 2022
image from Netscout Threat Intelligence Report: 2H 2021

Netscout Threat Intelligence Report: 2H 2021

First, the bad - adversaries continued to innovate and alter strategies aimed at taking down DDoS protections with direct-path DDoS attacks and high-powered server-class botnets. Meanwhile, a little good news came in the way of a decrease in some reflection/amplification vectors, floating overall DDoS attack number down. Despite this decrease, the bad news tells us we must remain vigilant to combat ever-changing attacker methodologies and tactics.

(more available)
Added: August 16, 2022
image from Adversarial Threat Report

Adversarial Threat Report

This report is Meta’s quarterly adversarial threat report that provides a broad view into the risks we see worldwide and across multiple policy violations.

(more available)
Added: April 8, 2022
image from DomainTools Report: Fall 2021

DomainTools Report: Fall 2021

A review of domain registration, hosting, and content-related data on attack patterns and trends.

Added: December 10, 2021
image from Phishing Activity Trends Report Q4 2020

Phishing Activity Trends Report Q4 2020

This report analyzes phishing attacks and other identity theft techniques used in Q4 2020.

Added: February 24, 2021
image from DDoS Threat Report Q2 2019

DDoS Threat Report Q2 2019

This quarterly threat report offers insight into the DDoS attacks that occurred in the 2nd quarter of 2019.

Added: September 16, 2020
image from DDoS Threat Report Q1 2019

DDoS Threat Report Q1 2019

This quarterly threat report offers insight into the DDoS attacks that occurred in the 1st quarter of 2019.

Added: September 16, 2020
image from DDoS Threat Report Q3 2019

DDoS Threat Report Q3 2019

This report takes a look at the DDoS threats that occurred in the third quarter of 2019.

Added: September 16, 2020
image from Threat Spotlight: Lateral Phishing

Threat Spotlight: Lateral Phishing

Teaming up with leading researchers at UC Berkeley and UC San Diego, Barracuda researchers uncovered a new and growing type of account takeover attack: lateral phishing.

(more available)
Added: September 1, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 08:08 UTC (build b1d7be4)