Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Spyware

Below you will find reports with the tag of “Spyware”

image from The Q2 2018 Mobile Threat Landscape Report

The Q2 2018 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. Q2 showed a nearly 57 percent increase in blocklisted apps over Q1. (more available)
Added: January 25, 2019
image from Intelligence Report: CSIR-18004 Nigerian Confraternities Emerge

Intelligence Report: CSIR-18004 Nigerian Confraternities Emerge

This paper discuses a particular Business Email Compromise that has appeared out of Nigeria.
Added: January 1, 2019
image from Reinventing Cybersecurity Prevention With Deep Learning

Reinventing Cybersecurity Prevention With Deep Learning

In this whitepaper they cover the different defense technologies used over time, how different attacks vectors influenced this evolution, how the industry adopted different approaches over time, and why the prevention approach has returned and why it matters. (more available)
Added: December 29, 2018
image from Threat Intelligence Report: Mobile Malware As A Service

Threat Intelligence Report: Mobile Malware As A Service

Long gone are the simple days of malware threats only being associated with the computers on our desks or at our business offices. (more available)
Added: December 5, 2018
image from Spear Phishing Techniques Used in Attacks Targeting the Mongolian Government

Spear Phishing Techniques Used in Attacks Targeting the Mongolian Government

FireEye recently observed a sophisticated campaign targeting individuals within the Mongolian government. Targeted individuals that enabled macros in a malicious Microsoft Word document may have been infected with Poison Ivy, a popular remote access tool (RAT) that has been used for nearly a decade for key logging, screen and video capture, file transfers, password theft, system administration, traffic relaying, and more. (more available)
Added: November 15, 2018
image from Operation Wilted Tulip

Operation Wilted Tulip

CopyKittens is a cyberespionage group that has been operating since at least 2013. In November 2015, ClearSky and Minerva Labs published1 the first public report exposing its activity. (more available)
Added: November 15, 2018
image from 2015 Mobile Malware Report

2015 Mobile Malware Report

This document deals with malware on mobile devices.
Added: October 26, 2018
image from Cyber Threats To The Aerospace And Defense Industries

Cyber Threats To The Aerospace And Defense Industries

Read about the threat outlook for aerospace and defense sectors as threat groups seek to gain military and economic advantages.
Added: October 26, 2018
image from Metamorfo Campaigns Targeting Brazilian Users

Metamorfo Campaigns Targeting Brazilian Users

This blog post takes a look at Metamorfo and how it is impacting Brazilian users, specifically, to install banking trojans.
Added: October 26, 2018
image from Cyber Threats To International Organizations And Non-Profits

Cyber Threats To International Organizations And Non-Profits

Gain insights into the nature and rationales of cyber threats international organizations and nonprofits face.
Added: October 25, 2018
image from Cybercrime against Businesses, 2005

Cybercrime against Businesses, 2005

This article, edited in 2008, compiles a list of cyber crimes that impacted business in 2005.
Added: October 25, 2018
image from The Impact Of Customer Journey Hijacking Q4 2017

The Impact Of Customer Journey Hijacking Q4 2017

This report provides an overview of online journey hijacking based on an analysis of 500 million page views per day from top e-commerce sites across all product categories. (more available)
Added: October 24, 2018
image from Threat Advisory: Anato

Threat Advisory: Anato

This is a threat advisory for Anato
Added: October 23, 2018
image from The Current State Of Mobile Malware

The Current State Of Mobile Malware

This report will take you through the most common malware infection vectors, the different types of mobile malware currently plaguing organizations, and how to take the appropriate steps to protect your mobile estate. (more available)
Added: October 22, 2018
image from Untangling CIPA

Untangling CIPA

This paper takes a look at the Children’s Internet Protection Act.
Added: October 19, 2018
image from GTIC Monthly Threat Report February 2018

GTIC Monthly Threat Report February 2018

This monthly threat report takes a look at the month of February 2018. Specifically, it looks at how Agent Tesla works, cryptocurreny malware, ransomware’s refusal to die, and Turla APT updating their malware after public advisories. (more available)
Added: October 16, 2018
image from Tracking Trends In Business Email Compromise

Tracking Trends In Business Email Compromise

This report takes a look at Business Email Compromise attacks and examines why the FBI was able to report that it has become a billion dollar industry. (more available)
Added: October 16, 2018
image from Underground Hacker Markets

Underground Hacker Markets

For our 3rd Annual Underground Hacker Markets Report, Dell SecureWorks engaged two of our top intelligence analysts from our CISO INTEL Team. (more available)
Added: October 16, 2018
image from 2017 Midyear Cybersecurity Report

2017 Midyear Cybersecurity Report

This midyear report details two dynamics undermining the successes of the cybersecurity landscape. “Our security experts are becoming increasingly concerned about the accelerating pace of change—and yes, sophistication—in the global cyber threat landscape. (more available)
Added: October 15, 2018
image from Beware Of The 64-Bit Malware

Beware Of The 64-Bit Malware

The 64-bit Windows operating system is increasing its market share and becoming the prevalent system in most business environments. Its growing popularity is also attracting more attackers and slowly reshaping the Windows threat landscape. (more available)
Added: October 15, 2018
image from White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime

White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime

According to this report, the attractions and profitability of the digital underworld are leading some security practitioners to become ‘gray hats’ and get involved in cybercrime. (more available)
Added: October 15, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2021
Library updated: February 26, 2021 00:08 UTC (build 7e736b2)