Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Stolen Creds

Below you will find reports with the tag of “Stolen Creds”

image from The Identity Underground Report

The Identity Underground Report

This report is the first attempt to map out the most critical identity security weaknesses in the hybrid enterprise environment. These Identity Threat Exposures (ITEs), gathered from hundreds of live production environments, are the key weaknesses that allow attackers to access credentials, escalate privileges and move laterally, both on-prem and in the cloud.

(more available)
Added: April 3, 2024
image from 2023 Identity Threat Report: The Unpatchables

2023 Identity Threat Report: The Unpatchables

The purpose of this report is to assess and summarize the current threat landscape facing organizations as a result of the digital identities that they issue to legitimate users. We called this report “The Unpatchables” because digital identities represent a source of technical risk that is impossible to completely mitigate even in theory.

(more available)
Added: November 2, 2023
image from State of Cyber Threat Intelligence: 2023

State of Cyber Threat Intelligence: 2023

In our new State of Cyber Threat Intelligence, we examine the factors that contribute to these two themes: the converging nature of cyber threats as well as the perpetual cycles in which they exist. Plus, we explore the big-picture impact of cyber attacks on organizations across a variety of industries globally and provide guidance on how to fight back.

(more available)
Added: March 11, 2023
image from Rise in Mobile Phishing Credential Theft Targeting U.S. Public Sector

Rise in Mobile Phishing Credential Theft Targeting U.S. Public Sector

To understand the challenges facing U.S. government agencies, Lookout analyzed data specific to our federal, state and local customers from the Lookout Security Graph. The graph, which includes telemetry and more than 175 million apps, enabled us to identify and break down the most prominent mobile threats agencies face. For this report we specifically reviewed data from 2021 and the first half of 2022.

(more available)
Added: January 11, 2023
image from 2021 Remote Workforce Security Report

2021 Remote Workforce Security Report

The 2021 Remote Workforce Security Report reveals the current state of protecting the new workforce of widely distributed organizations. The report explores their key challenges, along with the new security threats they face, technology gaps and preferences, investment priorities, and more.

(more available)
Added: October 24, 2022
image from 2021 Business Email Compromise Report

2021 Business Email Compromise Report

This report is designed to explore the state of evolving email threats and how organizations are responding to protect themselves. Business Email Compromise attacks are one of the financially most damaging cyber crimes. They typically involve phishing emails and social engineering tactics to attack organizations and trick unsuspecting employees and executives into conducting tasks under the guise of legitimate business activity, often appearing to come from a trust sender.

(more available)
Added: October 18, 2022
image from Attack Path Management Impact Report

Attack Path Management Impact Report

This report shares insights from the XM Cyber Research team’s analysis of the Attack Path Management platform from January 1st, 2021 - December 31st, 2021. The Impact report begins with a close look at the methodology of attack paths and then reveals the impact of attack techniques used to compromise critical assets across organizations, whether hybrid, on-prem or multi-cloud.

(more available)
Added: August 31, 2022
image from Data Breach Investigations Report 2022

Data Breach Investigations Report 2022

For this, our 15th anniversary installment, we continue in that same tradition by providing insight into what threats your organization is likely to face today, along with the occasional look back at previous reports and how the threat landscape has changed over the intervening years.

(more available)
Added: May 24, 2022
image from 2021 State of Phishing & Online Fraud Annual Report

2021 State of Phishing & Online Fraud Annual Report

This 2021 State of Phishing and Online Fraud Report highlights the key trends that drove digital scams using data gathered from analyzing more than one billion sites. A multitude of factors drove record growth in fraud campaign activity in 2020 with an increase of 185% from what was observed in 2019.

(more available)
Added: May 13, 2022
image from 2021 Data Breach Investigations Report

2021 Data Breach Investigations Report

The annual Data Breach Investigations Report (DBIR) is the annual marque analysis of breach and incident information over the previous year.

(more available)
Added: May 13, 2021
image from Addressing Cyber Risk and Fraud in the Cloud: Oracle and KPMG Cloud Threat Report 2020 Series Vol. 3

Addressing Cyber Risk and Fraud in the Cloud: Oracle and KPMG Cloud Threat Report 2020 Series Vol. 3

This report explores how the broad adoption of cloud services has affected cyber risk and fraud.

Added: September 28, 2020
image from State of Cybersecurity Industry Exposure at Dark Web

State of Cybersecurity Industry Exposure at Dark Web

This research purports to help better understand the emerging risks and modern threat landscape both in qualitative and quantitative aspects, and to help cybersecurity companies better prioritize and address emerging cyber risks.

(more available)
Added: September 8, 2020
image from Cloud Adoption and Risk Report: Work from Home Edition

Cloud Adoption and Risk Report: Work from Home Edition

This threat report covers traffic and attack trends, with industry and geographical breakdowns, for the first several months of 2020. A special focus on the use of cloud and SAAS providers supporting telework is included.

(more available)
Added: May 28, 2020
image from Global Threat Intelligence Report

Global Threat Intelligence Report

An annual review of threat traffic and patterns across geographies as seen by NTT Security.

Added: April 29, 2020
image from The 3rd Annual Global Password Security Report

The 3rd Annual Global Password Security Report

In our 3rd annual Global Password Security Report, we strive to share interestingand helpful insights into employee password behavior at businesses around theworld. We want to help IT and security professionals understand the greatestobstacles employees face when it comes to passwords, learn how to addresschallenges of managing and securing data in today’s digital workplace and enablethem to see how their businesses’ password security practices measure up. Thisyear, we’re bringing even more data points to the table.

(more available)
Added: March 29, 2020
image from 2020 Cost of Insider Threats: Global Report

2020 Cost of Insider Threats: Global Report

Ponemon Institute is pleased to present the findings of the 2020 Cost of Insider Threats: Global study. Sponsored by ObserveIT and IBM, this is the third benchmark study conducted to understand the direct and indirect costs that result from insider threats.

(more available)
Added: March 29, 2020
image from The Underground Economy

The Underground Economy

This report compiles information gained by the Trustwave SpiderLabs who maintain a presence in some of the more prominent recess of the online criminal underground. The provide information on the dark web’s code of honor, reputation systems, job market, and techniques used by cybercriminals to hide their tracks from law enforcement.

(more available)
Added: September 18, 2019
image from Dark Web 201: How to Leverage External Threat Hunting to Prevent Cyberattacks

Dark Web 201: How to Leverage External Threat Hunting to Prevent Cyberattacks

A necessary pillar of an effective cyber defense strategy is the capability to detect and mitigate threats at the earliest stages of the cyber kill chain. While internal and perimeter security solutions are critical to your security program, external threat intelligence gives you the ability to defend forward by eliminating threats outside the wire. This ebook is designed to provide a framework for security professionals on how to conduct effective external threat hunting on the dark web.

(more available)
Added: September 18, 2019
image from The Evolution of Authentication

The Evolution of Authentication

This report discusses the problems with passwords, “The problem is that passwords, 2FA and legacy multi-factor authentication solutions have one thing in common – they rely on shared secrets. That means that a user has a secret, and a centralized authority holds the same secret. When authenticating, those two secrets are compared to approve user access. If a malicious 3rd party intercepts the secret, they can impersonate the user. The bad news is that this reliance on shared secrets has kept large populations of users vulnerable to phishing, credential stuffing attacks, and password reuse while contributing to the steep rise in Account Take Over (ATO). The good news? The Digital Identity landscape is about to change very quickly.”

(more available)
Added: July 10, 2019
image from Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface

Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface

Risk IQ offers a glimpse into the multiple attacks on IT infrastructure organizations like Wipro and several others. This report is an analysis of those campaigns, their operators, and their targets.

(more available)
Added: July 10, 2019
image from Today's Fraud Challenges Facing the Travel Industry

Today's Fraud Challenges Facing the Travel Industry

This report takes a deep dive into examining the types of fraud that occur in the travel industry.

Added: February 16, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 20:08 UTC (build b1d7be4)