Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Stolen creds

Below you will find reports with the tag of “Stolen creds”

image from Rise in Mobile Phishing Credential Theft Targeting U.S. Public Sector

Rise in Mobile Phishing Credential Theft Targeting U.S. Public Sector

To understand the challenges facing U.S. government agencies, Lookout analyzed data specific to our federal, state and local customers from the Lookout Security Graph. (more available)
Added: January 11, 2023
image from 2021 Remote Workforce Security Report

2021 Remote Workforce Security Report

The 2021 Remote Workforce Security Report reveals the current state of protecting the new workforce of widely distributed organizations. The report explores their key challenges, along with the new security threats they face, technology gaps and preferences, investment priorities, and more. (more available)
Added: October 24, 2022
image from 2021 Business Email Compromise Report

2021 Business Email Compromise Report

This report is designed to explore the state of evolving email threats and how organizations are responding to protect themselves. Business Email Compromise attacks are one of the financially most damaging cyber crimes. (more available)
Added: October 18, 2022
image from Attack Path Management Impact Report

Attack Path Management Impact Report

This report shares insights from the XM Cyber Research team’s analysis of the Attack Path Management platform from January 1st, 2021 - December 31st, 2021. (more available)
Added: August 31, 2022
image from Data Breach Investigations Report 2022

Data Breach Investigations Report 2022

For this, our 15th anniversary installment, we continue in that same tradition by providing insight into what threats your organization is likely to face today, along with the occasional look back at previous reports and how the threat landscape has changed over the intervening years. (more available)
Added: May 24, 2022
image from 2021 State of Phishing & Online Fraud Annual Report

2021 State of Phishing & Online Fraud Annual Report

This 2021 State of Phishing and Online Fraud Report highlights the key trends that drove digital scams using data gathered from analyzing more than one billion sites. (more available)
Added: May 13, 2022
image from 2021 Data Breach Investigations Report

2021 Data Breach Investigations Report

The annual Data Breach Investigations Report (DBIR) is the annual marque analysis of breach and incident information over the previous year. (more available)
Added: May 13, 2021
image from Addressing Cyber Risk and Fraud in the Cloud: Oracle and KPMG Cloud Threat Report 2020 Series Vol. 3

Addressing Cyber Risk and Fraud in the Cloud: Oracle and KPMG Cloud Threat Report 2020 Series Vol. 3

This report explores how the broad adoption of cloud services has affected cyber risk and fraud.
Added: September 28, 2020
image from State of Cybersecurity Industry Exposure at Dark Web

State of Cybersecurity Industry Exposure at Dark Web

This research purports to help better understand the emerging risks and modern threat landscape both in qualitative and quantitative aspects, and to help cybersecurity companies better prioritize and address emerging cyber risks. (more available)
Added: September 8, 2020
image from Cloud Adoption and Risk Report: Work from Home Edition

Cloud Adoption and Risk Report: Work from Home Edition

This threat report covers traffic and attack trends, with industry and geographical breakdowns, for the first several months of 2020. A special focus on the use of cloud and SAAS providers supporting telework is included. (more available)
Added: May 28, 2020
image from Global Threat Intelligence Report

Global Threat Intelligence Report

An annual review of threat traffic and patterns across geographies as seen by NTT Security.
Added: April 29, 2020
image from The 3rd Annual Global Password Security Report

The 3rd Annual Global Password Security Report

In our 3rd annual Global Password Security Report, we strive to share interestingand helpful insights into employee password behavior at businesses around theworld. (more available)
Added: March 29, 2020
image from 2020 Cost of Insider Threats: Global Report

2020 Cost of Insider Threats: Global Report

Ponemon Institute is pleased to present the findings of the 2020 Cost of Insider Threats: Global study. Sponsored by ObserveIT and IBM, this is the third benchmark study conducted to understand the direct and indirect costs that result from insider threats. (more available)
Added: March 29, 2020
image from The Underground Economy

The Underground Economy

This report compiles information gained by the Trustwave SpiderLabs who maintain a presence in some of the more prominent recess of the online criminal underground. (more available)
Added: September 18, 2019
image from Dark Web 201: How to Leverage External Threat Hunting to Prevent Cyberattacks

Dark Web 201: How to Leverage External Threat Hunting to Prevent Cyberattacks

A necessary pillar of an effective cyber defense strategy is the capability to detect and mitigate threats at the earliest stages of the cyber kill chain. (more available)
Added: September 18, 2019
image from The Evolution of Authentication

The Evolution of Authentication

This report discusses the problems with passwords, “The problem is that passwords, 2FA and legacy multi-factor authentication solutions have one thing in common – they rely on shared secrets. (more available)
Added: July 10, 2019
image from Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface

Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface

Risk IQ offers a glimpse into the multiple attacks on IT infrastructure organizations like Wipro and several others. This report is an analysis of those campaigns, their operators, and their targets. (more available)
Added: July 10, 2019
image from Today's Fraud Challenges Facing the Travel Industry

Today's Fraud Challenges Facing the Travel Industry

This report takes a deep dive into examining the types of fraud that occur in the travel industry.
Added: February 16, 2019
image from Insider Hacks: How To Catch And Prosecute Fraudsters

Insider Hacks: How To Catch And Prosecute Fraudsters

From the report, “Partnering with retailers for over a decade to detect and prevent online fraud has unearthed many insights about eCommerce criminals. (more available)
Added: February 16, 2019
image from Insider Hacks: Fighting Fraud for Online Games

Insider Hacks: Fighting Fraud for Online Games

Scott Adams has been at the front lines fighting fraud in the world of online games as former Vice-Chair Merchant Board at Payments Ed Forum, and former Director of Fraud and Risk Management at Riot Games. (more available)
Added: February 16, 2019
image from Quarterly Threat Report: Q1 2018

Quarterly Threat Report: Q1 2018

From the report, “This quarter’s report covers three main areas of concern for the modern IT defender: • First, credential theft, reuse, and subsequent suspicious logins are—today— the most commonly reported significant incident we’re seeing across both small (<1,000 endpoints) and large organizations (≥1,000 endpoints). (more available)
Added: February 9, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 8, 2023 20:08 UTC (build 051771c)