Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Stolen Creds

Below you will find reports with the tag of “Stolen Creds”

image from Definitive Guide To Next-Generation Fraud Prevention

Definitive Guide To Next-Generation Fraud Prevention

This e-book offers insight into online fraud and cyber-crime.

Added: November 24, 2018
image from Identifying Insider Threats Through Machine Learning and Behavioral Analysis

Identifying Insider Threats Through Machine Learning and Behavioral Analysis

Given that the most important information resides in databases, organizations are increasingly turning their focus toward databases security technologies. To defend databases from attackers using stolen credentials, the industry is beginning to adopt a new security paradigm based on machine learning and behavior analysis. This white paper discusses that paradigm shift and the issues that go along with it.

(more available)
Added: October 26, 2018
image from Quarterly Threat Report Q2 2018

Quarterly Threat Report Q2 2018

This Quarterly report continues Rapid7’s excellent work of providing insight to the threats they have witnessed during the 2nd Quarter of 2018.

(more available)
Added: October 26, 2018
image from Credential Compromise: What You Need To Know About Theft, Stuffing, And Spilling, And What You Can Do About It

Credential Compromise: What You Need To Know About Theft, Stuffing, And Spilling, And What You Can Do About It

This paper seeks to help mitigate serious crimes related to mobile security and credential fraud.

Added: October 22, 2018
image from Five Phishing Predictions 2018

Five Phishing Predictions 2018

This report offers some significant predictions of phishing attacks in 2018.

Added: October 22, 2018
image from 2018 Gambling Report

2018 Gambling Report

iovation offers their unique insight into the igaming industry. They provide observations of the trends in 2017 and look ahead to the future of the industry in 2018.

(more available)
Added: October 21, 2018
image from Exposé Of A Credit Card Black Market

Exposé Of A Credit Card Black Market

This short report takes a look at cybersecurity related Credit Card Fraud.

Added: October 20, 2018
image from 2017 Credential Spill Report

2017 Credential Spill Report

Shap Security has a unique position to talk about credtial spills. This paper provides a breakdown of their experiences with the credential spill issues of 2017.

(more available)
Added: October 19, 2018
image from Compromised Credentials: Learn from the exposure of the world's 1000 biggest companies

Compromised Credentials: Learn from the exposure of the world's 1000 biggest companies

The article uses the world’s 1,000 largest companies as a sample to help us better understand the extent to which organizations are effected by cyber threats and how threat actors my be looking to exploit these credentials.

(more available)
Added: October 18, 2018
image from Widespread Outbreak Of NotPetya Ransomware

Widespread Outbreak Of NotPetya Ransomware

This report specifically talks about NotPetya.

Added: October 17, 2018
image from Cyber Threats To The Financial Services And Insurance Industries

Cyber Threats To The Financial Services And Insurance Industries

Get a glimpse of cyber threats the financial services and insurance sectors are facing, including top malware and crimeware detected.

(more available)
Added: October 16, 2018
image from GDPR Advisory #2: Detecting And Responding Rapidly To Personal Data Breaches

GDPR Advisory #2: Detecting And Responding Rapidly To Personal Data Breaches

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 16, 2018
image from McAfee Labs Threats Report June 2017

McAfee Labs Threats Report June 2017

In this quarterly threats report, they highlight three Key Topics: They broadly examine evasion techniques and how malware authors use them to accomplish their goals. They explore the very interesting topic of steganography in the digital world. They examine Fareit, the most famous password-stealing malware.

(more available)
Added: October 15, 2018
image from The Rise And Fall OF Scan4You

The Rise And Fall OF Scan4You

This is exclusive research into the cyber threat that is Scan4You. It discusses the history and current outcomes of this unique threat.

(more available)
Added: October 15, 2018
image from Implications Of Using Privileged Access Management To Enable Next Generation Technology

Implications Of Using Privileged Access Management To Enable Next Generation Technology

To better understand how security issues, such as privileged access management (PAM), affect the adoption of next-generation technologies, BeyondTrust – the leader in PAM – commissioned the 2018 Implications of Using Privileged Access Management to Enable Next-Generation Technology survey. The results are a wake-up call for anyone looking to leverage these next-generation technologies.

(more available)
Added: October 14, 2018
image from Tech Industry Doppelgangers: Campaign Innovation In the World of Cybercrime

Tech Industry Doppelgangers: Campaign Innovation In the World of Cybercrime

This thought piece draws on the experience of 451 Networks analysts and interviews with defensive security professionals to review major trends in attackers tools, techniques, and processes (TTPs).

(more available)
Added: October 14, 2018
image from The Cyber Attackers' Playbook: A Look at How One Common Attack Pattern Left 225k Ukraine Residents in the Dark

The Cyber Attackers' Playbook: A Look at How One Common Attack Pattern Left 225k Ukraine Residents in the Dark

In this ebook, they examine a specific cyber attack on a Ukrainian utility company in detail, and identify common steps that are used time and again during advanced attacks.

(more available)
Added: October 14, 2018
image from Cyber Threats To The Education Industry

Cyber Threats To The Education Industry

Understand the cyber threats targeting the education industry, including subsectors impacted by advanced threat groups.

Added: October 13, 2018
image from The French Underground: Under A Shroud Of Extreme Caution

The French Underground: Under A Shroud Of Extreme Caution

If the North American underground had an alter ego, it would be the French underground. A deep dive into the North American underground1 revealed that it is a “glass tank,” open to not only the tech-savviest of hackers, but also visible to both cybercriminals and law enforcement. The French underground, meanwhile, is not only well-hidden in the Dark Web, its players also operate with extreme caution. Read this paper to find out more.

(more available)
Added: October 13, 2018
image from Threat Intelligence Executive Report 2017: Volume 4

Threat Intelligence Executive Report 2017: Volume 4

This Threat Report takes a look at some of the events of mid 2017. Specifically, it looks at the global WannaCry and Petya Threats, attacks that bypass filtering, a Chinese threat group, and threat actors stealing intellectual property from Japan.

(more available)
Added: October 13, 2018
image from Who Needs Malware? How Adversaries Use Fileless Attacks To Evade Your Security

Who Needs Malware? How Adversaries Use Fileless Attacks To Evade Your Security

As security measures get better at detecting and blocking both malware and cyberattacks, adversaries and cybercriminals are forced to constantly develop new techniques to evade detection. One of these advanced techniques involves “fileless" exploits, where no executable file is written to disk. These attacks are particularly effective at evading traditional antivirus (AV) solutions, which look for files saved to disk so they can scan them and determine if they are malicious. This report discusses these issues.

(more available)
Added: October 13, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 04:08 UTC (build b1d7be4)