Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Threat actor

Below you will find reports with the tag of “Threat actor”

image from The Impact of the Solarwinds Breach on Cybersecurity

The Impact of the Solarwinds Breach on Cybersecurity

A survey of 200 global security professionals as to their opinions, responses, and outlook of the Solarwinds software chain compromise.
Added: March 14, 2021
image from How IT Security Leaders Can Unlock the Potential of Their Teams

How IT Security Leaders Can Unlock the Potential of Their Teams

This report looks at IT security teams. They highlight changes in the teams and the ways that they work.
Added: February 28, 2021
image from Phishing Activity Trends Report Q4 2020

Phishing Activity Trends Report Q4 2020

This report analyzes phishing attacks and other identity theft techniques used in Q4 2020.
Added: February 24, 2021
image from ESET Threat Report Q4 2020

ESET Threat Report Q4 2020

This report reflects on the key threats that emerged or expanded in the 4th quarter of 2020.
Added: February 24, 2021
image from Securing a Shifting Landscape: Corporate perceptions of nation-state cyber-threats

Securing a Shifting Landscape: Corporate perceptions of nation-state cyber-threats

This report assesses corporate perceptions of nation-state cyber-threats. It finds that companies have become more aware of the challenges posed by such threats and are concerned about them; however, their ability to respond to evolving risks may be lacking. (more available)
Added: February 24, 2021
image from A Constant State of Flux: Trend Micro 2020 Annual Cybersecurity Report

A Constant State of Flux: Trend Micro 2020 Annual Cybersecurity Report

This report examines the most important stories, issues, and trends that affected the cybersecurity landscape in 2020.
Added: February 24, 2021
image from Follow the Money: Qualifying Opportunism Behind Cyberattacks During the COVID-19 Pandemic

Follow the Money: Qualifying Opportunism Behind Cyberattacks During the COVID-19 Pandemic

This report covers the cybersecurity threats tied to COVID-19 pandemic observed over the past year, detailing the socioeconomic drivers that contributed to the threat landscape. (more available)
Added: January 29, 2021
image from 2020 Crowdstrike Global Security Attitude Survey

2020 Crowdstrike Global Security Attitude Survey

This report explores many different areas of cybersecurity in 2020, including how ransomware has changed, why nation-state actors have been so motivated to target organizations, and also the growing importance of layering security transformation into your digital transformation strategies. (more available)
Added: January 29, 2021
image from 2020 Year End Report: Data Breach QuickView

2020 Year End Report: Data Breach QuickView

This report looks at data breach events in 2020. It then compares key aspects and trends of these breaches to data breaches in previous years. (more available)
Added: January 21, 2021
image from Spear Phishing: Top Threats and Trends

Spear Phishing: Top Threats and Trends

This report looks at spear-phishing attacks affecting organizations today. It identifies the 13 biggest threats, and how to defend against them. (more available)
Added: December 18, 2020
image from Beyond Car Hacking: The Cyber Threat Landscape for Automotive Companies

Beyond Car Hacking: The Cyber Threat Landscape for Automotive Companies

This report breaks down several of the most common and most prominent types of cyber threats that impact automobile manufacturers and retailers. (more available)
Added: December 18, 2020
image from 2020 Q3 Report: Vulnerability QuickView

2020 Q3 Report: Vulnerability QuickView

This report covers vulnerabilities disclosed this year. It aims to help the reader navigate the current vulnerability landscape. It provides valuable insight into vulnerability trends and how they are impacting organizations. (more available)
Added: December 16, 2020
image from SOTI/Security: A Year in Review

SOTI/Security: A Year in Review

Akamai’s end of year review of the key events of 2020 affecting information security. Compiles findings from other SOTI reports with additional commentary and data from the Akamai service footprint. (more available)
Added: December 9, 2020
image from Microsoft Digital Defense Report

Microsoft Digital Defense Report

This report looks at cybercrime in 2020, going into the changes in cybercrime, nationwide threats, security involving remote work, and how to improve security. (more available)
Added: December 1, 2020
image from 2020 State of Encrypted Attacks

2020 State of Encrypted Attacks

This report shares key insights on how attackers are accelerating their use of SSL/TLS encryption to bypass traditional defenses.
Added: December 1, 2020
image from Malicious Uses and Abuses of Artificial Intelligence

Malicious Uses and Abuses of Artificial Intelligence

This report looks at the present state of Malicious uses of AI, then makes predictions for the future. It ends with recommendations to prevent malicious use of AI. (more available)
Added: November 30, 2020
image from The Great Cyber Surrender

The Great Cyber Surrender

This report looks at the scale and complexity of cyberattacks on individuals and firms. It then goes into what needs to be done to deal with the complex and evolving threat of cyber attacks. (more available)
Added: November 30, 2020
image from 2020 Crowdstrike Global Security Attitude Survey

2020 Crowdstrike Global Security Attitude Survey

A survey of 2,200 IT professionals from organizations of 250 or more employees. Focuses on attitudes on and about cybersecurity.
Added: November 21, 2020
image from The State of Security within eCommerce

The State of Security within eCommerce

A review of the threat volume and characteristics affecting e-commerce.
Added: November 21, 2020
image from Prioritization to Prediction: Volume 6 - The Attacker-Defender Divide

Prioritization to Prediction: Volume 6 - The Attacker-Defender Divide

This sixth volume of the Prioritization to Prediction series combines vulnerability data from Kenna’s customers with additional intelligence from Fortinet and others. (more available)
Added: November 18, 2020
image from 2020 Phishing and Fraud Report

2020 Phishing and Fraud Report

The 2020 edition of this annual report reviews five years of phishing events from F5’s Security Operations Center. This data is supplemented with active and confirmed phishing sites from Webroot and darkweb market data from Vigilante for a broad view of the volume and techniques of phishing activity. (more available)
Added: November 16, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 59
  • »
  • »»
© Cyentia Institute 2021
Library updated: April 20, 2021 12:07 UTC (build f09024c)