Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from Financial Trend Analysis

Financial Trend Analysis

The information in this report is based on ransomware-related information obtained from analysis of BSA data, trade publications, and commercial reporting, as well as insights from law enforcement and other partners. Trends represented in this report illustrate financial institutions’ identification and reporting of ransomware events and may not reflect the actual dates associated with ransomware incidents.

(more available)
Added: November 2, 2022
image from 2022 Cloud Data Security Report

2022 Cloud Data Security Report

This report will help organizations concentrate their security efforts on what really matters and highlight the main obstacles on their way to safe cloud computing.

(more available)
Added: October 31, 2022
image from Cyber Trends and Credit Risks

Cyber Trends and Credit Risks

This report underscores the challenge facing corporate, government and not-for-profit debt issuers: rising cybersecurity incidents, higher costs to combat them, and an imbalance in the executive and risk management experience needed to manage them properly. In an ever-more-connected world, the risk of systemic attacks resulting in damaging financial and repetitional consequences keeps increasing.

(more available)
Added: October 26, 2022
image from 2021 Threat Hunting Report

2021 Threat Hunting Report

In 2021, Cybersecurity Insiders conducted the fourth annual threat hunting research project to gain deeper insights into the maturity and evolution of the security practice. While many SOCs are struggling to cope with the current security threat workload, more organizations are adopting threat hunting as part of their security operations. They are discovering that proactive threat hunting can reduce the risk and impact of threats while improving defenses against new attacks.

(more available)
Added: October 24, 2022
image from The State of Authentication in the Finance Industry

The State of Authentication in the Finance Industry

This report shines an important spotlight on the perceptions of global financial institutions around authentication. As the study findings show, these remains much to do to close these security gaps, and traditional MFA methods are not delivering the security that we all need.

(more available)
Added: October 24, 2022
image from 2021 Threat Hunting Report

2021 Threat Hunting Report

The 2021 Threat Hunting Report explores the challenges, technology preferences, and benefits of threat hunting to gain deeper insights into the maturity and evolution of the security practice. Threat hunting continues to evolve as an innovative cybersecurity tactic that focues on proactively detecting and isolating Advanced Persistent Threats (APTs) that might otherwise go undetected by tradition, reactive security technologies.

(more available)
Added: October 24, 2022
image from Application Protection Report 2022

Application Protection Report 2022

The goal of this report is to document the evolution of the threat landscape over the previous years so security practitioners can tune their defenses to suit. More specifically, this report is intended to clarify the relationship between target characteristics and attacker behavior so that each organization can focus on the threats most applicable to them.

(more available)
Added: October 21, 2022
image from Ransomware Report 2022

Ransomware Report 2022

This 2022 Ransomware Report reveals the latest security trends, challenges, and investment priorities for ransomware protection, as reported by over 236 cybersecurity professionals surveyed in 2022. Ransomware attacks are on the rise and continue to wreak havoc as one of the most destructive malware threats that affect organizations of all sizes.

(more available)
Added: October 17, 2022
image from The State of Passwordless Security 2022

The State of Passwordless Security 2022

The 2022 State of Passwordless Security Report is based on a comprehensive survey of 411 technology professionals to explore the state of conventional and passwordless authentication, key drivers and barriers to adoption, and organizations’ technology preferences. Respondents range from technical executives to IT security practitioners, representing a cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: October 17, 2022
image from 2022 Ransomware/ Malware Report

2022 Ransomware/ Malware Report

This report is based on the results of a comprehensive online survey of 225 cybersecurity professionals, to gain more insight into the latest trends, key challenges, and solutions for malware and ransomware security. The respondents range from technical executives to managers and iT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: October 14, 2022
image from Threat Horizons September 2022

Threat Horizons September 2022

The Google Cloud Threat Horizons Report brings decision-makers strategic intelligence on current and likely future threats to cloud enterprise users and the best original cloud-relevant research and security recommendations from across Google’s intelligence and security teams.

(more available)
Added: October 14, 2022
image from 2022 Sysdig Cloud-Native Threat Report

2022 Sysdig Cloud-Native Threat Report

This report was complied using Open Source Intelligence (OSINT), the practice of collecting information from published or otherwise publicly available sources, and Sysdig TRT’s global data collection network. Data on cryptominers and DDoS agents was detected through Sysdig’s advanced honeynets. The honeynet is designed to capture attacks and analyze the tools used by threat actors.

(more available)
Added: October 13, 2022
image from Security Visibility Report 2022

Security Visibility Report 2022

This report surveyed 278 cybersecurity professionals to reveal the key challenges regarding security visibility, how organizations solve this issue, and the security capabilities organizations prioritize.

(more available)
Added: October 12, 2022
image from DDoS Threat Report 2021 Q3

DDoS Threat Report 2021 Q3

Q3 saw a notable trend in which attackers launched DDoS attacks at single targets within a CSP, attributing an attack size increase of 544% QoQ and 232% YoY. Over 55% of attackers focused on hitting specific service with high volumes of traffic simultaneously. Due to the dramatic increase in attack size, this shift to employing high-penetration volumetric attacks can potentially lead to additional impact to CSP networks, regionally.

(more available)
Added: October 11, 2022
image from Reining in Ransomware

Reining in Ransomware

In this report, we’ve analyzed on-the-ground evidence collected while responding to nearly 1,500 ransomware events exceeding $1 billion in ransom demands. Through it all, we’ve helped our clients manage their response, minimize costs, and maintain business operations. And we hope this report helps many other organizations and insurers do the same.

(more available)
Added: October 11, 2022
image from DDoS Threat Report FHY 2021

DDoS Threat Report FHY 2021

In the first half of 2021, we found that 99.09% of attacks were smaller than 10Gbps and 95.62% of attacks were smaller than 1Gbps, of which we believe a majority were launched using readily available and inexpensive DDoS-for-hire services.

(more available)
Added: October 11, 2022
image from DDoS Threat Report 2020 Q3

DDoS Threat Report 2020 Q3

In this edition of our quarterly report, there will be a special feature story that focuses on the DDoS issues surrounding the online gaming industry, in particular, why it is an industry to keep an eye on - especially the service providers to this industry. And why the popularity of online gaming has skyrocketed in Q3.

(more available)
Added: October 11, 2022
image from Acronis Cyber Protection Operation Centers Report

Acronis Cyber Protection Operation Centers Report

This report represents a global outlook and is based on over 700,000 unique endpoints distributed around the world. Most of the statistics discussed focus on threats for Windows operating systems, as they are much more prevalent compared to macOS and Linux.

(more available)
Added: October 11, 2022
image from DDoS Threat Report 2020 Q2

DDoS Threat Report 2020 Q2

In this report, we’re going to discuss how bit-and-piece attacks have continued to evolve, and are able to successfully evade DDoS mitigation schemes when blended with multiple attack vectors, and the challenges that these advanced attack tactics present to the cybersecurity world.

(more available)
Added: October 11, 2022
image from 2022 DDoS Threat Report

2022 DDoS Threat Report

The 2022 A10 Networks DDoS Threat Report provides insights into DDoS activity during the past six months including origins of activity; the growth of DDoS weapons and botnets; the role of malware in the propagation of DDoS weapons and attacks; and the steps organizations can take to protect against such activities.

(more available)
Added: October 11, 2022
image from DDoS Threat Report 2019 Q4

DDoS Threat Report 2019 Q4

In Q4 2019 an unprecedented concentration of DDoS attacks on US networks was observed, with more than 1,000 victims identified in various states. Whether motivated by politics, profiteering, crime or other malicious purposes, attacks were frequent and impactful.

(more available)
Added: October 11, 2022
  • ««
  • «
  • 16
  • 17
  • 18
  • 19
  • 20
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 12:08 UTC (build b1d7be4)