Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from 2022 Cyber Attack Trends: Mid-Year Report

2022 Cyber Attack Trends: Mid-Year Report

In this report we take a closer look at how cyber warfare has intensified to become an essential part of the preparation for, and conduct of, actual military conflict. Furthermore, we uncover what the fallout of this will be for governments and enterprises all over the world, even those that are not directly involved in the conflict.

(more available)
Added: August 26, 2022
image from Quarterly Threat Report Q1 2022

Quarterly Threat Report Q1 2022

The report surfaces the most significant data we’re seeing in our threat detection and response effort, curates that data into trends that can impact your cybersecurity posture, and offers resilience recommendations to protect your organization.

(more available)
Added: August 25, 2022
image from Quarterly Threat Report Q2 2022

Quarterly Threat Report Q2 2022

These reports provide data and insights on the attack we’re seeing, how to spot them, and the top ways you can protect your organization. These trends are based on incidents our security operations center (SOC) identifies through investigations into alerts, emails submissions, and threat hunting leads in the second quarter (Q2) of 2022. We analyzed incidents across our customer base, spanning organizations of various shapes, sizes, and industries, from April 1, 2022 to June 30, 2022.

(more available)
Added: August 25, 2022
image from Global Threat Landscape Report H1 2022

Global Threat Landscape Report H1 2022

In our H1 2022 FortiGuard Labs Threat Landscape Report, we examine the cyber threat landscape during the year’s first half to identify trends and offer recommendations about what CISOs and security teams should pay close attention to in the months ahead. The report’s findings are based on data collected through our global array of sensors monitored by the FortiGuard Labs team.

(more available)
Added: August 24, 2022
image from 2022 H1 Global Threat Analysis Report

2022 H1 Global Threat Analysis Report

Radware’s first half of 2022 threat report reviews the most important cybersecurity events, and provides detailed insights into the attack activities for the first six months of 2022. The report leverages intelligence provided by Radware’s Threat Intelligence Team, network and application-attack activity sourced from Radware’s Cloud and Managed Services, Radware’s Global Deception Network, and Radware’s Threat Research team.

(more available)
Added: August 19, 2022
image from Netscout Threat Intelligence Report: 2H 2021

Netscout Threat Intelligence Report: 2H 2021

First, the bad - adversaries continued to innovate and alter strategies aimed at taking down DDoS protections with direct-path DDoS attacks and high-powered server-class botnets. Meanwhile, a little good news came in the way of a decrease in some reflection/amplification vectors, floating overall DDoS attack number down. Despite this decrease, the bad news tells us we must remain vigilant to combat ever-changing attacker methodologies and tactics.

(more available)
Added: August 16, 2022
image from Enisa Threat Landscape for Ransom Attacks

Enisa Threat Landscape for Ransom Attacks

This report aims to bring new insights into the reality of ransomware incidents through mapping and studying ransomware incidents from May 2021 to June 2022. The findings are grim. Ransomware has adapted and evolved, becoming more efficient and causing more devastating attacks. Businesses should be ready not only for the possibility of their assets being targeted by ransomware but also to have their most private information stolen and possibly leaked or sold on the Internet to the highest bidder.

(more available)
Added: August 16, 2022
image from The Human Factor 2022

The Human Factor 2022

This report will look at how ransomware caused gas shortages on the east coast, why a Justin Bieber tour might have put on the phone with a malware distributor, and what an increase in SMS phishing means for mobile security. We’ll also explore the evolving relationship between malware distributors and one of the world’s most successful ransomware gangs, and how legitimate cloud services now provide the infrastructure for a majority of malicious activity.

(more available)
Added: August 11, 2022
image from 2022 State of the Phish Report

2022 State of the Phish Report

In this, our eighth annual State of the Phish report, we explore user vulnerabilities from multiple angles. We look at issues driven by poor cyber hygiene and those that could result from a lack of knowledge and clear communication. We discuss ways organizations can become more attuned to their risks. And we outline opportunities to build and sustain engaging security awareness training initiatives in the challenging climate.

(more available)
Added: August 11, 2022
image from X-Force Threat Intelligence Index 2022

X-Force Threat Intelligence Index 2022

The IBM Security X-Force Threat Intelligence Index maps new trends and attack patterns we observed and analyzed from our data - drawing from billions of datapoints ranging from network and endpoint detection devices, incident response (IR) engagements, domain name tracking and more. This report represents the culmination of that research based on data collected from January to December 2021.

(more available)
Added: August 8, 2022
image from Targeted attack on industrial enterprises and public institutions

Targeted attack on industrial enterprises and public institutions

In January 2022, Kaspersky ICS CERT experts detected a wave of targeted attacks on military industrial complex enterprises and public institutions in several Eastern European countries and Afghanistan. In the course of our research, we were able to identify over a dozen of attacked organizations. An analysis of information obtained during our investigation indicates that cyberespionage was the goal of this series of attacks.

(more available)
Added: August 8, 2022
image from Meta's Adversarial Threat Report Q2 2022

Meta's Adversarial Threat Report Q2 2022

This report is to share notable trends and investigations to help inform our community’s understanding of the evolving security threats we see. During some quarters, our reporting may focus more on a particular adversarial trend or tactics we see emerge across different threat actors. During other quarters, we may dive into an especially complex investigation or walk through a novel policy application and relate threat disruptions.

(more available)
Added: August 8, 2022
image from 2022 Cortex Xpanse Attack Surface Threat Report

2022 Cortex Xpanse Attack Surface Threat Report

Get the latest Cortex Xpanse “Attack Surface Threat Report” to understand the risks, and learn how automation can help security teams stop chasing a moving post and reduce risks. The Cortex Xpanse research team studied the global attack surface by monitoring scans of 50 million IP addresses associated with 100+ global enterprises and discovered that the attack surfaces of all industries continue to grow. As security teams struggle to keep up, the constant stream of new issues becomes an ever-expanding backlog of exposure - misconfigured RDP, exposed admin portals, insecure Apache Web servers or Microsoft Exchange servers, and more.

(more available)
Added: August 4, 2022
image from Incident Response Report 2022

Incident Response Report 2022

The 2022 Unit 42 Incident Response Report sheds light on the risks and threats that organizations are facing. It provides insights into threat actors and their methods that can then be used to help organizations identify potential gaps in their defenses and areas to focus on to improve their cybersecurity stance going forward.

(more available)
Added: August 1, 2022
image from 2022 SonicWall Cyber Threat Report

2022 SonicWall Cyber Threat Report

In the first half of 2022 SonicWall Capture Labs threat researchers recorded 2.8 billion malware hits globally, an 11% increase year to date over 2021. The amounts to an average of 8.240 malware attempts per customer. Based on data collected, the true culprits behind the rise in malware have been crypto-jacking and loT malware, which have risen 30% and 77% respectively, year to date.

(more available)
Added: July 26, 2022
image from 2022 Threat Review

2022 Threat Review

However, 2021 is most likely to be remembered as the year that ransomeware epidemic isn’t over, and it may not even have peaked, but the threat it poses to businesses, supply-chains and critical infrastructure is no longer in doubt, and the forces arrayed against it have never been so formidable.

(more available)
Added: July 18, 2022
image from Insider Risk Report 2022

Insider Risk Report 2022

The 2022 Insider Risk Report is driven by real data observed as part of actual investigations of real customers with whom DTEX detected and responded to potential insider risk incidents before a breach occurred.

(more available)
Added: July 5, 2022
image from Taking control of security operations

Taking control of security operations

The threat landscape is constantly evolving- and the tools you used to protect your business yesterday certainly won’t keep you safe tomorrow. In this white paper, you’ll learn three ways an intelligent, integrated approach can streamline your security operations.

(more available)
Added: June 30, 2022
image from SANS 2022 Ransomeware Defense Report

SANS 2022 Ransomeware Defense Report

In this white-paper, we address both high-level concepts: With respect to ransomware, what are the current adversary trends, and then what can organizations do to defend themselves (or better defend themselves)? The basic concept of ransomeware remains the same: Encrypt data and demand money for decryption.

(more available)
Added: June 28, 2022
image from Account Takeover In 2022

Account Takeover In 2022

Weak passwords abound, and ATO is interrupting services critical to every aspect of online life: working, streaming, ordering, paying, and just plain connecting. Raising security awareness of this topic can certainly help; but the ATO threat will remain endemic until the problems inherent to password use are resolved.

(more available)
Added: June 24, 2022
image from 2022 Cyberthreat Defense Report

2022 Cyberthreat Defense Report

The CDR is the most geographically comprehensive, vendor-agnostic study of IT security decision makers and practitioners. Rather than compiling cyberthreat statistics and assessing the damage caused by data breaches, the CDR surveys the perceptions of IT security professionals, gaining insights into how they see the world.

(more available)
Added: June 23, 2022
  • ««
  • «
  • 18
  • 19
  • 20
  • 21
  • 22
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 16, 2025 20:08 UTC (build b1d7be4)