Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from Spear Phishing: Top Threats and Trends

Spear Phishing: Top Threats and Trends

This report looks at spear-phishing attacks affecting organizations today. It identifies the 13 biggest threats, and how to defend against them.

(more available)
Added: December 18, 2020
image from Beyond Car Hacking: The Cyber Threat Landscape for Automotive Companies

Beyond Car Hacking: The Cyber Threat Landscape for Automotive Companies

This report breaks down several of the most common and most prominent types of cyber threats that impact automobile manufacturers and retailers.

(more available)
Added: December 18, 2020
image from 2020 Q3 Report: Vulnerability QuickView

2020 Q3 Report: Vulnerability QuickView

This report covers vulnerabilities disclosed this year. It aims to help the reader navigate the current vulnerability landscape. It provides valuable insight into vulnerability trends and how they are impacting organizations.

(more available)
Added: December 16, 2020
image from SOTI/Security: A Year in Review

SOTI/Security: A Year in Review

Akamai’s end of year review of the key events of 2020 affecting information security. Compiles findings from other SOTI reports with additional commentary and data from the Akamai service footprint.

(more available)
Added: December 9, 2020
image from Microsoft Digital Defense Report

Microsoft Digital Defense Report

This report looks at cybercrime in 2020, going into the changes in cybercrime, nationwide threats, security involving remote work, and how to improve security.

(more available)
Added: December 1, 2020
image from 2020 State of Encrypted Attacks

2020 State of Encrypted Attacks

This report shares key insights on how attackers are accelerating their use of SSL/TLS encryption to bypass traditional defenses.

Added: December 1, 2020
image from Malicious Uses and Abuses of Artificial Intelligence

Malicious Uses and Abuses of Artificial Intelligence

This report looks at the present state of Malicious uses of AI, then makes predictions for the future. It ends with recommendations to prevent malicious use of AI.

(more available)
Added: November 30, 2020
image from The Great Cyber Surrender

The Great Cyber Surrender

This report looks at the scale and complexity of cyberattacks on individuals and firms. It then goes into what needs to be done to deal with the complex and evolving threat of cyber attacks.

(more available)
Added: November 30, 2020
image from 2020 Crowdstrike Global Security Attitude Survey

2020 Crowdstrike Global Security Attitude Survey

A survey of 2,200 IT professionals from organizations of 250 or more employees. Focuses on attitudes on and about cybersecurity.

(more available)
Added: November 21, 2020
image from The State of Security within eCommerce

The State of Security within eCommerce

A review of the threat volume and characteristics affecting e-commerce.

Added: November 21, 2020
image from Prioritization to Prediction: Volume 6 - The Attacker-Defender Divide

Prioritization to Prediction: Volume 6 - The Attacker-Defender Divide

This sixth volume of the Prioritization to Prediction series combines vulnerability data from Kenna’s customers with additional intelligence from Fortinet and others. This volume provides a quantitative analysis of the timeline of key dates in the lifecycle of an exploited vulnerability, exploring the effects of releasing exploit code relative to the date of CVE publication and patch availability, discussing the ramifications to attackers and defenders.

(more available)
Added: November 18, 2020
image from 2020 Phishing and Fraud Report

2020 Phishing and Fraud Report

The 2020 edition of this annual report reviews five years of phishing events from F5’s Security Operations Center. This data is supplemented with active and confirmed phishing sites from Webroot and darkweb market data from Vigilante for a broad view of the volume and techniques of phishing activity.

(more available)
Added: November 16, 2020
image from Cybersecurity Challenges in Financial Services - Marker Survey Report

Cybersecurity Challenges in Financial Services - Marker Survey Report

This report is based on a survey of 250 cybersecurity and IT decision-makers. It aims to provide insight on cybersecurity challenges in financial services in the age of COVID-19.

(more available)
Added: November 6, 2020
image from Global Incident Response Threat Report 2020

Global Incident Response Threat Report 2020

This report paints a picture of the evolving threat landscape by discussing the impact of COVID-19 and the U.S. presidential election as well as providing practices for security teams looking to fight back.

(more available)
Added: November 1, 2020
image from 2020 Year in Review: ENISA Threat Landscape

2020 Year in Review: ENISA Threat Landscape

This is the 8th annual Year in Review Report. It looks at cyber threat intelligence, sectoral and thematic threats, emerging trends, and the biggest incidents worldwide from the past year.

(more available)
Added: November 1, 2020
image from 2020 Unit 42 IoT Threat Report

2020 Unit 42 IoT Threat Report

This annual report looks at changes in internet of things security.

Added: November 1, 2020
image from Connected Medical Device Security: A Deep Dive into Healthcare Networks

Connected Medical Device Security: A Deep Dive into Healthcare Networks

This report analyzes the security of healthcare delivery organizations. It looks at the risks the industry faces and provides effective strategies to reduce cybersecurity risks and defend healthcare networks.

(more available)
Added: October 30, 2020
image from Threat Spotlight: Spear-phishing Attacks Targeting Education Sector

Threat Spotlight: Spear-phishing Attacks Targeting Education Sector

This report looks into spear-phishing attacks as the education sector has moved to be remote. It looks at trends in ways they are targeting schools, as well as solutions organizations can use to defend against these attacks.

(more available)
Added: October 29, 2020
image from 2020 Q3 Report: Data Breach QuickView

2020 Q3 Report: Data Breach QuickView

This report examines publicly disclosed data breach events, and describes trends and key changes for Q3 2020.

Added: October 29, 2020
image from 2020 Global Financial Crime Investigations Survey Report

2020 Global Financial Crime Investigations Survey Report

This report is based on a survey of investigators from over 150 organizations. It seeks to better understand financial crime and how companies deal with it.

(more available)
Added: October 25, 2020
image from 2020 SMB Cybersecurity Survey

2020 SMB Cybersecurity Survey

Presenting the results of a survey conducted on 2,055 small and medium-sized US businesses. Focuses on the chief cybersecurity concerns expressed by organizations, their planning pre- and post-COVID-19, approaches to remote work, and recovery planning. Cyber insurance attitudes are included.

(more available)
Added: October 21, 2020
  • ««
  • «
  • 24
  • 25
  • 26
  • 27
  • 28
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 16:08 UTC (build b1d7be4)