Below you will find reports with the tag of “Threat Actor” 2020 Application Security Observability Report A report from aggregate telemetry on Contrast Security customers’ applications between June 2019 and May 2020. Covers application vulnerability prevalence, time to remediation, attacks, and composition, among other themes. (more available) Added: September 16, 2020 DDoS Threat Report Q2 2019 This quarterly threat report offers insight into the DDoS attacks that occurred in the 2nd quarter of 2019. Added: September 16, 2020 DDoS Threat Report Q1 2019 This quarterly threat report offers insight into the DDoS attacks that occurred in the 1st quarter of 2019. Added: September 16, 2020 DDoS Threat Report Q3 2019 This report takes a look at the DDoS threats that occurred in the third quarter of 2019. Added: September 16, 2020 Understand the Mistakes that Compromise your Company's Cybersecurity Tessian’s research reveals how distraction, stress and fatigue influence people’s ability to consistently make good cybersecurity decisions, and how the events of 2020 have highlighted why now - more than ever - businesses need to protect their employees. (more available) Added: September 8, 2020 Cybercrime: COVID-19 Impact Interpol’s Cybercrime Directorate produced this Global Assessment Report on COVID-19 related Cybercrime based on data from 194 countries and private partners to provide a comprehensive overview of the cybercrime landscape amid the pandemic. (more available) Added: September 3, 2020 H2 2020 Email Fraud & Identity Deception Trends This biannual report from Agari goes in-depth on changes and trends in email and identity fraud for the second half of 2020. (more available) Added: September 2, 2020 Claroty Biannual ICS Risk & Vulnerability Report: 1H 2020 The objective of this report is to provide nuanced insight into the ICS risk and vulnerability landscape, the challenges it poses to operational technology (OT) security practitioners, and what conclusions can be drawn from publicly available data. (more available) Added: September 2, 2020 Third-Party Security Signals: Exposing the reality of unsafe network services Using RiskRecon’s telemetry of the public risk surface of thousands of organizations, this report takes a look at services which are commonly viewed as unsafe. The prevalence and co-occurrence of these services is used as a indicator of other hygiene and risk indicators at firms. (more available) Added: September 2, 2020 Threat Spotlight: Lateral Phishing Teaming up with leading researchers at UC Berkeley and UC San Diego, Barracuda researchers uncovered a new and growing type of account takeover attack: lateral phishing. (more available) Added: September 1, 2020 Abnormal Quarterly BEC Report Q2 2020 The second Abnormal Security Quarterly BEC Report examines the business email compromise (BEC) threat landscape during what may be the most tumultuous quarter in modern business history: the first full quarter of the COVID-19 pandemic. (more available) Added: September 1, 2020 State of Cloud Security In 2020: DDoS and WAF The 2020 Intricately Cloud Security Market Report unpacks global cloud security trends surrounding the growth of application security. Added: September 1, 2020 2020 State of the Software Supply Chain Now in its sixth year, Sonatype’s State of the Software Supply Chain Report continues to examine measurable practices of secure open source software development and delivery. (more available) Added: September 1, 2020 More Evidence of APT Hackers-for-Hire Used for Industrial Espionage Bitdefender researchers recently investigated a sophisticated APT-style cyberespionage attack targeting aninternational architectural and video production company, pointing to an advanced threat actor and a South Korean based C&C infrastructure. This report goes in-depth on this attack. (more available) Added: September 1, 2020 Under the Hoodie 2019 A review of 180 engagements performed by Rapid7 consulting, supplemented by a survey of questions given to all Rapid7 consulting customers. Addresses lessons learned from this events. (more available) Added: August 28, 2020 Under the Hoodie 2020 A review of lessons learned over the past year from Rapid7’s penetration testing services. Combined with survey day on social engineering and red team simulations of 206 engagements. (more available) Added: August 28, 2020 Enduring from home A survey of 200 IT professionals on the readiness and impact of COVID-19 upon cyber security. Added: August 20, 2020 The state of vulnerability management in the cloud and on-premises A survey-baed report of 1,848 IT and IT Security professionals on the challenges with vulnerability prioritization and the importance of patch management for the prevention of breaches. Touches on the challenges of CMDBs and container security. (more available) Added: August 18, 2020 Upstream Security's Global Automotive Cybersecurity Report 2020 This report highlights research into cyber-attack trends in the smart mobility ecosystem. Added: July 31, 2020 2020 Open Source Security and Risk Analysis Report The 2020 OSSRA includes insights and recommendations to help security, risk, legal, and development teams better understand the open source security and license risk landscape. (more available) Added: July 31, 2020 Opportunity in Cybersecurity Research Report 2020 This report outlines job opportunity in the cybersecurity industry. It reveals that the workforce needs to grow dramatically to meet the current demand, that there is a skills gap, and more. (more available) Added: July 31, 2020 «« « 26 27 28 29 30 » »»
2020 Application Security Observability Report A report from aggregate telemetry on Contrast Security customers’ applications between June 2019 and May 2020. Covers application vulnerability prevalence, time to remediation, attacks, and composition, among other themes. (more available) Added: September 16, 2020
DDoS Threat Report Q2 2019 This quarterly threat report offers insight into the DDoS attacks that occurred in the 2nd quarter of 2019. Added: September 16, 2020
DDoS Threat Report Q1 2019 This quarterly threat report offers insight into the DDoS attacks that occurred in the 1st quarter of 2019. Added: September 16, 2020
DDoS Threat Report Q3 2019 This report takes a look at the DDoS threats that occurred in the third quarter of 2019. Added: September 16, 2020
Understand the Mistakes that Compromise your Company's Cybersecurity Tessian’s research reveals how distraction, stress and fatigue influence people’s ability to consistently make good cybersecurity decisions, and how the events of 2020 have highlighted why now - more than ever - businesses need to protect their employees. (more available) Added: September 8, 2020
Cybercrime: COVID-19 Impact Interpol’s Cybercrime Directorate produced this Global Assessment Report on COVID-19 related Cybercrime based on data from 194 countries and private partners to provide a comprehensive overview of the cybercrime landscape amid the pandemic. (more available) Added: September 3, 2020
H2 2020 Email Fraud & Identity Deception Trends This biannual report from Agari goes in-depth on changes and trends in email and identity fraud for the second half of 2020. (more available) Added: September 2, 2020
Claroty Biannual ICS Risk & Vulnerability Report: 1H 2020 The objective of this report is to provide nuanced insight into the ICS risk and vulnerability landscape, the challenges it poses to operational technology (OT) security practitioners, and what conclusions can be drawn from publicly available data. (more available) Added: September 2, 2020
Third-Party Security Signals: Exposing the reality of unsafe network services Using RiskRecon’s telemetry of the public risk surface of thousands of organizations, this report takes a look at services which are commonly viewed as unsafe. The prevalence and co-occurrence of these services is used as a indicator of other hygiene and risk indicators at firms. (more available) Added: September 2, 2020
Threat Spotlight: Lateral Phishing Teaming up with leading researchers at UC Berkeley and UC San Diego, Barracuda researchers uncovered a new and growing type of account takeover attack: lateral phishing. (more available) Added: September 1, 2020
Abnormal Quarterly BEC Report Q2 2020 The second Abnormal Security Quarterly BEC Report examines the business email compromise (BEC) threat landscape during what may be the most tumultuous quarter in modern business history: the first full quarter of the COVID-19 pandemic. (more available) Added: September 1, 2020
State of Cloud Security In 2020: DDoS and WAF The 2020 Intricately Cloud Security Market Report unpacks global cloud security trends surrounding the growth of application security. Added: September 1, 2020
2020 State of the Software Supply Chain Now in its sixth year, Sonatype’s State of the Software Supply Chain Report continues to examine measurable practices of secure open source software development and delivery. (more available) Added: September 1, 2020
More Evidence of APT Hackers-for-Hire Used for Industrial Espionage Bitdefender researchers recently investigated a sophisticated APT-style cyberespionage attack targeting aninternational architectural and video production company, pointing to an advanced threat actor and a South Korean based C&C infrastructure. This report goes in-depth on this attack. (more available) Added: September 1, 2020
Under the Hoodie 2019 A review of 180 engagements performed by Rapid7 consulting, supplemented by a survey of questions given to all Rapid7 consulting customers. Addresses lessons learned from this events. (more available) Added: August 28, 2020
Under the Hoodie 2020 A review of lessons learned over the past year from Rapid7’s penetration testing services. Combined with survey day on social engineering and red team simulations of 206 engagements. (more available) Added: August 28, 2020
Enduring from home A survey of 200 IT professionals on the readiness and impact of COVID-19 upon cyber security. Added: August 20, 2020
The state of vulnerability management in the cloud and on-premises A survey-baed report of 1,848 IT and IT Security professionals on the challenges with vulnerability prioritization and the importance of patch management for the prevention of breaches. Touches on the challenges of CMDBs and container security. (more available) Added: August 18, 2020
Upstream Security's Global Automotive Cybersecurity Report 2020 This report highlights research into cyber-attack trends in the smart mobility ecosystem. Added: July 31, 2020
2020 Open Source Security and Risk Analysis Report The 2020 OSSRA includes insights and recommendations to help security, risk, legal, and development teams better understand the open source security and license risk landscape. (more available) Added: July 31, 2020
Opportunity in Cybersecurity Research Report 2020 This report outlines job opportunity in the cybersecurity industry. It reveals that the workforce needs to grow dramatically to meet the current demand, that there is a skills gap, and more. (more available) Added: July 31, 2020