Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from BlackHat USA Attendee Survey: Cyber Threats in Turbulent Times

BlackHat USA Attendee Survey: Cyber Threats in Turbulent Times

A survey of 273 security professionals on the implications of the COVID-19 pandemic on security perceptions.

Added: June 24, 2020
image from Inside the Mind of a Hacker 2020

Inside the Mind of a Hacker 2020

The annual report on the composition and findings of security testing as powered by BugCrowd’s bug bounty platform of nearly 3,500 security testers.

(more available)
Added: June 23, 2020
image from The 2019 Hacker Report

The 2019 Hacker Report

The third annual report from Hacker One on the state of the hacker/security testing community. Data is drawn from Hacker One’s community of bug bounty registrants and subscribing platforms.

(more available)
Added: June 23, 2020
image from The 2020 Hacker Report

The 2020 Hacker Report

The fourth annual report from Hacker One on the state of the open security testing community, using data from Hacker One’s bug bounty program.

(more available)
Added: June 23, 2020
image from The Fraud Beat 2018

The Fraud Beat 2018

This report goes in-depth on the most popular fraud techniques and how to prevent fraud attacks on your business.

Added: June 23, 2020
image from Driving Cybersecurity Performance

Driving Cybersecurity Performance

A survey of over 1,000 firms into how cybersecurity leaders organize their programs, where they invest, and which technologies, processes, and analytical tools they use. A goal of focusing on guidng readers to optimize the use of cybersecurity resources.

(more available)
Added: June 22, 2020
image from 2020 Global Threat intelligence Report

2020 Global Threat intelligence Report

A report derived from NTT’s managed SOC service, seeking to identify modern and emerging trends observed across industries and regions.

(more available)
Added: June 21, 2020
image from Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

The inaugural report from AT&T Business. Leverages data from the AT&T network operations groups as well as outside research firms and network partners.

(more available)
Added: June 13, 2020
image from 2018 Global Security Report

2018 Global Security Report

Year end report from AppRiver using telemetry from the AppRiver security products and events observed by the AppRiver Security Analysts.

(more available)
Added: June 13, 2020
image from 2019 Global Security Report

2019 Global Security Report

A year in review report drawing on the events observed by AppRiver Security analysts and the telemetry from the AppRiver security platforms. Includes predictions for 2020.

(more available)
Added: June 13, 2020
image from 2020 Vulnerability Statistics Report

2020 Vulnerability Statistics Report

The fifth edition of Edgescan’s vulnerability statistics report. Uses both scan data and survey data to report on vulnerability management, with a special focus on web application vulnerabilities.

(more available)
Added: June 13, 2020
image from 2018 Hacked Website Report

2018 Hacked Website Report

The annual report on trends in malware and hacked website from the incident response and malware research teams at GoDaddy Security /Sucuri.

(more available)
Added: June 13, 2020
image from Human Factor Report 2019

Human Factor Report 2019

An annual report derived from the Proofpoint customer base and the emails processed by the Proofpoint email security platform. Focuses on the “human factor” of organizational cyber security.

(more available)
Added: June 13, 2020
image from Cybersecurity Insights Volume 9: Security at the Speed of 5G

Cybersecurity Insights Volume 9: Security at the Speed of 5G

A survey-based report covering 704 cybersecurity professionals from organization with more than 500 employees. This edition has a special focus on the impact of 5G technologies for security professionals.

(more available)
Added: June 12, 2020
image from 2019 HIMSS Cybersecurity Survey

2019 HIMSS Cybersecurity Survey

A survey of 166 US health information security professionals. Discusses the prevalence of significant security events (primarily e-mail based), positive advances in healthcare security, the threat of complacency when managing programs, and area where there are control gaps.

(more available)
Added: June 12, 2020
image from Analysis of an Attack Surface: Five Ways Hackers are Targeting Organizations

Analysis of an Attack Surface: Five Ways Hackers are Targeting Organizations

A combination of data from RiskIQ’s internet telemetry network and thought analysis, this report covers changes related to the COVID-19 pandemic, organization’s public attack surface, mobile threats, and the importance of JavaScript as an attack vector.

(more available)
Added: June 11, 2020
image from 2019 Mobile App Threat Landscape Report

2019 Mobile App Threat Landscape Report

RiskIQ scans mobile application stores and analyzes the apps presented for potential malware and other threats. This annual threat report covers the security posture of the mobile ecosystem, identifying threat actions, and making time comparisons.

(more available)
Added: June 11, 2020
image from Cloud Threat Landscape Report 2020

Cloud Threat Landscape Report 2020

Using case data from IBM’s external incident response service involvement in cloud-related security incidents over 2019, this report covers threat actors, threat actions, common control weaknesses, and makes recommendations for increase cloud security postures. Additional data contributed by Intezer and DarkOwl.

(more available)
Added: June 10, 2020
image from An Insider View to the Increasingly Complex Kingminer Botnet

An Insider View to the Increasingly Complex Kingminer Botnet

A detailed technical analysis of the Kingminer botnet malware, including the C&C network, infection vectors, payload, and auxiliary components.

Added: June 9, 2020
image from Persistent Vulnerabilities, Their Causes and the Path Forward

Persistent Vulnerabilities, Their Causes and the Path Forward

Covers the long tail of vulnerability patching, whereby vulnerabilities that are not fixed soon after detection can linger for months or more before being addressed. Makes the case for better prioritization mechanisms.

(more available)
Added: June 5, 2020
image from 2019 Application Protection Report, 2nd Edition: The Virtue of Visibility

2019 Application Protection Report, 2nd Edition: The Virtue of Visibility

The second annual application protection report (APR) from F5 Labs combines data from F5’s global customer base with network telemetry from Baffin Bay to catalog and analyze the major threats facing application security practitioners. Includes recommendations for appsec professionals.

(more available)
Added: June 3, 2020
  • ««
  • «
  • 28
  • 29
  • 30
  • 31
  • 32
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 5, 2025 08:08 UTC (build b1d7be4)