Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from The Deserialization Problem

The Deserialization Problem

This paper answers questions about what the deserialization vulnerability is, and what the challenges are to solving it.

Added: October 25, 2018
image from Threat Advisory: Bluclub

Threat Advisory: Bluclub

This is a threat advisory for Bluclub.

Added: October 25, 2018
image from Threat Intelligence Executive Report 2017: Volume 2

Threat Intelligence Executive Report 2017: Volume 2

This threat report takes a look at some of the events of spring 2017. Specifically, it looks at the NICKEL GLADSTONE threat group, the Iranian COBALT GYPSY threat group, third party risks, limiting native operating system admin tools.

(more available)
Added: October 25, 2018
image from Threat Intelligence: Cyberattacks And The Utility Industry

Threat Intelligence: Cyberattacks And The Utility Industry

This report takes a look at how cyberattacks impact the utility industry.

Added: October 25, 2018
image from 2014 Trustwave Global Security Report

2014 Trustwave Global Security Report

Subtitled “Cyber Attacks: Can the Market Respond?”

Added: October 24, 2018
image from 2015 Breach Preparedness and Response Study

2015 Breach Preparedness and Response Study

In 2013, ISMG and FireEye teamed up to survey security leaders about advanced threats and breach response. Among the findings: Only 20 percent of respondents rated their incident response programs “very effective,” and they were most concerned about their abilities to detect and contain APT/malware quickly and completely.

(more available)
Added: October 24, 2018
image from 2015 First Half Review: Findings from the Breach Level Index

2015 First Half Review: Findings from the Breach Level Index

This is an in depth presentation of the data breaches that occurred in the first half of 2015. It contains very detailed graphics, charts, and analysis.

(more available)
Added: October 24, 2018
image from 2015 Polish Internet Security Landscape

2015 Polish Internet Security Landscape

This is a yearly report based on the activities of CERT Polska for the year 2015. Polish authorities, well aware of the dangers, commissioned this report containing proposals for the organization of the defenses system of the syberspace of the Republic of Poland.

(more available)
Added: October 24, 2018
image from 2016 Annual Security Report

2016 Annual Security Report

This report can help you learn how to become more resilient to new attacks and compete more safely in the digital age.

(more available)
Added: October 24, 2018
image from 2016 Cyber Threat Study

2016 Cyber Threat Study

This study, analyzes cyber threats from the years 2014 through 2016.

Added: October 24, 2018
image from 2016 Hacked Website Report Q2

2016 Hacked Website Report Q2

This is an annual report that discusses the latest malware and hacking trends in compromised websites.

Added: October 24, 2018
image from 2016 Outlook: Vulnerability Risk Management and Remediation Trends

2016 Outlook: Vulnerability Risk Management and Remediation Trends

This report, based on responses from nearly 200 IT and security practitioners surveyed, explores the current state of vulnerability risk management, the challenges that directly impact the remediation process, and the outlook for improvement in the coming year. In addition, compliance drivers and executive awareness of information security threats are considered to demonstrate their influence on effective vulnerability risk management.

(more available)
Added: October 24, 2018
image from 2017 Security Operations Center Survey

2017 Security Operations Center Survey

This report discusses the Security Operations Center and how it is being architected in organizations with some consensus on what should be done. The paper details the issues and problems that need to be resolved as this area of expertise continues to grow.

(more available)
Added: October 24, 2018
image from 2018 Global Threat Report:Blurring The Lines Between Statecraft and Tradecraft

2018 Global Threat Report:Blurring The Lines Between Statecraft and Tradecraft

The issues presented in this 2018 report are Targeted Intrusions, Criminal and Hacktivist Activity, and 2018 Predictions

Added: October 24, 2018
image from 2018 Phishing Trends And Intelligence Report: Hacking The Human

2018 Phishing Trends And Intelligence Report: Hacking The Human

The purpose of this report is to provide insight on significant industry trends, tools, and techniques being used by threat actors to carry out phishing attacks. It also sheds light on why shifts are occurring and what to expect in the coming year.

(more available)
Added: October 24, 2018
image from 6 Questions To Ask Before Implementing A Vulnerability Disclosure Program

6 Questions To Ask Before Implementing A Vulnerability Disclosure Program

This guide provides some thoughts about implementing a Vulnerability Disclosure Program.

Added: October 24, 2018
image from 7 Facts Every CISO Needs To Know About Open Source Security

7 Facts Every CISO Needs To Know About Open Source Security

This is an infographic that details things every CISO should know about Open Source Security.

Added: October 24, 2018
image from Cloud Security Trends Report Infographic February 2018

Cloud Security Trends Report Infographic February 2018

This is an infographic that summarizes the Redlock report of the same name.

Added: October 24, 2018
image from Cyber Espionage Is Alive And Well APT32

Cyber Espionage Is Alive And Well APT32

This blog post discusses APT32 and it’s targetting of global corporations for destruction.

Added: October 24, 2018
image from Cybercrime - Do You Have it Covered?

Cybercrime - Do You Have it Covered?

This paper looks at the cyber insurance market, the need for expert advice and the steps that organizations can take to ensure that they fully understand their own data risks and security vulnerabilities before taking out a policy.

(more available)
Added: October 24, 2018
image from Cybersecurity Insights Volume 2: The CEO's Guide To Securing The Internet Of Things

Cybersecurity Insights Volume 2: The CEO's Guide To Securing The Internet Of Things

This report tackles security issues related to the Internet Of Things.

Added: October 24, 2018
  • ««
  • «
  • 54
  • 55
  • 56
  • 57
  • 58
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 16, 2025 08:08 UTC (build b1d7be4)