Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from Security Intelligence Report Volume 20

Security Intelligence Report Volume 20

This report focuses on software vulnerabilities, software vulnerability exploits, malware, and unwanted software. It is the hope that readers find the data, insights, and guidance provided in this report useful in helping them protect their organizations, software, and users.

(more available)
Added: October 24, 2018
image from Shelltea + Poslurp Memory-Resident Point-Of-Sale Malware Attacks Industry

Shelltea + Poslurp Memory-Resident Point-Of-Sale Malware Attacks Industry

This paper discusses the specific issue of malware that attacks Point-Of-Sale systems.

Added: October 24, 2018
image from State Of CyberSecurity Implications For 2016

State Of CyberSecurity Implications For 2016

This paper is the presentation of data found through a survey administered in November and December of 2015.

Added: October 24, 2018
image from State of the Internet Security 3rd Quarter 2017

State of the Internet Security 3rd Quarter 2017

This is Akamai’s State of The Internet Security report from the third quarter of 2017

Added: October 24, 2018
image from The State Of Application Survey 2018

The State Of Application Survey 2018

Before slowing down development and causing customers to revolt, security and risk pros should read this report to understand the current state of application security and how emerging techniques support the speed your business needs.

(more available)
Added: October 24, 2018
image from Threat Advisory: betFIRST mobile apps

Threat Advisory: betFIRST mobile apps

This is a threat advisory for betFIRST mobile apps

Added: October 24, 2018
image from Threat Intelligence Executive Report 2018: Volume 1

Threat Intelligence Executive Report 2018: Volume 1

This Threat report details some early 2018 threats like cryoticurrency mining, hardware vulns, and government sponsored cyber threats.

Added: October 24, 2018
image from Understanding The Mobile Threat Landscape In 2018

Understanding The Mobile Threat Landscape In 2018

“2017 was a huge year for mobile security. Malicious actors returned with a vengeance and cyber attacks grew rapidly in sophistication. Ransomware outbreaks like WannaCry and Petya hit enterprises globally causing unparalleled disruption, new vulnerabilities like BlueBorne were discovered and malware variants grew more aggressive and prevalent by the day. This report will summarise the key mobile security trends that emerged in 2017, and summarise thoughts for the mobile threat landscape for the year ahead.”

(more available)
Added: October 24, 2018
image from Using cyber analytics to help you get on top of cybercrime: Third-generation Security Operations Centers

Using cyber analytics to help you get on top of cybercrime: Third-generation Security Operations Centers

As the threatscape continues to evolve rapidly in both sophistication and scale, the need to protect organizations’ intellectual property, operations, brand and shareholder value, in addition to their customers’ data, is ever more critical. But how do organizations build controls for the security risks they don’t even know about yet?

(more available)
Added: October 24, 2018
image from Web Application Firewalls:Securing Modern Web Applications

Web Application Firewalls:Securing Modern Web Applications

This report is intended to help you get up to speed on the latest developments in the WAF space, to better understand how you can incorporate and integrate WAF technology with your existing and planned technology deployments, including cloud, on-premises, and hybrid topologies.

(more available)
Added: October 24, 2018
image from When Next-Gen AV Meets EDR: Overpowering Advanced Threats

When Next-Gen AV Meets EDR: Overpowering Advanced Threats

Overpowering today’s attackers and responding to threats requires EDR plus NGAV. The bad guys treat all of an organization’s machines as possible entry points. EDR plus NGAV takes this concept and uses it to the defender’s advantage by using all of a company’s endpoints for protection.

(more available)
Added: October 24, 2018
image from Will 2018 Be Another Year Of Bankbots?

Will 2018 Be Another Year Of Bankbots?

This paper set out to study the inner workings of a bankbot because they predict we will see more bankbots in the future.

(more available)
Added: October 24, 2018
image from ZCash Ceremony And Audit

ZCash Ceremony And Audit

This report is based on a security audit of the opening ceremony of ZCash.

Added: October 24, 2018
image from 2015 Global Threat Report

2015 Global Threat Report

This year’s CrowdStrike Intelligence Global Threat Report contains a wealth of intelligence regarding adversary behavior, capabilities, and intentions. More importantly, it ties it back to the events that influenced those activities. By understanding the events that shape the beliefs and motivations of threat actors—regardless if they are criminal, nation-state, or hacktivist—it is possible to comprehend what drove the adversaries to behave as they did, and perhaps to understand what this will mean for the future.

(more available)
Added: October 23, 2018
image from 2015 PCI Compliance Report

2015 PCI Compliance Report

Subtitled “Insight for helping businesses manage risk through payment security”

Added: October 23, 2018
image from 2016 Cyber Security Intelligence Index

2016 Cyber Security Intelligence Index

This paper is an Analysis of cyber attack and incident data from IBM’s worldwide security services operations.

Added: October 23, 2018
image from 2016 Threat Predictions

2016 Threat Predictions

This report deals with predicting the cyber threat landscape for 2016 through 2020. It does this by looking back 5 years, and analyzing the past, and also talking to folks who make predictions for the 5 years in the future.

(more available)
Added: October 23, 2018
image from 2017 Hacked Website Report

2017 Hacked Website Report

This is an annual report that discusses the latest malware and hacking trends in compromised websites.

Added: October 23, 2018
image from 2017 Midyear Security Roundup: The Cost Of Compromise

2017 Midyear Security Roundup: The Cost Of Compromise

This report reviews the cyber security threats that occurred in the first half of 2017.

Added: October 23, 2018
image from 2017 Ransomware Defense Survey

2017 Ransomware Defense Survey

Some statistics that jump out from this report, 76% of respondents see ransomware as significant business threat, 52% rate their organizations at above average or superior when it comes to detecting or blocking ransomware before it locks or encrypts data in their systems, 57% say they are more likely to be a ransomware target in 2017.

(more available)
Added: October 23, 2018
image from 2018 Security Report

2018 Security Report

This report takes a look at 5 key trends that are shaping IT security practices, with findings that provide insight into customer challenges, threat actor behavior, and the global threat landscape.

(more available)
Added: October 23, 2018
  • ««
  • «
  • 56
  • 57
  • 58
  • 59
  • 60
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 14, 2025 12:09 UTC (build 0d9043b)