Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from Next-Gen Endpoint Risks And Protections: A SANS Survey

Next-Gen Endpoint Risks And Protections: A SANS Survey

This newly released SANS survey suggests the need to broaden the definition of endpoint to include the user. The two most common forms of attacks reported are browser-based attacks and social engineering, both of which are directed at users, not technology. Download this survey report to learn other key issues surrounding endpoint protection.

(more available)
Added: October 23, 2018
image from Prepare For Battle:Building An Incident Response Plan

Prepare For Battle:Building An Incident Response Plan

This report provides a walkthrough of creating an Incident Response Plan.

Added: October 23, 2018
image from Quarterly Report Q4 2017

Quarterly Report Q4 2017

This is a Quarterly Report that looks at Cyber security issues in New Zealand and around the world.

Added: October 23, 2018
image from Quarterly Threat Summary Q1 2016

Quarterly Threat Summary Q1 2016

This Quarterly report offers key takeaways from the first Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 23, 2018
image from Security In The Golden Age Of Cybercrime

Security In The Golden Age Of Cybercrime

This paper offers insight into an exploration of network cybersecurity in the U.S. Federal Government.

Added: October 23, 2018
image from Security Intelligence Report Volume 19

Security Intelligence Report Volume 19

This report focuses on software vulnerabilities, software vulnerability exploits, malware, and unwanted software. It is the hope that readers find the data, insights, and guidance provided in this report useful in helping them protect their organizations, software, and users.

(more available)
Added: October 23, 2018
image from State of the Internet - Security Q3 2016 report

State of the Internet - Security Q3 2016 report

In the Akamai State of the Internet - Security Report, you’ll get detailed cloud security insights about DDoS and web application attack trends observed across the Akamai Intelligent Platform™ for Q3 2016.

(more available)
Added: October 23, 2018
image from The IR Boost: How Threat Hunting Enhances Incident Response

The IR Boost: How Threat Hunting Enhances Incident Response

Whether it’s referred to as threat hunting or hunt teaming, companies are increasingly taking a proactive approach to security by looking for evidence of threats that are already in their environments. Organizations have realized that waiting for antivirus, SIEMs and other security solutions to trigger an alert is not a practical approach to detecting sophisticated and stealthy adversaries since they know how to evade these tools. Hunting enables security teams to proactively answer the question “Am I under attack?”

(more available)
Added: October 23, 2018
image from The ROPEMAKER Email Exploit

The ROPEMAKER Email Exploit

This threat advisory offers insight into the ROPEMAKER Email Exploit.

Added: October 23, 2018
image from The Universal Gap In Preventing Breaches: Leak Path Detection And Mitigation

The Universal Gap In Preventing Breaches: Leak Path Detection And Mitigation

This paper takes a look at the best way to prevent breaches, by detecting and mitigating leaks.

Added: October 23, 2018
image from Threat Intelligence Executive Report 2017: Volume 1

Threat Intelligence Executive Report 2017: Volume 1

This Threat Report takes a look at some of the events of Early 2017. Specifically, it looks at how weak and outdated software enabled breaches, threats leveraged legitimate features, threat groups targeted organizations for espionage, and Shamoon wiper malware re-emerged.

(more available)
Added: October 23, 2018
image from Understanding The Insider Threat And How To Mitigate It

Understanding The Insider Threat And How To Mitigate It

This paper is intended to give a high-level view on the insider threat for those looking to implement a defensive programme. It considers the types of attack that may take place and some of the common weaknesses that aid insider attacks. It also covers some of the policies and controls that can be implemented to detect, deter or defend against the insider threat. This paper is intended to be a summary, however, the final section details further reading and resources that provide more in-depth information.

(more available)
Added: October 23, 2018
image from Web Application Attack Statistics Q4 2017

Web Application Attack Statistics Q4 2017

This report provides statistics on attacks performed against web applications during the fourth quarter of 2017.

Added: October 23, 2018
image from What A Hacker Sees: Top 20 CIS Critical Security Controls

What A Hacker Sees: Top 20 CIS Critical Security Controls

This paper discusses the top 20 Center for Internet Security (CIS) Critical Security Controls (CSC) come into play, providing organizations with 20 key controls that they can implement to mitigate some of the threats they are facing.

(more available)
Added: October 23, 2018
image from Winning The War On Ransomware

Winning The War On Ransomware

This is an infographic that can help your organization understand and win the war on Ransomware.

Added: October 23, 2018
image from 2015 Data Breach Investigations Report

2015 Data Breach Investigations Report

Verizon’s annual report on all data breaches in 2015

Added: October 22, 2018
image from 2016 Global Threat Report

2016 Global Threat Report

The Forcepoint 2016 Global Threat Report is a definitive breakdown of many of today’s most impactful cybersecurity threats with far-reaching technical, operational and cost impacts on affected organizations. Each section of this report closes with guidance from the Forcepoint Security Labs team on how to best address the outlined threat(s).

(more available)
Added: October 22, 2018
image from 2017 Annual Threat Report

2017 Annual Threat Report

The object of this report is to answer the question, what will happen in 2018?

Added: October 22, 2018
image from 2017 Annual Threat Report

2017 Annual Threat Report

The goal of the SonicWall Annual Threat Report is to define the cybersecurity battlefield in order to enable companies and individuals around the world to mount an impenetrable defense in 2017 and beyond.

(more available)
Added: October 22, 2018
image from 2017 Cybersecurity Threat Insights Report For Leaders

2017 Cybersecurity Threat Insights Report For Leaders

From the report, “When we set out to develop a report based on our 163 incident response client engagements over the course of the first half (H1) of 2016, we captured empirical data on type of threats, affected industries, and initial access vectors that threats use. However, we went back to the drawing board to ask ourselves, “What do organizations challenged by cyber threats and cyber risk actually need to know?” As a result, this report takes the form of an advisory aimed at jarring Security and C-Suite leaders just enoug to evoke positive action and a recalibration of their approaches to security.”

(more available)
Added: October 22, 2018
image from 2017 Security Report

2017 Security Report

This report takes a look at the last 20 years of IT development, and the issues and trends that have taken place in 2017.

(more available)
Added: October 22, 2018
  • ««
  • «
  • 58
  • 59
  • 60
  • 61
  • 62
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 15, 2025 00:12 UTC (build 0d9043b)