Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from Privileged Access Security For Dummies

Privileged Access Security For Dummies

This is a handy and simple guide for helping individuals understand and implement Privileged Access Security.

Added: October 22, 2018
image from Quarterly Report Q3 2017

Quarterly Report Q3 2017

This is a quarterly report that looks at cyber security issues in New Zealand and around the world.

Added: October 22, 2018
image from Quarterly Threat Report Q4 2017

Quarterly Threat Report Q4 2017

This quarterly report offers key takeaways from the fourth quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 22, 2018
image from Regional Advanced Threat Report: Asia Pacific H1 2015

Regional Advanced Threat Report: Asia Pacific H1 2015

This report discusses trends in the cyber security environment in Asia Pacific from January to June 2015.

Added: October 22, 2018
image from SamSam Ransomware Chooses Its Targets Carefully

SamSam Ransomware Chooses Its Targets Carefully

This report takes a look at the SamSam ransomware. A ransomware that unlike most ransomware, goes after specific organizations.

Added: October 22, 2018
image from Sensitive Data At Risk:The SANS 2017 Data Protection Survey

Sensitive Data At Risk:The SANS 2017 Data Protection Survey

This report is based on a survey that sought to see how organizations were protecting their data.

Added: October 22, 2018
image from Social Engineering:How The Human Factor Puts Your Company At Risk

Social Engineering:How The Human Factor Puts Your Company At Risk

Positive Technologies regularly performs assessment of information security awareness among employees at major companies all over the world. This report provides statis- tics and analysis from 10 most instructive testing projects in 2016 and 2017, including examples of successful attacks against employees. These projects are based on various social engineering techniques and generally included emails, phone conversations, and communication via social networks.

(more available)
Added: October 22, 2018
image from State of the Internet Security 2nd Quarter 2017

State of the Internet Security 2nd Quarter 2017

This is Akamai’s State of The Internet Security report from the second quarter of 2017

Added: October 22, 2018
image from The Current State Of Mobile Malware

The Current State Of Mobile Malware

This report will take you through the most common malware infection vectors, the different types of mobile malware currently plaguing organizations, and how to take the appropriate steps to protect your mobile estate.

(more available)
Added: October 22, 2018
image from The Four Types Of Threat Detection

The Four Types Of Threat Detection

There is a considerable amount of market confusion around the types of threat detection, how they are derived, and the uses for each. The purpose of this paper is to address those challenges by identifying the four types of threat detection and offering sample use-cases focused on industrial control system (ICS) and industrial internet of things (IIoT) environments.

(more available)
Added: October 22, 2018
image from The Nervous, The Vigilant, And The Battle-Scarred: IT Security Personas Revealed

The Nervous, The Vigilant, And The Battle-Scarred: IT Security Personas Revealed

This book offers some insight into email cybersecurity issues. It posits that email doesn’t have to be scary.

Added: October 22, 2018
image from The Surge Of Cyber Threats: What Higher Education Needs To Know

The Surge Of Cyber Threats: What Higher Education Needs To Know

This report takes a specific look at cyber threats on the campuses of higher learning facilities.

Added: October 22, 2018
image from Threat Advisory: Ticketac Mobile Apps

Threat Advisory: Ticketac Mobile Apps

This is a threat advisory for Ticketac Mobile Apps

Added: October 22, 2018
image from Understanding Cyber RIsk Management vs Uncertainty With Confidence

Understanding Cyber RIsk Management vs Uncertainty With Confidence

This white paper provides an analysis of Risk Management and overcoming uncertainty.

Added: October 22, 2018
image from 2017 Internet Security Threat Report, Volume 22

2017 Internet Security Threat Report, Volume 22

Symantec has established the largest civilian threat collection network in the world, and through that has developed the Symantec Global Intelligence Network. Through that development comes this report based on their experiences in 2016.

(more available)
Added: October 21, 2018
image from 2017 Security Annual Volume 2 - Luminary Interviews

2017 Security Annual Volume 2 - Luminary Interviews

This paper provides interviews with a variety of well known individuals in the cyber security industry.

Added: October 21, 2018
image from 2017 State Of Cybercrime

2017 State Of Cybercrime

The goal of this report is to help all organizations better protect themselves from current and emerging cyber threats; to help make them become smarter and safer.

(more available)
Added: October 21, 2018
image from 2018 Cyber Threat Intelligence Estimate

2018 Cyber Threat Intelligence Estimate

This report is based on security digital footprint assessments conducted in 2017. It offers predictions for 2018 and analysis of 2017.

(more available)
Added: October 21, 2018
image from 6 Key Security Requirements for Next Generation Mobile Networks

6 Key Security Requirements for Next Generation Mobile Networks

Mobile network operators (MNOs) are evolving rapidly to deploy transformative networks—4G, 5G, SDN/NFV. Meanwhile they are battling a new and different cyber attack landscape that could compromise BOTH their networks AND their subscribers. Network and subscriber protection are no longer separate problems in this new digital age. Legacy security solutions are inadequate. A new approach to security is needed—with a focus on PREVENTION —not just a reaction to prior known threats. Adopting a prevention posture enables operators to get ahead of the evolving sophistication of attackers.

(more available)
Added: October 21, 2018
image from Application Security Statistics Report 2017

Application Security Statistics Report 2017

This is the 12th annual WhiteHat Security Statistics Report. This year they’ve added some real metrics around DevSecOps. They’ve also added a new SAST section and a mobile security section.

(more available)
Added: October 21, 2018
image from Cryptocurrency Mining Malware

Cryptocurrency Mining Malware

This e-book provides a helpful analysis of malware that mines cryptocurrency.

Added: October 21, 2018
  • ««
  • «
  • 60
  • 61
  • 62
  • 63
  • 64
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 15, 2025 12:12 UTC (build 0d9043b)