Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from Remote Control Interloper:Analyzing New Chinese htpRAT Malware Attacks Against ASEAN

Remote Control Interloper:Analyzing New Chinese htpRAT Malware Attacks Against ASEAN

This report discusses a new kind of Remote Access Trojan at use in ASIA, and looks at its connection with the Chinese Government.

(more available)
Added: October 21, 2018
image from SERT Quarterly Threat Report 2015

SERT Quarterly Threat Report 2015

“The SERT Quarterly Threat Report provides a glimpse inside the research conducted by Solutionary researchers, security professionals and analysts spanning the last three months and highlights the results of this research. In addition to a wide variety of open-source intelligence tools and honeypots, SERT also analyzes data from the Solutionary ActiveGuard platform. The patented, cloud-based Solutionary ActiveGuard service platform collects, correlates and analyzes security events across systems for Solutionary clients globally, providing researchers with an even deeper understanding of the overall threat landscape.”

(more available)
Added: October 21, 2018
image from Smartly Selected Infrastructure For GDPR Compliance

Smartly Selected Infrastructure For GDPR Compliance

This white paper will describe how the right infrastructure foundation can assist GDPR compliance, while contributing to your company’s stature in the digital age, as well as offer a checklist to ensure that new IT infrastructure purchases effectively support GDPR compliance.

(more available)
Added: October 21, 2018
image from State of the Internet - Security Q1 2017 report

State of the Internet - Security Q1 2017 report

This paper represents analysis and research based on data from Akamai’s global infrastructure and routed Distributed Denial of Service (DDoS) solution.

(more available)
Added: October 21, 2018
image from Stop Advanced Automated Attacks That Go Undetected

Stop Advanced Automated Attacks That Go Undetected

If you are interested in looking about Bots that go undetected, this paper is for you.

Added: October 21, 2018
image from Targeted Attacks: Why Are We Missing The Big Picture

Targeted Attacks: Why Are We Missing The Big Picture

This report takes a look at the reality that even though we spend lots of money to protect people from targeted attacks, they still continue to happen. Why are we missing the mark, and what can we change?

(more available)
Added: October 21, 2018
image from Tech Report:Targeted Attacks On Defense Industry

Tech Report:Targeted Attacks On Defense Industry

This report, based on case studies, outlines the recent trends of cyberattacks on the defense industry.

Added: October 21, 2018
image from Technical Analysis Report On Rowdy, A New Type Of IOT Malware Exploiting STB's

Technical Analysis Report On Rowdy, A New Type Of IOT Malware Exploiting STB's

This report offers a breakdown and analysis of the actions and behaviors of Rowdy, a new type of IoT Malware.

(more available)
Added: October 21, 2018
image from The Business Of Hacking

The Business Of Hacking

This paper will explore the business of hacking: the different ways people make money by hacking, the motivations, the organization. It will break down the businesses’ profitability and risk levels, and provide an overall SWOT analysis. From this, opportunities for disruption will be discussed and a competitive approach for disrupting the business of hacking will be laid out.

(more available)
Added: October 21, 2018
image from The Darknet Index: 2018 Black Hat Edition

The Darknet Index: 2018 Black Hat Edition

Notable declines in darknet exposure among black hat exhibitors, but does a risky darkint score correlate to share price performance?

(more available)
Added: October 21, 2018
image from The Life And Times Of Cybersecurity Professionals

The Life And Times Of Cybersecurity Professionals

This paper examines the life of those in the cybersecurity profession, and seeks to provide answers to the high turnover rate in the field.

(more available)
Added: October 21, 2018
image from The Rising Strategic Risks of Cyberattacks

The Rising Strategic Risks of Cyberattacks

Research by McKinsey and the World Economic Forum points to a widening range of technology vulnerabilities and potentially huge losses in value tied to innovation.

(more available)
Added: October 21, 2018
image from The Tao Of Mobile App DevSecOps: Building A Mobile App Sec Factory

The Tao Of Mobile App DevSecOps: Building A Mobile App Sec Factory

This report seeks to aid the reader in developing a better way to create apps and not compromise on security.

(more available)
Added: October 21, 2018
image from Threat Advisory: Thomas Cook (India) Ltd. Mobile Apps And Website

Threat Advisory: Thomas Cook (India) Ltd. Mobile Apps And Website

This is a threat advisory for Thomas Cook Ltd. Mobile Apps & Website

Added: October 21, 2018
image from TPM Genie: Interposer Attacks Against the Trusted Platform Module Serial Bus

TPM Genie: Interposer Attacks Against the Trusted Platform Module Serial Bus

This report provides an analysis of TPM Genie. TPM Genie is a serial bus interposer which has been designed to aid in the security research of Trusted Platform Module hardware. The tool demonstrates that a man-in- the-middle on the TPM serial bus can undermine many of the stated purposes of the TPM such as measured boot, remote attestation, sealed storage, and the hardware random number generator.

(more available)
Added: October 21, 2018
image from US Senate Subcomittee On Data Security And Bug Bounties

US Senate Subcomittee On Data Security And Bug Bounties

This is a transcript of a February 2018 US Senate meeting that discussed Data Security and the hacking community.

Added: October 21, 2018
image from Virtualization Makes CIOs Role Key

Virtualization Makes CIOs Role Key

An October 2016 Bitdefender survey of 250 IT decision makers in the United States in companies with more than 1,000 PCs, shows they will rise in companies’ hierarchies, as CEOs and board members face increasing internal and external security risks that could ruin customer trust and business forecasts. Still, not all C-suites include CIOs/CISOs in the business decision-making process. This survey, carried out by iSense Solutions, shows how IT decision makers perceive their role inside the organizations and what they need to meet shareholder expectations. How has virtualization changed the security game? How many attacks can be stopped with the current resources? Would they pay to avoid public shaming?

(more available)
Added: October 21, 2018
image from WAF And DDoS:Perfect Bedfellows

WAF And DDoS:Perfect Bedfellows

This short article discusses why a marriage between WAF and DDoS is a good idea.

Added: October 21, 2018
image from 2017 Cyberthreat Defense Report

2017 Cyberthreat Defense Report

This report hopes to help IT security decision makers gain a better understanding of how their perceptions, concerns, priorities, and defenses stack up against those of other IT security professionals and their organizations. Applied constructively, the data, analyses, and findings covered here can be used by diligent IT security teams to shape answers to many important questions.

(more available)
Added: October 20, 2018
image from 2017 Ransomware Defense Survey Report: The Enterprise Strikes Back

2017 Ransomware Defense Survey Report: The Enterprise Strikes Back

This report provides complete survey reports, expert analysis, and thoughts from leading experts in the field.

Added: October 20, 2018
image from 2017 State of Security Operations

2017 State of Security Operations

In this fourth annual State of Security Operations report, Hewlett Packard Enterprise provides updates to the current and emerging capabilities, best practices, and performance levels of security operations as learned from the assessment of organizations around the globe.

(more available)
Added: October 20, 2018
  • ««
  • «
  • 62
  • 63
  • 64
  • 65
  • 66
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 15, 2025 20:12 UTC (build 0d9043b)