Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from ISP DDoS Protection May Not Cover All Bases

ISP DDoS Protection May Not Cover All Bases

This short article gives a 10 reasons why an ISP’s DDoS Protection may not be able to actually protect an organization.

(more available)
Added: October 20, 2018
image from JWT Handbook

JWT Handbook

Ever wondered how JWT came to be and what problems it was designed to tackle? Are you curious about the plethora of algorithms available for signing and encrypting JWTs? Or are you interested in getting up-to-speed with JWTs as soon as possible? Then this handbook is for you.

(more available)
Added: October 20, 2018
image from Mobile Phishing Report 2018

Mobile Phishing Report 2018

This whitepaper looks at the evolution of mobile phishing - examining why and how people get phished. It explores the prevalence and severity of enterprise phishing techniques, providing actionable advice for how best to protect your mobile device fleet.

(more available)
Added: October 20, 2018
image from Prepare For The Growing Threats Of Mobile Security

Prepare For The Growing Threats Of Mobile Security

This review of the events of 2016, seeks to offer insight into the future of 2017.

Added: October 20, 2018
image from Quarterly Threat Report Q2 2018

Quarterly Threat Report Q2 2018

A review of the threat trends from the second quarter of 2018 as seen via ProofPoint’s detection network.

Added: October 20, 2018
image from Ransomware As A Service (RaaS): Deconstructing Philadelphia

Ransomware As A Service (RaaS): Deconstructing Philadelphia

This report provides a thorough analysis of Philadelphia, a a chilling example of ransomware as a service.

Added: October 20, 2018
image from Ransomware: Many Victims Few Solutions Infographic

Ransomware: Many Victims Few Solutions Infographic

This infographic takes a look at Ransomware and provides a brief overview of discusses some solutions.

Added: October 20, 2018
image from Secure Mobile Development Best Practices

Secure Mobile Development Best Practices

This guide gives specific recommendations to use during your development process. The descriptions of attacks and security recommendations in this report are not exhaustive or perfect, but you will get practical advice that you can use to make your apps more secure.

(more available)
Added: October 20, 2018
image from State of the Internet - Security Q1 2016 report

State of the Internet - Security Q1 2016 report

Get detailed cloud security insights about DDoS and web application attack trends observed across the Akamai Intelligent Platform™ for Q1 2016. Highlights include: 1) A 23% increase in DDoS attacks and a 26% increase in web application attacks, compared with Q4 2015, setting new records for the number of attacks in the quarter 2) The rise in repeat DDoS attacks, with an average of 29 attacks per targeted customer – including one customer who was targeted 283 times 3) The continued rise in multi-vectored attacks (56% of all DDoS attacks mitigated in Q1 2016), making mitigation more difficult

(more available)
Added: October 20, 2018
image from Swearing Trojan Overview

Swearing Trojan Overview

This is an overview of the Swearing Trojan infecting mobile banking.

Added: October 20, 2018
image from The 2017 Global Threat Landscape Report

The 2017 Global Threat Landscape Report

“This report is based exclusively on information collected via a wide range of security services within GravityZone: Security for Virtualized Environments, Security for Endpoints, Security for Mobile and Security for Exchange, consumer-oriented products such as Bitdefender Antivirus, Bitdefender Internet Security or Bitdefender Total Security, as well as from Bitdefender BOX, the innovative solution for protecting devices in the IoT space.”

(more available)
Added: October 20, 2018
image from The 2018 Hacker Report

The 2018 Hacker Report

This report is a kind of dossier on the hacker community. It lets you in to their world, to know their mindset, and thoughts on the bug bounty community.

(more available)
Added: October 20, 2018
image from The Future Of Political Warfare: Russia, The West, And The Coming Age Of Digital Competition

The Future Of Political Warfare: Russia, The West, And The Coming Age Of Digital Competition

This paper outlines the current state of play in political warfare, identifies emerging threats, and proposes potential policy responses. It argues for greater information sharing mechanisms between trans-Atlantic governments and the private sector, greater information security and transparency, and greater investments in research and development on AI and computational propaganda. As authoritarian regimes seek to undermine democratic institutions, Western societies must harness their current— though fleeting—competitive advantage in technology to prepare for the next great leap forward in political warfare.

(more available)
Added: October 20, 2018
image from The Ransomware Economy

The Ransomware Economy

This paper discusses the How and Why the Dark Web Marketplace for Ransomware Is Growing at a Rate of More Than 2,500% Per Year

(more available)
Added: October 20, 2018
image from The State of CyberSecurity: Professional Careers

The State of CyberSecurity: Professional Careers

The data presented here illustrates an escalating and dangerous game of cyber security “cat and mouse.” Cyber- adversaries continue to develop creative tactics, techniques, and procedures (TTPs) for attacks. Recognizing the risk, large and small organizations are prioritizing and investing in cyber security defenses and oversight.

(more available)
Added: October 20, 2018
image from Threat Advisory: The Fork

Threat Advisory: The Fork

This is a threat advisory for The Fork

Added: October 20, 2018
image from Threat Visibility And Cybersecurity Management

Threat Visibility And Cybersecurity Management

This paper seeks to discuss the weaknesses of cybersecurity management.

Added: October 20, 2018
image from Vulnerability Review

Vulnerability Review

The annual Vulnerability Review analyzes the evolution of software security from a vulnerability perspective. The review presents global data on the prevalence of vulnerabilities and the availability of patches, maps the security threats to IT infrastructures, and also explores vulnerabilities in the 50 most popular applications on private PCs.

(more available)
Added: October 20, 2018
image from Web Attack Survival Guide

Web Attack Survival Guide

This guide provides a playbook for helping a company prepare for and handle web attacks.

Added: October 20, 2018
image from Website Security Statistic Report

Website Security Statistic Report

From the report, “Rather than provide a lengthy analysis of the data in this Stats Report in this introduction, we’ve decided instead to provide some “what this means to you” commentary at the end of the three main sections of the report; commentary that attempts to make the data relevant to Executives, Security practitioners and DevOps professionals. Security is a concern that spans multiple teams in an organization – from the board and C-suite, to IT and development teams, to the security team and beyond – and the data in this report will mean different things to these different audiences.”

(more available)
Added: October 20, 2018
image from Western European Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In Western Cities

Western European Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In Western Cities

This paper takes a look at the cities of the west, and the cyber threats that occurred there.

Added: October 20, 2018
  • ««
  • «
  • 64
  • 65
  • 66
  • 67
  • 68
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 16, 2025 04:13 UTC (build 0d9043b)