Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from Into The Web Of Profit

Into The Web Of Profit

This book provides excellent research and an in-depth study of cybercrime criminals and money.

Added: October 18, 2018
image from Making Threat Intelligence Actionable

Making Threat Intelligence Actionable

From the report, “AED is an acronym we‘ve coined, short for “Acquire, Enrich, Detect.” It describes the process we use internally to collect threat intelligence and actualize our ability to identify when networks are under attack. We do this in the shortest possible time, with the highest degree of confidence, by looking ONLY at the raw network traffic.”

(more available)
Added: October 18, 2018
image from Managing IoT In Higher Education

Managing IoT In Higher Education

This paper examines the struggle that Universities and Campuses have with students and the Interent Of Things.

Added: October 18, 2018
image from Mobile Data Report

Mobile Data Report

This report looks at data from the mobile estates of global asset management and investment firms; providing analysis, benchmarking and best practice guidance on keeping mobile devices secure and managing data consumption.

(more available)
Added: October 18, 2018
image from Mobile Threat Detection Through Machine Learning

Mobile Threat Detection Through Machine Learning

This paper is subtitled “Discover the ideal technology dor detecting unknown, zero-day mobile threats.

Added: October 18, 2018
image from National Security Leadership Recommendations: Cybersecurity Imperative

National Security Leadership Recommendations: Cybersecurity Imperative

From the report, “When it comes to the increasing cybersecurity risk faced by commercial companies, leaders in government, private enterprise and academia express varying opinions. However, a common thread is a shared sense that leaders feel overwhelmed by the growing threats and see a lack of focus and commitment to basic — but often difficult — principles across their operations. Many people, including those at organizations’ highest levels, assume cybersecurity has become a problem we cannot fix. But we can.”

(more available)
Added: October 18, 2018
image from Network Attached Security Attacking A Synology NAS

Network Attached Security Attacking A Synology NAS

Network-Attached Storage (NAS) devices are a popular way for people to store and share their photos, videos and documents. Securing these devices is essential as they can contain sensitive information and are often exposed to the Internet. Because Synology is one of the top manufacturers of NAS devices, this paper chose to analyze a Synology DS215j. In doing so it identifies a number of exploitable security flaws. In this paper, they discuss in detail the analysis performed, methodologies used, and vulnerabilities found during the summer of 2015.

(more available)
Added: October 18, 2018
image from Phishing Reference Guide

Phishing Reference Guide

This very well put together report takes a look at phishing attacks and how they can be avoided.

Added: October 18, 2018
image from Protected Health Information Data Breach Report

Protected Health Information Data Breach Report

Here are some quick facts about this report and what they tell us about the issues that the healthcare industry as a whole needs to address: 58% of incidents involved insiders—healthcare is the only industry in which internal actors are the biggest threat to an organization. Medical device hacking may create media hype but the assets most often affected in breaches are databases and paper documents. Ransomware is the top malware variety by a wide margin. 70% of incidents involving malicious code were ransomware infections. Basic security measures are still not being implemented. Lost and stolen laptops with unencrypted PHI continue to be the cause of breach notifications.

(more available)
Added: October 18, 2018
image from Quarterly Threat Report Q1 2018

Quarterly Threat Report Q1 2018

This Quarterly report offers key takeaways from the first Quarter of 2018. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 18, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report September 2016

SecureWorks Threat Intelligence Executive Monthly Report September 2016

This report from September 2016 takes a look at Firewall VULNS, RIG Popularity, diversified ransomware, POS System attacks, and a few other specific threats.

(more available)
Added: October 18, 2018
image from Security Bulletin 2016

Security Bulletin 2016

Drama, intrigue and exploits have plagued 2016 and, as we take stock of some of the more noteworthy stories, we once again cast our gaze forward to glean the shapes of the 2017 threat landscape. Rather than thinly-veiled vendor pitching, we hope to ground these predictions in trends we’ve observed in the course of our research and provide thought-provoking observations for researchers and visitors to the threat intelligence space alike.

(more available)
Added: October 18, 2018
image from Security Response: The Waterbug Attack Group

Security Response: The Waterbug Attack Group

This report takes a look at the Waterbug Attack Group and their impact in 2016.

Added: October 18, 2018
image from SiliVaccine: Inside North Korea's AntiVirus

SiliVaccine: Inside North Korea's AntiVirus

This article provides exclusive insight into North Korea’s Anti-Virus program.

Added: October 18, 2018
image from State of Software Security Volume 7

State of Software Security Volume 7

Veracode’s intention is to provide security practitioners with tangible AppSec benchmarks with which to measure their own programs against. They’ve sliced and diced the numbers to offer a range of perspectives on the risk of applications throughout the entire software lifecycle. This includes statistics on policy pass rates against security standards, the statistical mix of common vulnerability types found in applications, flaw density and average fix rate.

(more available)
Added: October 18, 2018
image from Stormshield Endpoint Monitoring Review 2017

Stormshield Endpoint Monitoring Review 2017

This infographic provides an analysis of the types of events that occurred in 2017 for this particular Endpoint Security provider.

(more available)
Added: October 18, 2018
image from The Cyber Resilient Organization: Learning to Thrive against Threats

The Cyber Resilient Organization: Learning to Thrive against Threats

Are businesses ready today to face cyber threats head on? To find out, Ponemon Institute, with sponsorship from Resilient, an IBM Company, surveyed 623 IT and IT security practitioners about their organizations’ approach to becoming resilient to security threats. The findings are presented in this study.

(more available)
Added: October 18, 2018
image from The Defender’s Advantage: Using the Attack Lifecycle to Detect TTPs

The Defender’s Advantage: Using the Attack Lifecycle to Detect TTPs

Don’t let Hollywood fool you: carrying out an attack doesn’t resemble the plot of an action movie. Attackers don’t automatically breach a network, immediately locate the information they want and then swiftly exit the organization. Attacks are complicated operations that unfold over multiple steps and take time, weeks and oftentimes months to achieve the desired goals.

(more available)
Added: October 18, 2018
image from The Economic Impact of Cybercrime and Cyber Espionage

The Economic Impact of Cybercrime and Cyber Espionage

This report seeks to answer the following question, “Is cybercrime, cyber espionage, and other malicious cyber activities what some call “the greatest transfer of wealth in human history,” or is it what others say is a “rounding error in a fourteen trillion dollar economy?””

(more available)
Added: October 18, 2018
image from The Hacker-Powered Security Report 2017

The Hacker-Powered Security Report 2017

This report examines the broadest platform data set available and explains why organizations like General Motors, Starbucks, Uber, the U.S. Department of Defense, Lufthansa, and Nintendo have embraced continuous, hacker-powered security.

(more available)
Added: October 18, 2018
image from The Power To Coerce: Countering Adversaries Without Going To War

The Power To Coerce: Countering Adversaries Without Going To War

With the limits of both hard military power and soft power in mind, we set out to explore the space in between: nonmilitary ways of coercing, deterring, weaken- ing, and punishing those that threaten peace, security, and U.S. inter- ests. This examination was part of a project for the Army Quadren- nial Defense Review Office called Hard Security. This report presents alternate approaches to securing U.S. interests that complement hard security and potentially make it more effective.

(more available)
Added: October 18, 2018
  • ««
  • «
  • 68
  • 69
  • 70
  • 71
  • 72
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 08:08 UTC (build b1d7be4)