Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from Data Breach Industry Forecast

Data Breach Industry Forecast

This paper outlines five predictions for the data breach industry in the coming year.

Added: October 17, 2018
image from DDoS Test Methodology For Reliable Network Security

DDoS Test Methodology For Reliable Network Security

This paper lays out a testing methodology for organizations to dermine if they are prepared to handle DDoS attacks.

Added: October 17, 2018
image from DDoS Threat Report Q1 2018

DDoS Threat Report Q1 2018

This report takes a look at the DDoS threats that occurred in the first quarter of 2018.

Added: October 17, 2018
image from Digital Souks: Middle Eastern and North African Underground

Digital Souks: Middle Eastern and North African Underground

Trend Micro researchers’ in-depth explorations of the cybercriminal underworld— from Germany1, Brazil2, Japan3, North America4, and China5 to Russia6—have shown how financial gain motivates the way malware, crimeware, personally identifiable information (PII), and stolen commodities change hands. While their marketplaces are profit-driven and focused on flaunting their wares, we observed that the Middle Eastern and North African (MENA) underground was somewhat different with its ironic mix of ideology and felony.

(more available)
Added: October 17, 2018
image from Exploring Cyber Security Policy Options In Australia

Exploring Cyber Security Policy Options In Australia

In December 2016, RAND and the National Security College at The Australian National University partnered to facilitate a cyber security–focused 360o Discovery Exercise in Canberra. The exercise used plausible scenarios to explore the chal- lenges Australia faces in securing cyberspace by placing pres- sure on government authorities, industry capabilities, users’ tolerance for malicious cyber activity, and the ability to develop interdisciplinary solutions to pressing cyber security challenges. The scenarios considered the security of the Internet of Things and intellectual property theft against a backdrop of evolving international norms of behaviour in cyberspace.

(more available)
Added: October 17, 2018
image from GTIC Monthly Threat Report January 2018

GTIC Monthly Threat Report January 2018

This monthly threat report takes a look at the month of January 2018. Specifically, it looks at two VULNS, the hacking of nuclear weapons, and the increase in suspected Chinese Cyber activity.

(more available)
Added: October 17, 2018
image from Honeypot InfoGraphic

Honeypot InfoGraphic

Armor created a honeypot for a hypothetical SMB healthcare organization. This infographic provides key findings for the attack traffic the honey pot saw during its operation.

(more available)
Added: October 17, 2018
image from Incident Response For Android And iOS

Incident Response For Android And iOS

This book will prepare enterprises and practitioners for the inevitable increase in mobile compromise. We will use step-by-step tutorials, guiding the reader from setting up a mobile IR practice all the way through continuous monitoring of mobile devices.

(more available)
Added: October 17, 2018
image from Looking ahead: SophosLabs 2017 malware forecast

Looking ahead: SophosLabs 2017 malware forecast

In this report, they review malicious activity SophosLabs analyzed and protected customers against last year and use the findings to paint a picture for 2017.

(more available)
Added: October 17, 2018
image from Matty McMattface:Security Implications, Mitigations & Testing Strategies For BioMetric Facial Recognition Services

Matty McMattface:Security Implications, Mitigations & Testing Strategies For BioMetric Facial Recognition Services

This paper discusses the security issues related to biometric facial recognition applications.

Added: October 17, 2018
image from Mcafee Labs Threats Report September 2017

Mcafee Labs Threats Report September 2017

In this quarterly threats report, they highlight three Key Topics: In the lead story, they analyze the recent WannaCry and Petya attacks, the perpetrators’ likely motives, and the business impact. The second Key Topic departs from their usual threat analysis stories. Because threat hunting is becoming increasingly important, in this story they offer detailed advice and recommendations for using certain types of indicators of compromise when hunting for threats. In the final Key Topic, they explore script-based malware—why it is used, how authors obfuscate scripts, how it propagates, and its growth in popularity.

(more available)
Added: October 17, 2018
image from Mobile Data Report

Mobile Data Report

This report pays particular attention to the state of mobile security in law firms.

Added: October 17, 2018
image from OWASP Top 10 2017 A Flash Card Guide

OWASP Top 10 2017 A Flash Card Guide

This is a fun little infographic that provides information on the top threats of 2017.

Added: October 17, 2018
image from Partnering for Cyber Resilience Towards the Quantification of Cyber Threats

Partnering for Cyber Resilience Towards the Quantification of Cyber Threats

This report seeks to identify key components toward a framework to cyber risk modeling and qualifying and quantifying known vulnerabilities in defenses, while providing macro-systemic guidance.

(more available)
Added: October 17, 2018
image from Past And Present Of Underground Network Industry

Past And Present Of Underground Network Industry

This document presents the definition, category, means, and examples of the underground network industry, as well as protection measures.

Added: October 17, 2018
image from Payment Security Report 2015

Payment Security Report 2015

This report concerns itself with the standards and practices related to credit and debit card payment options.

Added: October 17, 2018
image from Qaurterly Threat Report Q! 2017

Qaurterly Threat Report Q! 2017

The Proofpoint Quarterly Threat Report captures threats, trends and transformations we see within our customer base and in the wider security market.

(more available)
Added: October 17, 2018
image from Rise of the Machines: The Dyn Attack Was Just a Practice Run

Rise of the Machines: The Dyn Attack Was Just a Practice Run

This report uses the impact of the Mirai botnet, to help stakeholders prevent future incidents by addressing the lack of security-by-design in the Internet-of-things and in the Internet itself.

(more available)
Added: October 17, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report October 2016

SecureWorks Threat Intelligence Executive Monthly Report October 2016

This report from October 2016 takes a look at the Mirai botnet, VULNS, breach responses, and some new security initiatives.

(more available)
Added: October 17, 2018
image from Securing IoT Medical Devices: A Guide For Device Manufacturers And Medical Professionals

Securing IoT Medical Devices: A Guide For Device Manufacturers And Medical Professionals

This guide provides an overview of connected or IoT medical devices, their benefits and risks, real life use cases and best practice security guidelines.

(more available)
Added: October 17, 2018
image from Security Response: The Evolution of Ransomware

Security Response: The Evolution of Ransomware

This report takes a look at how the ransomware types work, not just from a technological point of view but also from a psychological viewpoint. They also look at how these threats evolved, what factors are at play to make ransomware the major problem that it is today, and where ransomware is likely to surface next.

(more available)
Added: October 17, 2018
  • ««
  • «
  • 70
  • 71
  • 72
  • 73
  • 74
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 00:08 UTC (build b1d7be4)