Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from The Case For Software Security

The Case For Software Security

This E-book discusses the importance of securing software.

Added: October 17, 2018
image from The Evolution Of Network Access Control

The Evolution Of Network Access Control

This whitepaper discusses the growing network security issues caused by IoT, BYOD, and other issues occuring in cyber technology.

Added: October 17, 2018
image from The Rising Face of Cybercrime: Ransomware

The Rising Face of Cybercrime: Ransomware

In this Report, researchers analyzed the growing trend of ransomware across nearly 20,000 companies to identify common forms of ransomware, and identify which industries are most susceptible to these types of attacks.

(more available)
Added: October 17, 2018
image from Threat Advisory: SkyDemon Mobile Apps & Website

Threat Advisory: SkyDemon Mobile Apps & Website

This is a threat advisory for SkyDemon Mobile Apps & Website.

Added: October 17, 2018
image from Threat Landscape Report Q3 2017

Threat Landscape Report Q3 2017

This is a quarterly report that looks at the current cubery security threats from each quarter.

Added: October 17, 2018
image from Toolkits, Apps, And Services Used Today To Launch DDoS Attacks

Toolkits, Apps, And Services Used Today To Launch DDoS Attacks

This small report gives a analysis of DDoS attacks and how they are launched and deployed.

Added: October 17, 2018
image from Top Six Things To Consider With An Identity As A Service Solution For Zero Trust Security

Top Six Things To Consider With An Identity As A Service Solution For Zero Trust Security

As we look to redefine security where every access is authenticated and authorized, selecting the right IDaaS vendor becomes a critical decision to make. Identity-as-a-Service (IDaaS) is an emerging solution category for managing and simplifying access to apps, but there are a number of feature, architecture and maturity considerations when selecting an IDaaS. This paper will discuss six of the top considerations.

(more available)
Added: October 17, 2018
image from Treacherous 12: Cloud Computing Top Threats In 2016

Treacherous 12: Cloud Computing Top Threats In 2016

While there are many security concerns in the cloud, this report focuses on 12 specifically related to the shared, on-demand nature of cloud computing. To identify the top concerns, CSA conducted a survey of industry experts to compile professional opinions on the greatest security issues within cloud computing. The Top Threats working group used these survey results alongside their expertise to craft the final 2016 report.

(more available)
Added: October 17, 2018
image from Two Years Of Pawn Storm: Examining An Increasingly Relevant Threat

Two Years Of Pawn Storm: Examining An Increasingly Relevant Threat

This paper is exclusively dedicated to the cyber threat, Pawn Storm.

Added: October 17, 2018
image from Under The Hoodie: Lessons From A Season Of Penetration Testing

Under The Hoodie: Lessons From A Season Of Penetration Testing

This report offers insight from the research and results of Rapid7’s repeated penetration testing.

Added: October 17, 2018
image from What About The Plant Floor: Six Subversive Concerns For Industrial Environments

What About The Plant Floor: Six Subversive Concerns For Industrial Environments

This paper describes six key weaknesses that an adversary can use to undermine a plant’s operation, providing real-life threat details and mitigation options.

(more available)
Added: October 17, 2018
image from "Known Unkowns": Overcoming Catastrophic Failure Modes In Artificial Intelligence

"Known Unkowns": Overcoming Catastrophic Failure Modes In Artificial Intelligence

This report takes a look at some of the problems in AI, and machine based cyber security, and seeks to show how they can be overcome.

(more available)
Added: October 16, 2018
image from 2016 Data Breach Industry Forecast

2016 Data Breach Industry Forecast

To help organizations prepare for what lies ahead and ensure incident response plans are ready for the evolving data breach environment, Experian Data Breach Resolution has outlined five predictions for what we can expect in 2016.

(more available)
Added: October 16, 2018
image from 2016 Global Security Report

2016 Global Security Report

Gives a detailed report of ransomware in the year 2016. Includes a video presentation.

Added: October 16, 2018
image from 2016 Shadow Data Report

2016 Shadow Data Report

The Shadow Data Report published by Elastica CloudThreat Labs, addresses key trends and challenges facedby enterprises securing data stored and shared via cloudapps and services.

(more available)
Added: October 16, 2018
image from 2017 Quarterly Threat Report Q2

2017 Quarterly Threat Report Q2

This report takes a look at the cyber threats that took place in the 2nd Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 16, 2018
image from 2018 Global Security Report

2018 Global Security Report

This annual report takes a look at the last decade of cyber security issues, including 2017, and provides some insight into the years ahead.

(more available)
Added: October 16, 2018
image from 2018 Threat Hunting Report

2018 Threat Hunting Report

This report focusses on the issues of Threat Hunting. It details the growth in Threat Hunting, the trends and processes surrounding it, and what it can mean for your organization.

(more available)
Added: October 16, 2018
image from A Quick History Of IoT Botnets

A Quick History Of IoT Botnets

Here is a short report on the history of IoT Botnets.

Added: October 16, 2018
image from An Emprical Analysis of Cyber Security Incidents at a Large Organization

An Emprical Analysis of Cyber Security Incidents at a Large Organization

This is a study into organisations’ attitudes towards the cyber threat, the management control processes they have in place, and their understanding and use of cyber insurance as a means of risk transfer.

(more available)
Added: October 16, 2018
image from An Introduction to Cyber Threat Modelling

An Introduction to Cyber Threat Modelling

This document defines an analytical model of cyber threat intelligence in terms of a threat entity’s goal orientation, the capabilities it uses to pursue its goals and its modus operandi. The model is intended to act as a common guiding template for conducting a cyber threat assessment for use by penetration testers to define a set of realistic and threat-informed cyber attack test scenarios.

(more available)
Added: October 16, 2018
  • ««
  • «
  • 71
  • 72
  • 73
  • 74
  • 75
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 20:08 UTC (build b1d7be4)