Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from Healthcare Cyber Research Report For 2017 A CryptoniteNXT Special Report

Healthcare Cyber Research Report For 2017 A CryptoniteNXT Special Report

This Health Care Cyber Research Report for 2017 shares very recent research on cyberattacker activity in 2017 and the virtual explosion in the reported use of ransomware in attacking health care institutions. 2017 has been a very challenging year for health care institutions. They remain under sustained attack by cyberattackers that continue to target their networks through the use of well understood vulnerabilities.

(more available)
Added: October 14, 2018
image from How To Keep Cyberattacks In Check

How To Keep Cyberattacks In Check

This small report offers some simple guidelines that can help your organization keep cyberattacks at bay.

Added: October 14, 2018
image from M-Trends 2017

M-Trends 2017

From the report, “For our M-Trends® 2017 report, we took a look at the incidents we investigated last year and provided a global and regional (the Americas, Asia Pacific (APAC) and Europe, Middle East, Africa (EMEA)) analysis focused on attack trends and defensive and emerging trends. For the second consecutive year, we have included insights from our FireEye as a Service (FaaS) teams. FaaS monitors organizations 24/7, which gives them a unique perspective into the current threat landscape. Additionally, this year we partnered with law firm DLA Piper for a discussion of the upcoming changes in EMEA data protection laws.”

(more available)
Added: October 14, 2018
image from Quarterly Threat Report:Second Quarter 2017

Quarterly Threat Report:Second Quarter 2017

This is Rapid7’s Quarterly Threat Report, in this report they sought to include composite and industry-level views of events across many industries.

(more available)
Added: October 14, 2018
image from Secure The Vote With Zero Trust Security

Secure The Vote With Zero Trust Security

This report focusses on the election of 2016 and offers some solutions for protecting an election from hackers.

Added: October 14, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report June 2016

SecureWorks Threat Intelligence Executive Monthly Report June 2016

This report from June 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 14, 2018
image from Security Response: How safe is your quantified self?

Security Response: How safe is your quantified self?

Fueled by technological advances and social factors, the quantified self movement has experienced rapid growth. Quantified self, also known as self-tracking, aims to improve lifestyle and achievements by measuring and analyzing key performance data across a range of activities. This report deals with the threats and vulnerabilities that are present in the devices used to provide those measurements and analysis.

(more available)
Added: October 14, 2018
image from Southeast Asia: Cyber Threat Landscape

Southeast Asia: Cyber Threat Landscape

This report discusses trends in the cyber security environment in Southeast Asia from January to June 2015. We will review some recent cases of attempted breaches on companies and governments, and provide an update on a group we first identified in 2013 as APT.Nineblog.

(more available)
Added: October 14, 2018
image from Stateless Attribution: Toward International Accountability In Cyberspace

Stateless Attribution: Toward International Accountability In Cyberspace

In this report, they review the state of cyber attribution and they consider alternative mechanisms for producing standardized and transparent attribution that may overcome concerns about credibility. In particular, this exploratory work considers the value of an indepen- dent, global organization whose mission consists of investigating and publicly attributing major cyber attacks.

(more available)
Added: October 14, 2018
image from Supply Chain Compliance

Supply Chain Compliance

This paper discusses the important new rules in the DFARS cyber clause. It seeks to help organizations by revealing key steps to becoming compliant.

(more available)
Added: October 14, 2018
image from Table Of Experts: Cybersecurity

Table Of Experts: Cybersecurity

This article asks some experts local to the Boston area about CyberSecurity. It provides for interesting discussion and insight.

Added: October 14, 2018
image from Tech Industry Doppelgangers: Campaign Innovation In the World of Cybercrime

Tech Industry Doppelgangers: Campaign Innovation In the World of Cybercrime

This thought piece draws on the experience of 451 Networks analysts and interviews with defensive security professionals to review major trends in attackers tools, techniques, and processes (TTPs).

(more available)
Added: October 14, 2018
image from The 2016 Call Center Fraud Report

The 2016 Call Center Fraud Report

This report will provide insights about the depth and breadth of fraud activity across a variety of industries from a data set of more than half a billion calls.

(more available)
Added: October 14, 2018
image from The Cloud Email Security Challenge

The Cloud Email Security Challenge

This paper takes a look at how automating email security can create better security for an organization.

Added: October 14, 2018
image from The Cyber Attackers' Playbook: A Look at How One Common Attack Pattern Left 225k Ukraine Residents in the Dark

The Cyber Attackers' Playbook: A Look at How One Common Attack Pattern Left 225k Ukraine Residents in the Dark

In this ebook, they examine a specific cyber attack on a Ukrainian utility company in detail, and identify common steps that are used time and again during advanced attacks.

(more available)
Added: October 14, 2018
image from The Definitive Guide To Micro Segmentation

The Definitive Guide To Micro Segmentation

This eBook gives a detailed understanding of Adaptive segmentation and how it can be effectively used for cloud security.

Added: October 14, 2018
image from The Essential Guide To Securing Remote Access

The Essential Guide To Securing Remote Access

This guide will cover the different threats to each area with real-world examples, including exploits that affect remote access software and storage, and provide solutions and security best practice recommendations to help your organization protect against a data breach.

(more available)
Added: October 14, 2018
image from The Reign Of Ransomware

The Reign Of Ransomware

In this report, we round up all the significant security stories during the first half of 2016 to encourage businesses to check for vulnerabilities cybercriminals may abuse. Our report also aims to highlight the need for enterprises to be vigilant in finding solutions that would stop cybercriminals from winning and letting our prediction become their reality.

(more available)
Added: October 14, 2018
image from The Rise of Nation State Attacks

The Rise of Nation State Attacks

The Rise of Nation State Attacks, sponsored by CounterTack | MCSI and conducted by Ponemon Institute, reveals organizations’ lack of readiness to respond to nation state attacks due to an uncertainty as to what a nation state attack is and how to identify the key characteristics, methods and motives of these attacks that originate with foreign governments.

(more available)
Added: October 14, 2018
image from The State of Bug Bounty 2016

The State of Bug Bounty 2016

This is an annual report that provides an inside look into the economics and emerging trends of bug bounties, with data collected from Bugcrowd’s platform and other sources throughout 2016. This report is published on a yearly basis for CISOs and other security decision makers to provide a transparent look at the evolving bug bounty market.

(more available)
Added: October 14, 2018
image from The State Of Endpoint Security Today

The State Of Endpoint Security Today

This paper delivers insights into the prevalent cybersecurity issues facing organizations today: from ransomware to exploits and machine learning, it shares the experiences and future plans of IT managers across the globe. It’s an illuminating read, providing insight into where the field stands on these issues.

(more available)
Added: October 14, 2018
  • ««
  • «
  • 77
  • 78
  • 79
  • 80
  • 81
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 04:08 UTC (build b1d7be4)