Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from Who Needs Malware? How Adversaries Use Fileless Attacks To Evade Your Security

Who Needs Malware? How Adversaries Use Fileless Attacks To Evade Your Security

As security measures get better at detecting and blocking both malware and cyberattacks, adversaries and cybercriminals are forced to constantly develop new techniques to evade detection. One of these advanced techniques involves “fileless" exploits, where no executable file is written to disk. These attacks are particularly effective at evading traditional antivirus (AV) solutions, which look for files saved to disk so they can scan them and determine if they are malicious. This report discusses these issues.

(more available)
Added: October 13, 2018
image from Will Connected Cars Crash Into The Cloud Or Accelerate Into The Fast Lane?

Will Connected Cars Crash Into The Cloud Or Accelerate Into The Fast Lane?

Connected cars are facing four fundamnetal challenges that need to be overcome. See what these automotive Ethernet industry challenges are and the solutions that are available to help overcome several of the challenges.

(more available)
Added: October 13, 2018
image from 2015 Annual Security Report

2015 Annual Security Report

The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming ever-weaker links in the security chain.

(more available)
Added: October 12, 2018
image from 2016 Global Cyersecurity Assurance Report Card

2016 Global Cyersecurity Assurance Report Card

“The objective of this inaugural Tenable Network Security research study is to measure how enterprise IT security professionals view their organization’s ability to assess cybersecurity risks and to mitigate threats that can exploit those risks. In doing so, Tenable has developed the industry’s first Global Cybersecurity Assurance Report Card, which assigns indices and grades to responding organizations globally, by country, and by industry based on the responses of the security practitioners themselves.”

(more available)
Added: October 12, 2018
image from 2016 Norton Cyber Security Insights Report

2016 Norton Cyber Security Insights Report

This report finds that victims of cybercrime within the past year often continued their unsafe behavior. This report details and discusses this issue.

(more available)
Added: October 12, 2018
image from 2016 Trustwave Global Security Report

2016 Trustwave Global Security Report

This report summarizes the goals and activities of the initiative, the history and status of the initiative and key cyber value-at-risk concept foundations.

(more available)
Added: October 12, 2018
image from 2017 Breach Predictions Report

2017 Breach Predictions Report

Through analysis of public breach data, a useful picture of the threat landscape can be observed. Analyzing trends, it may be possible to predict the general scale of expected breaches in the near future and frame those impacts in a meaningful way for individuals. This will hopefully serve to highlight the importance of good security practices and bring attention to the “personal supply chain” problem – that the companies where individuals maintain accounts and trust with personal information are part of the attack surface they create for themselves and the risk of such behavior needs to be weighed against the benefits gained.

(more available)
Added: October 12, 2018
image from 2017 Data Breach Investigations Report

2017 Data Breach Investigations Report

As always, this report is comprised of real-world data breaches and security incidents—either investigated by us or provided by one of our outstanding data contributors.

(more available)
Added: October 12, 2018
image from 2017 Security Predictions

2017 Security Predictions

This report seeks to prove that the world emerging in 2017 will challenge cybersecurity professionals like never before.

Added: October 12, 2018
image from 2018 State Of Bug Bounty Report

2018 State Of Bug Bounty Report

This annual report takes a look at the bug bounty industry in 2018.

Added: October 12, 2018
image from A Crypto Mining Operation Unmasked

A Crypto Mining Operation Unmasked

This article provides an insightful report on a CryptoMining Operation.

Added: October 12, 2018
image from A Priviliged Account Security Approach To GDPR Readiness

A Priviliged Account Security Approach To GDPR Readiness

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 12, 2018
image from Crowdstrike Endpoint Strategies White Paper

Crowdstrike Endpoint Strategies White Paper

This whitepaper tries to outline a new standard of response to endpoint security.

Added: October 12, 2018
image from Cyber Extortion Risk Report

Cyber Extortion Risk Report

This report looks at the costs, and the growth, of cybercrimes, based on data from five countries. It also examines the types and numbers of cyber crimes and their impacts. It also offers predictions for the future of cyber crimes.

(more available)
Added: October 12, 2018
image from Cyber Power Potential Of The Army's Reserve Component

Cyber Power Potential Of The Army's Reserve Component

This report documents research conducted as part of a study entitled “Managing and Developing Reserve Component Capabilities in Sup- port of the Army’s Cyber Force.” The primary purpose of the study was to conduct initial research on how to train, manage, and develop the Army’s cyber force, with a specific focus on the Army National Guard and the U.S. Army Reserve.

(more available)
Added: October 12, 2018
image from Cyber Threats To The Construction And Engineering Industries

Cyber Threats To The Construction And Engineering Industries

Learn why the construction and engineering sectors are high profile targets for state-sponsored threat actors engaged in cyber espionage.

Added: October 12, 2018
image from Cybersecurity Challenges in Aviation

Cybersecurity Challenges in Aviation

This paper discusses the issues and challenges involved in maintaining good cybersecurity in the field of aviation.

Added: October 12, 2018
image from Cybersecurity Insights Volume 5: The CEO's Guide To Data Security

Cybersecurity Insights Volume 5: The CEO's Guide To Data Security

In this report the authors provide insight into the importance of data security.

Added: October 12, 2018
image from Don't Take The Bait

Don't Take The Bait

In this paper, we’ll dive into the evolution of phishing in recent years, how it works, and what it looks like. And as cybercriminals continue to prey on employees through their technology, we’ll make an argument for the importance of a multi-layered defense against phishing attacks: combining advanced security technologies with educated, phishing-aware employees.

(more available)
Added: October 12, 2018
image from Forces Shaping The Cyber Threat Landscape For Financial Institutions

Forces Shaping The Cyber Threat Landscape For Financial Institutions

This significant WhitePaper takes a good look at what trends and developments are impacting the cyber threat landscape for specifically, financial institutions.

(more available)
Added: October 12, 2018
image from Hackerpocalypse: A Cybercrime Revelation

Hackerpocalypse: A Cybercrime Revelation

From the report, “The primary goal of our report is to spark major discussion around cybercrime — and cyber defense — from local, national, and global political and business leaders. We invite broadcasters, publishers, editors, reporters, and bloggers to borrow generously from our report in their efforts raise up cybersecurity in the public’s consciousness.”

(more available)
Added: October 12, 2018
  • ««
  • «
  • 80
  • 81
  • 82
  • 83
  • 84
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 04:08 UTC (build b1d7be4)