Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from Hacking Is Not Random:A Case Control Study of Webserver Compromise Risk

Hacking Is Not Random:A Case Control Study of Webserver Compromise Risk

This paper investigates many observable characteristics of web-servers that may affect the likelihood of compromise.

Added: October 12, 2018
image from Key Findings from The Global State of Information Security Survey 2016

Key Findings from The Global State of Information Security Survey 2016

This report is discussing the rising trend of organizations properly prioritizing the risks and dangers of cyber threats.

Added: October 12, 2018
image from Legal Cybersecurity Checklist

Legal Cybersecurity Checklist

This whitepaper seeks to provide aid to lawfirms and their need for security compliance with their clients.

Added: October 12, 2018
image from M-Trends 2015

M-Trends 2015

Mandiant consultants’ role as the first responders to critical security incidents gives them a unique vantage point into how attackers’ motives and tactics are changing . The insights and analysis presented here represent their combined experience over the course of hundreds of service engagements . Over the last decade, they have helped clients across more than 30 industries around the globe .

(more available)
Added: October 12, 2018
image from Managing Cybersecurity: The Cyber Risk Protection Story 2018

Managing Cybersecurity: The Cyber Risk Protection Story 2018

Marsh & McLennan Agency surveyed 1,141 executives from small to middle-market organizations across North America, and found that they are clearly concerned about cyber risk — but, by their own admission, they do not have a grasp of how to protect themselves.

(more available)
Added: October 12, 2018
image from NANHAISHU:RATing The South China Sea

NANHAISHU:RATing The South China Sea

This whitepaper details a malicious program identified as NanHaiShu. Based on analysis, the threat actor behind this malware targets government and private-sector organizations. Notable targets of the malware include the Department of Justice of the Philippines, the organizers of the Asia-Pacific Economic Cooperation (APEC) Summit and a major international law firm.

(more available)
Added: October 12, 2018
image from Panda Labs Annual Report 2017

Panda Labs Annual Report 2017

This report discusses events of 2017 and lays out trends and predictions for 2018, including the secret of how to fight malware. In this report’s conclusion, they go a little more into detail, but ultimately the secret is “forgetting about” malware. If we focus on fighting malware, the battle is lost before it has begun.

(more available)
Added: October 12, 2018
image from Regional Advanced Threat Report: Latin America 1H 2015

Regional Advanced Threat Report: Latin America 1H 2015

This report discusses trends in the cyber security environment in Latin America from January to June 2015.

Added: October 12, 2018
image from RiskTeller: Predicting the Risk of Cyber Incidents

RiskTeller: Predicting the Risk of Cyber Incidents

This paper from CCS 2017, presents a system that analyzes binary file appearance logs of machines to predict which machines are at risk of infection months in advance.

(more available)
Added: October 12, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report August 2016

SecureWorks Threat Intelligence Executive Monthly Report August 2016

This report from August 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 12, 2018
image from Security Healthcare Information Security Guide

Security Healthcare Information Security Guide

This report provides a collection of articles on Healthcare Security.

Added: October 12, 2018
image from SQL Injection Defense: There are no Silver Bullets

SQL Injection Defense: There are no Silver Bullets

In this technical whitepaper they explain why there’s no single silver bullet answer to SQL injection.

Added: October 12, 2018
image from State of Mac Security 2016:Enterprise Mac Security

State of Mac Security 2016:Enterprise Mac Security

The State of Mac Security Report takes a pulse check of Mac enterprise adoption, examines the reasons behind their increased popularity and crucially, how to overcome the security risks they pose.

(more available)
Added: October 12, 2018
image from State of the Internet Security Report Q1 2018

State of the Internet Security Report Q1 2018

This Quaterly report continues Akamai’s breakdown of the internet security events that occurred in the first Quarter of 2018.

Added: October 12, 2018
image from Taking The Offensive

Taking The Offensive

This paper discusses the necessary element of collaboration that is required for success fighting cybercrime.

Added: October 12, 2018
image from Ten Key Questions on Cyber Risk and Cyber Risk Insurance

Ten Key Questions on Cyber Risk and Cyber Risk Insurance

By providing an overview of the main areas of research and the key studies conducted in the field to date, and by making some initial recommendations about the potential role of insurers and governments in addressing cyber risks, this report lays the groundwork for discussion and future research on the development of the cyber risk and the cyber insurance market.

(more available)
Added: October 12, 2018
image from The Dangers Of Smart City Hacking

The Dangers Of Smart City Hacking

This paper offers insight into smart cities and the dangers of exposed devices on the network.

Added: October 12, 2018
image from The Fake News Machine: How Propagandists Abuse The Internet And Manipulate The Public

The Fake News Machine: How Propagandists Abuse The Internet And Manipulate The Public

This paper studies and explores the techniques and methods used by actors to spread fake news and manipulate public opinion to serve various motives ranging from personal and financial to political. It also discusses the three legs of the fake news triangle: the services that enable them, their appearance on social media sites, and the motivations behind these activities.

(more available)
Added: October 12, 2018
image from The Four Pillars Of Modern Vulnerability Management

The Four Pillars Of Modern Vulnerability Management

This report breaks down four strategic pillars of handling vulnerability management.

Added: October 12, 2018
image from The Human Factor 2018: People Centered Threats Drive The Landscape

The Human Factor 2018: People Centered Threats Drive The Landscape

This report offers insight into the human factor and how cybercriminals have continued to recognize that the greatest vulnerability of an organization is the humans that run it.

(more available)
Added: October 12, 2018
image from The NTT Security 2018 Global Threat Intelligence Report

The NTT Security 2018 Global Threat Intelligence Report

The NTT Security 2018 Global Threat Intelligence Report highlights notable threats, incidents and trends observed during the previous year.

Added: October 12, 2018
  • ««
  • «
  • 80
  • 81
  • 82
  • 83
  • 84
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 08:08 UTC (build b1d7be4)