Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Vulnerability

Below you will find reports with the tag of “Vulnerability”

image from SANS 2022 Ransomeware Defense Report

SANS 2022 Ransomeware Defense Report

In this white-paper, we address both high-level concepts: With respect to ransomware, what are the current adversary trends, and then what can organizations do to defend themselves (or better defend themselves)? (more available)
Added: June 28, 2022
image from Sysdig 2022 Cloud-Native Security and Usage Report

Sysdig 2022 Cloud-Native Security and Usage Report

In this report, you will find details about security, compliance, services, alerting, and Kubernetes usage patterns. This information can be useful for determining the real-world state of security and usage for container environments at companies around the world, from a broad range of industries. (more available)
Added: June 28, 2022
image from Sysdig 2021 Container Security and Usage Report

Sysdig 2021 Container Security and Usage Report

In this report, you will find further detail about security, compliance, services, alerting, and Kubernetes usage patterns. This information can be useful for determining the real-world state of security and usage for container environments at companies around the world, from a broad range of industries. (more available)
Added: June 28, 2022
image from 2022 Envisions Critical Threat Report

2022 Envisions Critical Threat Report

Amid our worldwide bedlam, this report is aimed at informing for the purposes of preparation. Whether you find yourself in the midst of government affairs, technology management, or business operations, the state of rising factors impacts nearly every country, either directly or indirectly, and provides a ripe setting for cyberattacks to thrive. (more available)
Added: June 21, 2022
image from Sysdig 2022 Cloud-Native Security and Usage Report

Sysdig 2022 Cloud-Native Security and Usage Report

These findings are based on the data we gather front the billions of containers that our customers run over the course of a year. (more available)
Added: June 21, 2022
image from Radware 5G Protection

Radware 5G Protection

Service providers are undergoing a technological revolution, transforming their networks and computing infrastructure to dramatically change the user experience and support new services in an app-driven world tailored to industry and business objectives. (more available)
Added: June 21, 2022
image from Ransomware Threat Report 2022

Ransomware Threat Report 2022

As these ransomware gangs and RaaS operators find new ways to remove technical barriers and up the ante, ransomware will continue to challenge organizations of all sizes in 2022. (more available)
Added: June 16, 2022
image from The 2020 Duo Trusted Access Report

The 2020 Duo Trusted Access Report

For the 2020 Duo Trusted Access Report, our data shows that more organizations across all industries are enabling their workforces to work from home now, and potentially for an extended period of time. (more available)
Added: June 15, 2022
image from Blackberry 2022 Threat Report

Blackberry 2022 Threat Report

The Blackberry 2022 Threat Report is not a simple retrospective of the cyberattacks of 2021. It is a high-level look at issues affecting cybersecurity across the globe, both directly and indirectly. (more available)
Added: June 13, 2022
image from The State of Cybersecurity 2022 Trends

The State of Cybersecurity 2022 Trends

Arctic Wolf’s 2022 Security Trends Report provides insight into the current and future state of these cybersecurity teams as they attempt to move their security programs forward while dealing with an ever-evolving threat environment. (more available)
Added: June 10, 2022
image from 2022 MSP Threat Report

2022 MSP Threat Report

This report was created by the ConnectWise Cyber Research Unit (CRU) - a dedicated team of ConnectWise threat hunters that identifies new vulnerabilities, researches them, and shares what they find for all to see in the community. (more available)
Added: June 10, 2022
image from Deepwatch Threat Intelligence 2022

Deepwatch Threat Intelligence 2022

In 2021, the industry saw a transition into threat actor separation of duties, with an increase in groups focused on obtaining and selling access to victims (Initial Access Brokers). (more available)
Added: June 8, 2022
image from Nuspire Threat Landscape Report Q1 2022

Nuspire Threat Landscape Report Q1 2022

At Nuspire, we’re still witnessing threat actors using malicious files and cashing in on newly announced vulnerabilities. Threat actors are opportunistic for the most part and seek the easiest access for the least amount of effort. (more available)
Added: June 2, 2022
image from The Cisos Report

The Cisos Report

This study offers the kind of insights CISOs have long been asking for - to benchmark their situation and experience against others; to learn from what their peers are doing and planning to do ; and to validate ideas and obtain solid data to justify investments in these areas. (more available)
Added: June 2, 2022
image from 2021 State of the Software Supply Chain

2021 State of the Software Supply Chain

Now in its seventh year, Sonatype’s 2021 State of the Software Supply Chain Report blends a broad set of public and proprietary data to reveal important findings about open source and its increasingly important role in digital innovation. (more available)
Added: May 19, 2022
image from The State of Cloud Security 2021

The State of Cloud Security 2021

For the State of Cloud Security 2021, we surveyed 300 cloud professionals, including cloud engineers, cloud security engineers, DevOps, and cloud architects, to better understand the risks, costs, and challenges they are experiencing managing cloud security at scale. (more available)
Added: May 19, 2022
image from 2021 Annual Crimeware Trends and Highlights: From Tailwinds to Headwinds

2021 Annual Crimeware Trends and Highlights: From Tailwinds to Headwinds

Based on Arete case data, the commonly observed techniques and vulnerabilities of 2021 will likely not change through most of 2022. (more available)
Added: May 17, 2022
image from CyberCrime Trends and Highlights Q3 2021

CyberCrime Trends and Highlights Q3 2021

From Q2 to Q3 2021, ransomware gained increasing attention. In Q3 2021, threat actors also continued mass exploitation of vulnerabilities in systems, including those in Microsoft Exchange. (more available)
Added: May 16, 2022
image from The State of Pentesting 2019

The State of Pentesting 2019

The information included in this report is summary data from the pentesting performed in 2018. Additionally, we provide survey data from respondents in security, management, operations, DevOps, product, and developer roles. (more available)
Added: May 16, 2022
image from The State of Pentesting: 2020

The State of Pentesting: 2020

The State of Pentesting: 2020 report assesses which web application security vulnerabilities can be found reliably using machines and which require human expertise to manually identify. (more available)
Added: May 16, 2022
image from Global Threat Landscape Report 2H 2020

Global Threat Landscape Report 2H 2020

The findings of this report represent the collective intelligence of FortiGuard Labs, drawn from a vast array of network sensors collecting billions of threat events each day observed in live production environments around the world. (more available)
Added: May 9, 2022
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 31
  • »
  • »»
© Cyentia Institute 2022
Library updated: June 30, 2022 20:09 UTC (build d6199b1)