Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Vulnerability

Below you will find reports with the tag of “Vulnerability”

image from Cyber Bank Heists: Threats to the financial sector

Cyber Bank Heists: Threats to the financial sector

This annual report sheds light on the cybersecurity threats facing the financial sector. The report provides cyber ground truth, specifically manifesting an eye-opening perspective on the changing behavior of cybercriminal cartels and the defensive shift of the financial sector. In this year’s report, financial sector security leaders from around the world revealed during a series of interviews the type of attacks they’re currently seeing, what threats they’re most concerned about and how they’re adjusting their security strategy.

(more available)
Added: February 21, 2023
image from Comparison of Public and Private Sector Cybersecurity and IT Workforces

Comparison of Public and Private Sector Cybersecurity and IT Workforces

In this report, we update the research summarized in the Capstone Report with current job opening data to compare the civilian cybersecurity and IT workforces with those in the U.S. government and the private sector. We also extend the DoD-private industry comparison research summarized in the Capstone Report by further examining the proportion of workers across a common taxonomy of cyber work roles, salaries paid across work roles, and demand for these jobs. Thus, this report both updates and expands upon the research presented in the Capstone Report.

(more available)
Added: February 15, 2023
image from 2022 State of the Threat

2022 State of the Threat

The purpose of this report is to share our view on how the threat landscape has evolved over the last twelve months, with a clear focus on our first-hand observations of threat actor tooling and behaviors. This report reviews changes in the ransomware landscape, and in the behavior of threat actors enabling ransomware groups with malware like loaders and stealers. It surveys significant activity by major government-sponsored threat groups. And it examines how threat actors move swiftly to exploit new vulnerabilities, and how they combine sophisticated with more basic techniques to evade detection by defenders once inside the network. The report concludes by examining how Taegis forms the backbone of this visibility.

(more available)
Added: February 14, 2023
image from Global Perspectives on Threat Intelligence

Global Perspectives on Threat Intelligence

This first-of-its-kind report offers insight into how organizations are navigating the global cyber security threat landscape. Findings are drawn from extensive interviews with 1,350 business and IT leaders who make security decisions for organizations with at least 1,000 employees. Respondents were based in 13 countries across three regions and in 18 sectors - including financial services, healthcare and government.

(more available)
Added: February 13, 2023
image from 2022 Year In Review

2022 Year In Review

Our research and collection methods largely are driven by our GIRs, however, we continue to acknowledge that new trends in our reporting, recurring requests for information (FRIs) and other significant activity from or against underground threat actors and/or services are equally important to our research into trending topics.

(more available)
Added: February 8, 2023
image from Sysdig 2023 Cloud-Native Security and Usage Report

Sysdig 2023 Cloud-Native Security and Usage Report

This report is based on data gathered from billions of containers, thousands of cloud accounts, and hundreds of thousands of applications that our customers operated over the course of the last year. Our findings provide signs of hope for overburdened developers, as the data showed opportunities to focus remediation efforts on vulnerable packages loaded at runtime.

(more available)
Added: February 7, 2023
image from Cyber Threat Index 2023

Cyber Threat Index 2023

This report includes insights on internet security, cyber risk, and security trends that organizations have face over the last year and what they need to prepare for in 2023. We’re sharing the critical information and our insights to help decision-makers in the information security community and insurtech sectors better understand the cyber risk landscape. Coalition’s data set includes internet scans of 5.2 billion IP addresses-an impressive number that comprises the entire IPv4 address space and relevant IPv6 addresses.

(more available)
Added: February 3, 2023
image from 2022 Blackberry Threat Report Highlights

2022 Blackberry Threat Report Highlights

The cyber events of the past year included unprecedented supply chain attacks, assaults on critical infrastructure, and widespread vulnerabilities likely to haunt organizations for years. These events, among many others, are detailed in Blackberry 2022 Threat Report. However, reading the entire report can prove challenging for security professionals with little time to spare.

(more available)
Added: February 1, 2023
image from Close Encounters of the Third (and Fourth) Party Kind

Close Encounters of the Third (and Fourth) Party Kind

This report offers an in-depth examination of the underlying condition that enables such incidents to take place-the widespread interdependence of modern digital supply chains. We analyzed data from over 230,000 organizations to investigate the prevalence of security incidents among third parties. We then measure the extent of vendor relationships and explore the effects of that exposure. Finally, we compare the security posture of organizations to that of their third and fourth-parties to yield data-driven insights on how to identify risky vendors and better manage exposure.

(more available)
Added: February 1, 2023
image from Five lessons from 1,000 destructive ransomware events

Five lessons from 1,000 destructive ransomware events

RiskRecon studied 1,000 publicly reported destructive ransomware events that occurred between January 2016 and November 2022. These publicly reported events were identifies through internet keyword searches, monitoring of event disclosure sites, dark web sites, and 8K SEC filings. Events in which the impact was limited to data theft were excluded.

(more available)
Added: January 19, 2023
image from 2020 State of Vulnerability Management Report

2020 State of Vulnerability Management Report

The objective of this report is to reflect on the different vulnerability management phases and their current maturity and trends through a cumulative dashboard view of the United VRM SaaS solution, anonymously accumulating vulnerability and asset data from January 2019 to present date. These cumulative views will reveal trends and considerations about vulnerability management practices and overall program maturity.

(more available)
Added: January 17, 2023
image from The State of Vulnerability Management 2022

The State of Vulnerability Management 2022

For this survey, we surveyed 426 security professionals directly responsible for managing cyber vulnerabilities in their day-to-day work. The survey was conducted online via Pollfish using organic sampling. What we found is that some organizations have effective ways to detect, respond to, and remediate their vulnerabilities, while other organizations have more blind spots than they think.

(more available)
Added: January 17, 2023
image from 2023 Cybersecurity Status Report

2023 Cybersecurity Status Report

Ivanti surveyed over 6,500 executives leaders, cybersecurity professionals and office workers in October 2022. Our goal: to understand today’s threats - from the perspective of security professionals, as well as executive leaders and all other office workers - plus find out how companies are preparing for yet - unknown future threats.

(more available)
Added: January 11, 2023
image from 2021 Global Automotive Cybersecurity Report

2021 Global Automotive Cybersecurity Report

As a leader in automotive cybersecurity and automotive cyber threat intelligence, Upstream Security continually monitors and analyzes worldwide cyber incidents to protect the automotive ecosystem from cyber threats and misuse. This report was created by analyzing 633 publicly reported incidents since 2010, 207 of them in 2020 as of November 25, 2020.

(more available)
Added: January 11, 2023
image from 2022 Global Automotive Cybersecurity Report

2022 Global Automotive Cybersecurity Report

This report was created by analyzing 900+ publicly reported incidents that occurred since 2010, with an increase of more than 225% in the number of incidents taking place in 2021 alone, when compared to 2018. Our researchers have carefully categorized the data we have collected, analyzing each incident’s attack methods, attack vectors, impact, target industries, and many other aspects.

(more available)
Added: January 11, 2023
image from 2023 Global Automotive Cybersecurity Report

2023 Global Automotive Cybersecurity Report

This report marks Upstream’s fifth annual report, uncovering the expanding and emerging automotive cybersecurity risks, and how they impact the entire smart mobility ecosystem.

(more available)
Added: January 11, 2023
image from Rise in Mobile Phishing Credential Theft Targeting U.S. Public Sector

Rise in Mobile Phishing Credential Theft Targeting U.S. Public Sector

To understand the challenges facing U.S. government agencies, Lookout analyzed data specific to our federal, state and local customers from the Lookout Security Graph. The graph, which includes telemetry and more than 175 million apps, enabled us to identify and break down the most prominent mobile threats agencies face. For this report we specifically reviewed data from 2021 and the first half of 2022.

(more available)
Added: January 11, 2023
image from The State of Supply Chain Defense

The State of Supply Chain Defense

In this years report, we’ll focus attention on how organizations are moving past problem identification and mitigating cyber risk challenges within supply chain vendors. We’ll also explore the challenges identified by this year’s respondents in establishing internal and third-party sourced functions and technologies for supply chain risk mitigation.

(more available)
Added: December 27, 2022
image from Intelligence-Powered Security Operations

Intelligence-Powered Security Operations

In Intelligence-Powered Security Operations, risk and threat intelligence is combined with human expertise and machine power to deliver better outcomes to the business as a while. Ultimately, intelligence-powered security operations programs will deliver smarter security and better results.

(more available)
Added: December 22, 2022
image from Threat Intelligence Report -Q2 2022

Threat Intelligence Report -Q2 2022

This report leveraged the Fortinet service to provide a deep dive into what adversaries are seeing, doing, and planning, enabling organizations to better understand the threats posed by the growth of criminal forums and markets operating on the darknet. The report covers global, regional, and industry/sector threat landscape perspective as well as protection recommendations for IT and OT organizations for darknet activity observed during Q2 2022.

(more available)
Added: December 22, 2022
image from The State of Dependency Management

The State of Dependency Management

In their inaugural report, the Station 9 research team explores the complexities of open source dependencies and the top security considerations for open source adoption at the enterprise.

(more available)
Added: December 20, 2022
  • ««
  • «
  • 10
  • 11
  • 12
  • 13
  • 14
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 04:08 UTC (build b1d7be4)