Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Vulnerability

Below you will find reports with the tag of “Vulnerability”

image from 2022 Falcon OverWatch Threat Hunting Report

2022 Falcon OverWatch Threat Hunting Report

This year’s report starts with a close look at OverWatch’s extensive dataset covering observed interactive threat actor behaviors, which we will refer to in this report as “intrusion activity.” It uses this data to examine how and where adversaries are operating to provide a comprehensive overview of the threat landscape.

(more available)
Added: December 20, 2022
image from Enterprise Application Security

Enterprise Application Security

The goal of this Trend Report is to equip developers with the tools, best practices, and advice they need to help implement security at every stage of the SDLC.

(more available)
Added: December 16, 2022
image from Tenable's 2021 Threat Landscape Retrospective

Tenable's 2021 Threat Landscape Retrospective

The goal of this report is to help defenders understand the fulls cope of today’s modern attack surface so they can continue to refine their cybersecurity strategies and reduce risk. In this report, we explore the most notable vulnerabilities of the year and how they were used in attack chains, with specific focus on the value of Active Directory to threat actors.

(more available)
Added: December 16, 2022
image from Automotive Cybersecurity in 2022

Automotive Cybersecurity in 2022

In our report, we investigate the cyberthreats that have been launched on the automotive industry in 2021 and 2022. We dig into the most prominent attacks, point out high-risk areas that could be targeted in the future, and give our security recommendations and predictions for 2023.

(more available)
Added: November 29, 2022
image from Sophos 2023 Threat Report

Sophos 2023 Threat Report

In 2022 the cybercriminal economy has increasingly transformed into an industry. Information technology companies have shifted too “as-a-service” offerings, and the cybercrime ecosystem has done the same. Access brokers, ransomware, information-stealing malware, malware delivery, and other elements of cybercrime operations have lowered barriers to entry for world-be cybercriminals.

(more available)
Added: November 29, 2022
image from Trust Services Security Incidents 2021

Trust Services Security Incidents 2021

This report, the Annual Report Trust Services Security Incidents 2021, analyzing root causes, statistics and trends. This report marks the sixth round of security incident reporting for the for the EU’s trust services sector. In this round of annual summary reporting a total of 27 EU countries and 3 EEA countries took part. They reported a total of 46 incidents.

(more available)
Added: November 9, 2022
image from Microsoft Digital Defense Report 2022

Microsoft Digital Defense Report 2022

In the report’s first chapter, we focus on activities of cybercriminals, followed by nation states threats in chapter two. Both groups have greatly increased the sophistication on their attacks which has dramatically increased the impact of their actions.

(more available)
Added: November 7, 2022
image from Cyber Trends and Credit Risks

Cyber Trends and Credit Risks

This report underscores the challenge facing corporate, government and not-for-profit debt issuers: rising cybersecurity incidents, higher costs to combat them, and an imbalance in the executive and risk management experience needed to manage them properly. In an ever-more-connected world, the risk of systemic attacks resulting in damaging financial and repetitional consequences keeps increasing.

(more available)
Added: October 26, 2022
image from The State of Authentication in the Finance Industry

The State of Authentication in the Finance Industry

This report shines an important spotlight on the perceptions of global financial institutions around authentication. As the study findings show, these remains much to do to close these security gaps, and traditional MFA methods are not delivering the security that we all need.

(more available)
Added: October 24, 2022
image from 2021 Application Security Report

2021 Application Security Report

This report reveals that the expanded use of applications for business-critical applications, combined with the increased pace of application changes that come with DevOps methodologies, has created security challenges for organizations.

(more available)
Added: October 18, 2022
image from Ransomware Report 2022

Ransomware Report 2022

This 2022 Ransomware Report reveals the latest security trends, challenges, and investment priorities for ransomware protection, as reported by over 236 cybersecurity professionals surveyed in 2022. Ransomware attacks are on the rise and continue to wreak havoc as one of the most destructive malware threats that affect organizations of all sizes.

(more available)
Added: October 17, 2022
image from 2022 Application Security Report

2022 Application Security Report

This report reveals the latest application security trends, how organizations protect critical applications, and what tools and best practices cybersecurity professionals prioritize to find, fix and prevent vulnerabilities in next-gen applications.

(more available)
Added: October 12, 2022
image from 2022 Application Security Report

2022 Application Security Report

This report is based on the results of a comprehensive online global survey of 386 cybersecurity professionals, conducted in July 2022, to gain deep insight into the latest trends, key challenges, and solutions for application security. The respondents range from technical executives to managers and IT security practitioners, representing a balancing cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: October 12, 2022
image from 2022 Vulnerability Management Report

2022 Vulnerability Management Report

The 2022 Vulnerability Management Report is based on a comprehensive survey of over 390 cybersecurity professionals in September 2022 to gain insights into the latest trends, key challenges and solutions preferences for vulnerability management.

(more available)
Added: October 12, 2022
image from 2022 AWS Cloud Security Report

2022 AWS Cloud Security Report

This report is based on comprehensive survey of 578 cybersecurity professionals to reveal how AWS user organizations are responding to evolving cloud security threats, and what tools and best practices cybersecurity leaders prioritize as their cloud infrastructures mature.

(more available)
Added: October 12, 2022
image from Security Visibility Report 2022

Security Visibility Report 2022

This report surveyed 278 cybersecurity professionals to reveal the key challenges regarding security visibility, how organizations solve this issue, and the security capabilities organizations prioritize.

(more available)
Added: October 12, 2022
image from The State of Security Posture Report 2022

The State of Security Posture Report 2022

The 2022 State of Security Posture Report reveals that cybersecurity teams are struggling to measure and improve their security posture as their organizations move to the cloud and as their leadership increasingly expects them to measure cyber risk in monetary terms due to the rise of ransomware and the general impact of cyber attacks to business.

(more available)
Added: October 12, 2022
image from DDoS Threat Report 2020 Q3

DDoS Threat Report 2020 Q3

In this edition of our quarterly report, there will be a special feature story that focuses on the DDoS issues surrounding the online gaming industry, in particular, why it is an industry to keep an eye on - especially the service providers to this industry. And why the popularity of online gaming has skyrocketed in Q3.

(more available)
Added: October 11, 2022
image from Acronis Cyber Protection Operation Centers Report

Acronis Cyber Protection Operation Centers Report

This report represents a global outlook and is based on over 700,000 unique endpoints distributed around the world. Most of the statistics discussed focus on threats for Windows operating systems, as they are much more prevalent compared to macOS and Linux.

(more available)
Added: October 11, 2022
image from 2022 DDoS Threat Report

2022 DDoS Threat Report

The 2022 A10 Networks DDoS Threat Report provides insights into DDoS activity during the past six months including origins of activity; the growth of DDoS weapons and botnets; the role of malware in the propagation of DDoS weapons and attacks; and the steps organizations can take to protect against such activities.

(more available)
Added: October 11, 2022
image from DDoS Threat Report 2019 Q4

DDoS Threat Report 2019 Q4

In Q4 2019 an unprecedented concentration of DDoS attacks on US networks was observed, with more than 1,000 victims identified in various states. Whether motivated by politics, profiteering, crime or other malicious purposes, attacks were frequent and impactful.

(more available)
Added: October 11, 2022
  • ««
  • «
  • 11
  • 12
  • 13
  • 14
  • 15
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 04:08 UTC (build b1d7be4)