Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Vulnerability

Below you will find reports with the tag of “Vulnerability”

image from CyberCrime Trends and Highlights Q3 2021

CyberCrime Trends and Highlights Q3 2021

From Q2 to Q3 2021, ransomware gained increasing attention. In Q3 2021, threat actors also continued mass exploitation of vulnerabilities in systems, including those in Microsoft Exchange.

(more available)
Added: May 16, 2022
image from The State of Pentesting 2019

The State of Pentesting 2019

The information included in this report is summary data from the pentesting performed in 2018. Additionally, we provide survey data from respondents in security, management, operations, DevOps, product, and developer roles.

(more available)
Added: May 16, 2022
image from The State of Pentesting: 2020

The State of Pentesting: 2020

The State of Pentesting: 2020 report assesses which web application security vulnerabilities can be found reliably using machines and which require human expertise to manually identify. The scope of his exploration is black-box penetration testing (“humans”) against dynamic scanning and out-of-band testing (“machines”) for web applications.

(more available)
Added: May 16, 2022
image from Global Threat Landscape Report 2H 2020

Global Threat Landscape Report 2H 2020

The findings of this report represent the collective intelligence of FortiGuard Labs, drawn from a vast array of network sensors collecting billions of threat events each day observed in live production environments around the world.

(more available)
Added: May 9, 2022
image from Global Threat Landscape Report -H1 2020

Global Threat Landscape Report -H1 2020

The findings in this report represent the collective intelligence of FortiGuard Labs, drawn from a vast array of network sensors collecting billions of threat events observed in live production environments around the world.

(more available)
Added: May 9, 2022
image from Quarterly Threat Landscape Report Q4 2018

Quarterly Threat Landscape Report Q4 2018

This report primarily analyzes threat data from millions for Fortinet devices across the internet.

Added: May 9, 2022
image from Threat Landscape Report Q2 2018

Threat Landscape Report Q2 2018

The Fortinet Threat Landscape Report Q2 2018 features a healthy dose of international intrigue, major disruptions, global infections, innovative malware, clever heists, and more.

(more available)
Added: May 5, 2022
image from Quarterly Threat Landscape Report Q3 2019

Quarterly Threat Landscape Report Q3 2019

The Fortinet Threat Landscape Index (TLI) was developed to provide an ongoing barometer of overall malicious activity across the internet. The TLI is based on the premise that the cyber landscape gets more threatening as more of our sensors detect a wider variety of threats at a higher volume.

(more available)
Added: May 5, 2022
image from The State of Pentesting 2022

The State of Pentesting 2022

The State of Pentesting 2022 Report focuses on issues and stats that are relevant to both security and development teams: to separate these two inextricably linked groups would only yield a partial picture of the security landscape.

(more available)
Added: May 4, 2022
image from Learning from Incident Response: 2021 Year in Review

Learning from Incident Response: 2021 Year in Review

Secureworks incident response (IR) engagements in 2021 revealed trends about threats and threat actor behaviors. Between January and December 2021, Secureworks incident responders assisted in the containment and remediation of over 450 security incidents.

(more available)
Added: April 26, 2022
image from 2021 SonicWall Cyber Threat Report

2021 SonicWall Cyber Threat Report

Cybercriminals have always been opportunists, and the 2020 COVID-19 pandemic offered more proof of this than perhaps any other event before it.

(more available)
Added: April 22, 2022
image from 2022 SonicWall Cyber Threat Report

2022 SonicWall Cyber Threat Report

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vendors.

(more available)
Added: April 21, 2022
image from Threat Intelligence Executive Report 2021 Vol. 5

Threat Intelligence Executive Report 2021 Vol. 5

The Secureworks Counter Threat (CTU) research team analyzes security threats and helps organizations protect their systems. During July and August 2021, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends and identified lessons to consider.

(more available)
Added: April 21, 2022
image from Threat Intelligence Executive Report 2021 Vol. 3

Threat Intelligence Executive Report 2021 Vol. 3

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During March and April 2021, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.

(more available)
Added: April 21, 2022
image from Threat Intelligence Executive Report 2022 Vol. 1

Threat Intelligence Executive Report 2022 Vol. 1

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During November and December 2021, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.

(more available)
Added: April 20, 2022
image from 2022 Global Threat Report

2022 Global Threat Report

The CrowdStrike 2022 Global Threat Report provides crucial insights into what security teams need to know about to stay ahead of today’s threats in an increasingly ominous threat landscape.

(more available)
Added: April 19, 2022
image from Claroty Biannual ICS Risk & Vulnerability Report: 1H 2021

Claroty Biannual ICS Risk & Vulnerability Report: 1H 2021

This report is the Claroty Biannual ICS Risk & Vulnerability Report: 1H 2021. This report is a resource for OT security managers and operations, delivering not only data about vulnerabilities that are prevalent in industrial devices, but also the necessary context around them to assess risk within their respective environments.

(more available)
Added: April 12, 2022
image from Claroty Biannual ICS Risk & Vulnerability Report: 2H 2021

Claroty Biannual ICS Risk & Vulnerability Report: 2H 2021

This is the Claroty Biannual ICS Risk & Vulnerability Report: 2H 2021. This report brings important context to the unique discipline of ICS vulnerability research and managing that risk.

(more available)
Added: April 11, 2022
image from European Industrial Infrastructure Cyber Threat Perspective

European Industrial Infrastructure Cyber Threat Perspective

A review of the threat landscape (actors, actions, etc._ affecting industrial infrastructure in Europe.

Added: April 7, 2022
image from 2022 Global Mobile Threat Report

2022 Global Mobile Threat Report

A review of mobile device application security, based upon a combination of data from Zimperium’s product and suvey based results.

(more available)
Added: April 6, 2022
image from 2022 Threat Detection Report

2022 Threat Detection Report

This is the 2022 Red Canary Threat Detection Report. This report goes in-depth with over 30,000 confirmed threats detected across our customers environments, this research arms security leaders and their teams with actionable insight into the threats we observed, techniques adversaries most commonly leverage, and trends that help you understand what is changing and why.

(more available)
Added: April 5, 2022
  • ««
  • «
  • 14
  • 15
  • 16
  • 17
  • 18
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 5, 2025 00:08 UTC (build b1d7be4)