Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Vulnerability

Below you will find reports with the tag of “Vulnerability”

image from The Defender’s Advantage: Using the Attack Lifecycle to Detect TTPs

The Defender’s Advantage: Using the Attack Lifecycle to Detect TTPs

Don’t let Hollywood fool you: carrying out an attack doesn’t resemble the plot of an action movie. Attackers don’t automatically breach a network, immediately locate the information they want and then swiftly exit the organization. Attacks are complicated operations that unfold over multiple steps and take time, weeks and oftentimes months to achieve the desired goals.

(more available)
Added: October 18, 2018
image from The Hacker-Powered Security Report 2017

The Hacker-Powered Security Report 2017

This report examines the broadest platform data set available and explains why organizations like General Motors, Starbucks, Uber, the U.S. Department of Defense, Lufthansa, and Nintendo have embraced continuous, hacker-powered security.

(more available)
Added: October 18, 2018
image from Threat Advisory: Skyscape

Threat Advisory: Skyscape

This is a threat advisory for Skyscape

Added: October 18, 2018
image from Threat Landscape 2015

Threat Landscape 2015

For yet another year the 2015 edition of the cyber-threat landscape features a number of unique observations, the main one being the smooth advancement of maturity. As a matter of fact, cyber-space stakeholders have gone through varying degrees of further maturity. While the friendly agents – the good guys – have demonstrated increased cooperation and orchestrated reaction to cyber-threats, hostile agents – the bad guys – have advanced their malicious tools with obfuscation, stealthiness and striking power.

(more available)
Added: October 18, 2018
image from Threat Landscape Report Q4 2016

Threat Landscape Report Q4 2016

This report seeks to draw an accurate representation of the cyber threat landscape in Q4 2016 leveraging the vast information resources and expertise of FortiGuard Labs. We seek to share our perspective on the threats that exist, how often they occur, what differs across sectors and regions, and what’s changing over time.

(more available)
Added: October 18, 2018
image from UK Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In The UK

UK Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In The UK

This paper takes a look at the cities of the United Kingdom, and the cyber threats that occurred there.

Added: October 18, 2018
image from 2017 Government Internet Security Threat Report, Volume 22

2017 Government Internet Security Threat Report, Volume 22

This is the Government focussed version of the annual 2017 Security Threat Report from Symantec.

Added: October 17, 2018
image from 2017 Quarterly Threat Report Q3

2017 Quarterly Threat Report Q3

This report takes a look at the cyber threats that took place in the 3rd Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 17, 2018
image from 2017 Threat Monitoring Report

2017 Threat Monitoring Report

This report is based on a survey of a wide number of cybersecurity professionals, and deals with a variety of issues ranging from the threat landscape to incident recovery.

(more available)
Added: October 17, 2018
image from 2018 Security Report

2018 Security Report

In this report, we will take a look back over the past year and try to make sense of it. In turn we will realize how the threat landscape, by entering the fifth generation of cyber security, now spans across countries and industries along multiple vectors of network, cloud and mobile and uses state-sponsored technologies to do so. By reviewing recent attacks we can understand, however, how 97% of organizations are not prepared for the fifth generation of cyber attacks. We will then be able to take a closer look at what 2018 may have in store and, most importantly, how best to prepare for it.

(more available)
Added: October 17, 2018
image from 3 Must Have Ways To Analyze Mobile For GDPR Compliance

3 Must Have Ways To Analyze Mobile For GDPR Compliance

This paper seeks to aid organizations with analyzing mobile use and GDPR Compliance.

Added: October 17, 2018
image from AI Based Prevention And Detection

AI Based Prevention And Detection

This report discusses the new evolution in Endpoint Security.

Added: October 17, 2018
image from Annual Incident Reports 2015

Annual Incident Reports 2015

This report is an analaysis of Article 13a annual incident reports in the telecomm sector of the EU.

Added: October 17, 2018
image from Annual Information Security Report 2015

Annual Information Security Report 2015

This “Information Security Report 2015” presents the Fujitsu Group’s information security-related activities.

Added: October 17, 2018
image from Cyber Risk Report 2015

Cyber Risk Report 2015

The goal of this Report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.

(more available)
Added: October 17, 2018
image from Cyber-Security Perceptions And Realities: A View From The C-Suite

Cyber-Security Perceptions And Realities: A View From The C-Suite

This Report is based on the findings of a survey that sought to understand the priorities and viewpoint of the Executive members of multiple organizations around the world, as pertains to cyber-secuirty issues.

(more available)
Added: October 17, 2018
image from DDoS Test Methodology For Reliable Network Security

DDoS Test Methodology For Reliable Network Security

This paper lays out a testing methodology for organizations to dermine if they are prepared to handle DDoS attacks.

Added: October 17, 2018
image from DDoS Threat Report Q1 2018

DDoS Threat Report Q1 2018

This report takes a look at the DDoS threats that occurred in the first quarter of 2018.

Added: October 17, 2018
image from GTIC Monthly Threat Report January 2018

GTIC Monthly Threat Report January 2018

This monthly threat report takes a look at the month of January 2018. Specifically, it looks at two VULNS, the hacking of nuclear weapons, and the increase in suspected Chinese Cyber activity.

(more available)
Added: October 17, 2018
image from Incident Response For Android And iOS

Incident Response For Android And iOS

This book will prepare enterprises and practitioners for the inevitable increase in mobile compromise. We will use step-by-step tutorials, guiding the reader from setting up a mobile IR practice all the way through continuous monitoring of mobile devices.

(more available)
Added: October 17, 2018
image from Internet Of Things Cybersecurity Readiness

Internet Of Things Cybersecurity Readiness

This report provides the results of a unique survey designed to analyze their IoT technologies and the struggles and challenges of providing and preparing for security issues related to thos devices.

(more available)
Added: October 17, 2018
  • ««
  • «
  • 37
  • 38
  • 39
  • 40
  • 41
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 12:08 UTC (build b1d7be4)