Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Vulnerability

Below you will find reports with the tag of “Vulnerability”

image from BitSight Insights: Global View

BitSight Insights: Global View

This report will help you learn how understanding the global cyber threat landscape can help evaluate the potential risks of doing business in certain nations. It is the result of studying the performance of companies per country with more than 50% of their IP space in: The United States, United Kingdom, Germany, Brazil, China and Singapore.

(more available)
Added: October 15, 2018
image from Cross-Protocol Request Forgery

Cross-Protocol Request Forgery

This whitepaper formalizes a class of attacks called Cross-Protocol Request Forgery (CPRF) which enables non-HTTP listeners to be exploited through Cross-Site Request Forgery (CSRF) and Server-Side Request Forgery (SSRF). This paper both references existing research and expands upon it in later sections.

(more available)
Added: October 15, 2018
image from Cyberattacks Against Intelligent Transportation Systems

Cyberattacks Against Intelligent Transportation Systems

There is currently very little published research discussing the cybersecurity threats against ITS. In this paper, we first explored real-world ITS cyberattacks and their impact. As cyberattacks and attackers go hand-in-hand, we discussed the most likely perpetrators and their goals and motivations for attacking ITS. We then applied our knowledge of current cyberattacks to develop and analyze future cyberattack scenarios against ITS and Smart Roads.

(more available)
Added: October 15, 2018
image from Data Protection Under POPI

Data Protection Under POPI

This white paper provides insight into becoming complaint with South Africa’s Protection of Personal Information Bill. (POPI)

Added: October 15, 2018
image from Developing Cybersecurity Capacity: A Proof-Of-Concept Implementation Guide

Developing Cybersecurity Capacity: A Proof-Of-Concept Implementation Guide

This project comprised two main research and development phases. The first phase of the project entailed a requirements analysis and architecture-design effort. For further details on this phase, please refer to the first study report. The second phase of the project entailed the development of a proof-of-concept toolbox. This report presents the proof-of-concept toolbox.

(more available)
Added: October 15, 2018
image from Federal Information Security Modernization Act Report to Congress

Federal Information Security Modernization Act Report to Congress

The President of the United States’ Office of Management and Budget, prepared this report. This report covers the period from October 1, 2014, through September 30, 2015, and provides an update of ongoing information security initiatives, a review of Fiscal Year 2015 information security incidents, Inspector General assessments of agencies’ progress in implementing information security capabilities, and the Federal Government’s progress in meeting key information security performance measures based on agency submitted data.

(more available)
Added: October 15, 2018
image from MMap Vulnerabilities - Linux Kernel

MMap Vulnerabilities - Linux Kernel

This article reviews the Linux Kernel, mainly searching for vulnerabilities in different drivers. In this particular article, they took a look into drivers trying to roll their own usage of the mmap() function.

(more available)
Added: October 15, 2018
image from Mobile Banking Applications: Security Challenges For Banks

Mobile Banking Applications: Security Challenges For Banks

Accenture and NowSecure, Inc. analyzed the mobile banking app threat landscape based on industry research, customer-facing mobile banking app vulnerability assessments performed by NowSecure, and Accenture’s industry knowledge and experience working with banking institutions. They collaborated to create a report that was designed to provide an understanding of the current- state security environment for customer- facing mobile banking apps, as well as answer some key questions about the state of mobile banking app security.

(more available)
Added: October 15, 2018
image from Mobile Security Index 2018

Mobile Security Index 2018

This paper discusses what organizations fear and what security measures they are taking to mitigate risks. To find out, they commissioned independent research, surveying more than 600 mobility professionals. The results were eye-opening.

(more available)
Added: October 15, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report May 2016

SecureWorks Threat Intelligence Executive Monthly Report May 2016

This report from May 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 15, 2018
image from Security Response: Insecurity in the Internet of Things

Security Response: Insecurity in the Internet of Things

The Internet of Things is becoming and area of danger for security risks. This paper discusses the cyber security issues related to the internet of things, and discusses how people should be taking action to protect their devices.

(more available)
Added: October 15, 2018
image from Threat Advisory: iCare Leak

Threat Advisory: iCare Leak

This is a threat advisory for iCare Leak

Added: October 15, 2018
image from Threat Landscape Report Q1 2018

Threat Landscape Report Q1 2018

This report continues Fortinet’s excellent threat report. It discusses operational technology, Zero-day markets, malware, cryptojacking, the hacking event at the winter olympics, the rise of botnets, and Adromeda. Read On!

(more available)
Added: October 15, 2018
image from Threat Report

Threat Report

Advice in this report ranges from the tactical to the strategic. Recognize the importance of solutions that can provide specific benefits yet work as part of a unified security posture. They claim that their security recommendations will provide actionable information and guidance, while taking into account the need for organizations to grow and innovate at the same time.

(more available)
Added: October 15, 2018
image from Trusted Access Report 2016

Trusted Access Report 2016

This paper takes a look at the current state of device security.

Added: October 15, 2018
image from 2016 State of the Endpoint Report

2016 State of the Endpoint Report

This annual study is conducted by Ponemon Institute to understand trends and changes in endpoint risk in organizations. An endpoint can include servers, desktops, laptops, smartphones, and even printers, ATMs and PoS devices. They surveyed 694 US IT and IT security practitioners who are involved in endpoint security in a variety of organizations.

(more available)
Added: October 14, 2018
image from 2017 Fintech Security Analysis Report

2017 Fintech Security Analysis Report

This very thorough report is based on a survey that sought to understand the security status of China’s Fintech Enterprises.

(more available)
Added: October 14, 2018
image from A Guide To The Security Of Voice-Activated Smart Speakers: An ISTR Special Report

A Guide To The Security Of Voice-Activated Smart Speakers: An ISTR Special Report

This special report brought to you by the folks at Symantec, takes a hard look at the security issues that surround smart speakers.

(more available)
Added: October 14, 2018
image from An Introduction To Machine Learning For Mobile Security

An Introduction To Machine Learning For Mobile Security

A close inspection of one of the most exciting and promising fields of research in 2017, and how it might be applied to the fast-moving world of mobile security.

(more available)
Added: October 14, 2018
image from Annual Security Roundup: The Paradox Of Cyberthreats

Annual Security Roundup: The Paradox Of Cyberthreats

This report reviews the significant cyber events of 2017, and discusses the paradox that occurred.

Added: October 14, 2018
image from Best Practices For Web Application Firewall Management

Best Practices For Web Application Firewall Management

The experts at TrustWave have prepared this report to outline the issues and practices for web application firewall management.

Added: October 14, 2018
  • ««
  • «
  • 40
  • 41
  • 42
  • 43
  • 44
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 08:08 UTC (build b1d7be4)