Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Web application

Below you will find reports with the tag of “Web application”

image from Internt of Tip-offs (IoT)

Internt of Tip-offs (IoT)

An analysis on the indicators to be derived from detecting Internet of Things (IoT) in organization’s public internet facing profiles.
Added: January 26, 2021
image from New Vulnerability Found: Executive Overconfidence

New Vulnerability Found: Executive Overconfidence

This report attempts to understand the theory and practice of web application security in organizations worldwide.
Added: October 14, 2020
image from Web Application Vulnerability Report 2020

Web Application Vulnerability Report 2020

A review of web application vulnerabilities as seen through Acuentix’s web scans between March 2019 and February 2020.
Added: September 30, 2020
image from DDoS Threat Report Q2 2019

DDoS Threat Report Q2 2019

This quarterly threat report offers insight into the DDoS attacks that occurred in the 2nd quarter of 2019.
Added: September 16, 2020
image from Weaving a Safer Web: The State and Significance of TLS 1.2 Support

Weaving a Safer Web: The State and Significance of TLS 1.2 Support

A deep dive into the state of deploying the latest TLS version (v1.2) and the use of this signal for correlating with broader public-facing risk surfaces and characteristics of firms. (more available)
Added: July 6, 2020
image from AWS Shield: Threat Landscape Report - Q1 2020

AWS Shield: Threat Landscape Report - Q1 2020

The inaugural threat report from the AWS Shield managed security service. Primarily covers volumetric statistics seen on the AWS Shield platform. (more available)
Added: June 1, 2020
image from 2019 TLS Telemetry Report

2019 TLS Telemetry Report

Overview of deployment of TLS encryption in the general internet and Alex Top 1000 sites.
Added: April 17, 2020
image from Bromium Insights Report: April 2019

Bromium Insights Report: April 2019

This report from Bromium offers insights into notable threats and events from 2019.
Added: May 18, 2019
image from SSL/TLS Certificates and Their Prevalence on the Dark Web (First Report)

SSL/TLS Certificates and Their Prevalence on the Dark Web (First Report)

To shine a light on the availability of SSL/TLS certificates on the dark web, the Evidence-based Cybersecurity Research Group at the Andrew Young School of Policy Studies at Georgia State University and the University of Surrey spearheaded a research program, sponsored by Venafi. (more available)
Added: May 3, 2019
image from The Deserialization Problem

The Deserialization Problem

The problem that occurs when applications deserialize data from untrusted sources is one of the most widespread security vulnerabilities to occur over the last couple years. (more available)
Added: March 26, 2019
image from Industry Cyber-Exposure Report: ASX 200

Industry Cyber-Exposure Report: ASX 200

Using information from Rapid7’s Project Sonar internet telemetry service, this report reviews several dimensions of demonstrated security controls for companies in the S&P 200 and ASX (Australian) stock indices. (more available)
Added: March 16, 2019
image from 2018 Healthcare Threat Report

2018 Healthcare Threat Report

From this one page report, “Healthcare organizations possess some of the most valuable information exchanged on the black market, including social security numbers, patient records, financial information and intellectual property. (more available)
Added: February 5, 2019
image from Tracking Subaat: Targeted Phishing Attack Leads to Threat Actor’s Repository

Tracking Subaat: Targeted Phishing Attack Leads to Threat Actor’s Repository

In mid-July, Palo Alto Networks Unit 42 identified a small targeted phishing campaign aimed at a government organization. While tracking the activities of this campaign, we identified a repository of additional malware, including a web server that was used to host the payloads used for both this attack as well as others. (more available)
Added: November 15, 2018
image from Turla group using Neuron and Nautilus tools alongside Snake malware

Turla group using Neuron and Nautilus tools alongside Snake malware

This report provides new intelligence by the NCSC on two tools used by the Turla group to target the UK. It contains IOCs and signatures for detection by network defenders. (more available)
Added: November 15, 2018
image from Lazarus Under The Hood

Lazarus Under The Hood

This paper is the result of forensic investigations by Kaspersky Lab at banks in two countries far apart. It reveals new modules used by Lazarus group and strongly links the tools used to attack systems supporting SWIFT to the Lazarus Group’s arsenal of lateral movement tools. (more available)
Added: November 15, 2018
image from Several Polish banks hacked, information stolen by unknown attackers

Several Polish banks hacked, information stolen by unknown attackers

Multiple Polish banks have fallen victim to malware. This post contains what information was public about the attack at the time. (more available)
Added: November 12, 2018
image from Internet Security Report Quarter 1

Internet Security Report Quarter 1

Have you ever wondered what 0 types of cyber attacks affect small to midsize businesses (SMBs) and distributed enterprises (DEs)? Well, you’ve come to the right place. (more available)
Added: October 26, 2018
image from 2015 Vulnerability Statistics Report

2015 Vulnerability Statistics Report

This document discusses the vulnerabilities discovered by edgescanTM over the past year – 2015. The vulnerabilities discovered are a result of providing continuous vulnerability management to a wide range of client verticals; from Small Businesses to Global Enterprises; Telecoms & Media, Software Development, Gaming, Energy and Medical organizations. (more available)
Added: October 25, 2018
image from Cloud Security Trends: October 2017

Cloud Security Trends: October 2017

This is a report on cloud security trends.
Added: October 25, 2018
image from Crowdstrike Services Casebook Report 2017

Crowdstrike Services Casebook Report 2017

This report provides key takeaways that can inform both executive stakeholders and security professionals how to respond to intrusions more effectively. (more available)
Added: October 25, 2018
image from How To Instrument For Adanced Web Application Penetration Testing

How To Instrument For Adanced Web Application Penetration Testing

This technical white paper describes a new approach to identifying your most critical web application vulnerabilities faster and at lower cost. (more available)
Added: October 25, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2021
Library updated: March 3, 2021 08:06 UTC (build 7e736b2)