Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Web Application

Below you will find reports with the tag of “Web Application”

image from Lazarus Under The Hood

Lazarus Under The Hood

This paper is the result of forensic investigations by Kaspersky Lab at banks in two countries far apart. It reveals new modules used by Lazarus group and strongly links the tools used to attack systems supporting SWIFT to the Lazarus Group’s arsenal of lateral movement tools.

(more available)
Added: November 15, 2018
image from Several Polish banks hacked, information stolen by unknown attackers

Several Polish banks hacked, information stolen by unknown attackers

Multiple Polish banks have fallen victim to malware. This post contains what information was public about the attack at the time.

(more available)
Added: November 12, 2018
image from Internet Security Report Quarter 1

Internet Security Report Quarter 1

Have you ever wondered what 0 types of cyber attacks affect small to midsize businesses (SMBs) and distributed enterprises (DEs)? Well, you’ve come to the right place.

(more available)
Added: October 26, 2018
image from 2015 Vulnerability Statistics Report

2015 Vulnerability Statistics Report

This document discusses the vulnerabilities discovered by edgescanTM over the past year – 2015. The vulnerabilities discovered are a result of providing continuous vulnerability management to a wide range of client verticals; from Small Businesses to Global Enterprises; Telecoms & Media, Software Development, Gaming, Energy and Medical organizations.

(more available)
Added: October 25, 2018
image from Cloud Security Trends: October 2017

Cloud Security Trends: October 2017

This is a report on cloud security trends.

Added: October 25, 2018
image from Crowdstrike Services Casebook Report 2017

Crowdstrike Services Casebook Report 2017

This report provides key takeaways that can inform both executive stakeholders and security professionals how to respond to intrusions more effectively. Most importantly, it offers recommendations that organizations can implement proactively — right now — to improve their ability to prevent, detect and respond to attacks.

(more available)
Added: October 25, 2018
image from How To Instrument For Adanced Web Application Penetration Testing

How To Instrument For Adanced Web Application Penetration Testing

This technical white paper describes a new approach to identifying your most critical web application vulnerabilities faster and at lower cost.

(more available)
Added: October 25, 2018
image from Q2 2017 Phishing Trends And Intelligence Report

Q2 2017 Phishing Trends And Intelligence Report

The data and observations presented in this report are sourced from the continuous work PhishLabs does to fight back against phishing attacks and the threat actors behind them. The information highlighted in this report will help organizations better assess and mitigate the risk posed by modern phishing attacks.

(more available)
Added: October 25, 2018
image from The Deserialization Problem

The Deserialization Problem

This paper answers questions about what the deserialization vulnerability is, and what the challenges are to solving it.

Added: October 25, 2018
image from DDoS Glossary Of Terms

DDoS Glossary Of Terms

This Distributed Denial of Service (DDoS) attack glossary is intended to provide a high level overview of the various DDoS attack types and typical DDoS attack characteristics.

(more available)
Added: October 23, 2018
image from State of the Internet - Security Q3 2016 report

State of the Internet - Security Q3 2016 report

In the Akamai State of the Internet - Security Report, you’ll get detailed cloud security insights about DDoS and web application attack trends observed across the Akamai Intelligent Platform™ for Q3 2016.

(more available)
Added: October 23, 2018
image from State of the Internet Security 2nd Quarter 2017

State of the Internet Security 2nd Quarter 2017

This is Akamai’s State of The Internet Security report from the second quarter of 2017

Added: October 22, 2018
image from Hacker Machine Interface: The State Of SCADA HMI Vulnerabilities

Hacker Machine Interface: The State Of SCADA HMI Vulnerabilities

The Stuxnet and Ukranian power grid attacks give us clear ideas about how much damage a determined adversary can inflict not only on the business or operation concerned, but also on the general public. This paper takes a look at critical infrastructure attacks.

(more available)
Added: October 21, 2018
image from SERT Quarterly Threat Report 2015

SERT Quarterly Threat Report 2015

“The SERT Quarterly Threat Report provides a glimpse inside the research conducted by Solutionary researchers, security professionals and analysts spanning the last three months and highlights the results of this research. In addition to a wide variety of open-source intelligence tools and honeypots, SERT also analyzes data from the Solutionary ActiveGuard platform. The patented, cloud-based Solutionary ActiveGuard service platform collects, correlates and analyzes security events across systems for Solutionary clients globally, providing researchers with an even deeper understanding of the overall threat landscape.”

(more available)
Added: October 21, 2018
image from State of the Internet - Security Q1 2017 report

State of the Internet - Security Q1 2017 report

This paper represents analysis and research based on data from Akamai’s global infrastructure and routed Distributed Denial of Service (DDoS) solution.

(more available)
Added: October 21, 2018
image from German Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In German Cities

German Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In German Cities

This paper takes a look at the cities of Germany, and the cyber threats that occurred there.

Added: October 20, 2018
image from Ransomware As A Service (RaaS): Deconstructing Philadelphia

Ransomware As A Service (RaaS): Deconstructing Philadelphia

This report provides a thorough analysis of Philadelphia, a a chilling example of ransomware as a service.

Added: October 20, 2018
image from Web Attack Survival Guide

Web Attack Survival Guide

This guide provides a playbook for helping a company prepare for and handle web attacks.

Added: October 20, 2018
image from Website Security Statistic Report

Website Security Statistic Report

From the report, “Rather than provide a lengthy analysis of the data in this Stats Report in this introduction, we’ve decided instead to provide some “what this means to you” commentary at the end of the three main sections of the report; commentary that attempts to make the data relevant to Executives, Security practitioners and DevOps professionals. Security is a concern that spans multiple teams in an organization – from the board and C-suite, to IT and development teams, to the security team and beyond – and the data in this report will mean different things to these different audiences.”

(more available)
Added: October 20, 2018
image from Western European Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In Western Cities

Western European Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In Western Cities

This paper takes a look at the cities of the west, and the cyber threats that occurred there.

Added: October 20, 2018
image from 6 Best Practices For Amazon Security Groups

6 Best Practices For Amazon Security Groups

This paper provides 6 Best Practices for Amazon Security Groups

Added: October 19, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 20:08 UTC (build b1d7be4)