Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Web browser

Below you will find reports with the tag of “Web browser”

image from Sunburst Backdoor - Code Overlaps with Kazuar

Sunburst Backdoor - Code Overlaps with Kazuar

This report looks at the malware used by a group called Sunburst. It gives a detailed timeline of attacks, and the code used in them. (more available)
Added: January 11, 2021
image from 2020 Phishing and Fraud Report

2020 Phishing and Fraud Report

The 2020 edition of this annual report reviews five years of phishing events from F5’s Security Operations Center. This data is supplemented with active and confirmed phishing sites from Webroot and darkweb market data from Vigilante for a broad view of the volume and techniques of phishing activity. (more available)
Added: November 16, 2020
image from 2020 Global Financial Crime Investigations Survey Report

2020 Global Financial Crime Investigations Survey Report

This report is based on a survey of investigators from over 150 organizations. It seeks to better understand financial crime and how companies deal with it. (more available)
Added: October 25, 2020
image from Web Application Vulnerability Report 2020

Web Application Vulnerability Report 2020

A review of web application vulnerabilities as seen through Acuentix’s web scans between March 2019 and February 2020.
Added: September 30, 2020
image from 2020 State of Malware Report

2020 State of Malware Report

This report goes in-depth into the changes in malware attacks for 2020, using data collected from honey pots, telemetry, and research conducted by threat analysts and reporters in 2019. (more available)
Added: September 28, 2020
image from More Evidence of APT Hackers-for-Hire Used for Industrial Espionage

More Evidence of APT Hackers-for-Hire Used for Industrial Espionage

Bitdefender researchers recently investigated a sophisticated APT-style cyberespionage attack targeting aninternational architectural and video production company, pointing to an advanced threat actor and a South Korean based C&C infrastructure. (more available)
Added: September 1, 2020
image from 2020 Open Source Security and Risk Analysis Report

2020 Open Source Security and Risk Analysis Report

The 2020 OSSRA includes insights and recommendations to help security, risk, legal, and development teams better understand the open source security and license risk landscape. (more available)
Added: July 31, 2020
image from Weaving a Safer Web: The State and Significance of TLS 1.2 Support

Weaving a Safer Web: The State and Significance of TLS 1.2 Support

A deep dive into the state of deploying the latest TLS version (v1.2) and the use of this signal for correlating with broader public-facing risk surfaces and characteristics of firms. (more available)
Added: July 6, 2020
image from State of Open Source Security Report 2020

State of Open Source Security Report 2020

The annual report from Snyk on the state of open source software from a security perspective. Includes survey data from 500+ developers, internal Snyk vulnerability data from the projects monitored by Snyk, and additional aggregated source code repository data. (more available)
Added: June 25, 2020
image from 2019 Phishing and Fraud Report

2019 Phishing and Fraud Report

F5’s third annual report, partnering with Webroot and the F5 SOC, on phishing and fraud trends.
Added: April 27, 2020
image from 2019 TLS Telemetry Report

2019 TLS Telemetry Report

Overview of deployment of TLS encryption in the general internet and Alex Top 1000 sites.
Added: April 17, 2020
image from Microsoft Vulnerabilities Report 2020

Microsoft Vulnerabilities Report 2020

This is the 7th annual edition of the Microsoft Vulnerabilities Report, and includes a five-year trend comparison, giving you a better understanding of how vulnerabilities are growing and in which specific products. (more available)
Added: April 5, 2020
image from 2019 Website Threat Research Report

2019 Website Threat Research Report

Our 2019 Threat Research Report is a deep dive into our logs, experiences, and collected analysis. It summarizes and identifies the latest tactics, techniques, and procedures seen by the Malware Research team, Vulnerability Research team, Threat Intel Research team and Remediation Groups at Sucuri/GoDaddy. (more available)
Added: March 29, 2020
image from Bot Baseline: Fraud in Digital Advertising

Bot Baseline: Fraud in Digital Advertising

For the fourth time, White Ops and the ANA have partnered to measure bot fraud in the digital advertising ecosystem. Previous studies measured bot fraud in the digital advertising ecosystem in August/September 2014, August/September 2015, and November/December 2016. (more available)
Added: March 15, 2020
image from The state of JavaScript frameworks security report 2019

The state of JavaScript frameworks security report 2019

This report covers: the security practices for each of the two different core projects, both Angular and React, the state of security of each of the two different module ecosystems, based on an in-depth look at the vulnerabilities contained in each of the ecosystems, the security practices for other common JavaScript frontend framework alternatives such as Vue. (more available)
Added: February 12, 2020
image from LexisNexis Risk Solutions Cybercrime Report

LexisNexis Risk Solutions Cybercrime Report

The LexisNexis® Risk Solutions Cybercrime Report is based on cybercrime attacks detected by the LexisNexis® Digital Identity Network® from January – June 2019, during real-time analysis. (more available)
Added: February 9, 2020
image from Dark Web 201: How to Leverage External Threat Hunting to Prevent Cyberattacks

Dark Web 201: How to Leverage External Threat Hunting to Prevent Cyberattacks

A necessary pillar of an effective cyber defense strategy is the capability to detect and mitigate threats at the earliest stages of the cyber kill chain. (more available)
Added: September 18, 2019
image from Hacker's Playbook 2nd Edition Q4 2016

Hacker's Playbook 2nd Edition Q4 2016

From the report, “How do we actually “play the hacker”? We do this by deploying simulators that play the role of a “virtual hacker” across endpoints, network and cloud, and execute breach methods from our hacker’s playbook. (more available)
Added: July 10, 2019
image from SSL/TLS Certificates and Their Prevalence on the Dark Web (First Report)

SSL/TLS Certificates and Their Prevalence on the Dark Web (First Report)

To shine a light on the availability of SSL/TLS certificates on the dark web, the Evidence-based Cybersecurity Research Group at the Andrew Young School of Policy Studies at Georgia State University and the University of Surrey spearheaded a research program, sponsored by Venafi. (more available)
Added: May 3, 2019
image from Threat Report: Medical Devices

Threat Report: Medical Devices

This report takes a specific look back at connected medical device events that occurred in 2017.
Added: March 9, 2019
image from Are You Trading Stocks Securely?

Are You Trading Stocks Securely?

This paper demonstrates vulnerabilities that affect numerous traders. Among them are unencrypted authentication, communications, passwords, and trading data; remote DoS that leaves applications useless; trading programming languages that allow DLL imports; insecurely implemented chatbots; weak password policies; hardcoded secrets; and poor session management. (more available)
Added: March 9, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 7
  • »
  • »»
© Cyentia Institute 2021
Library updated: January 18, 2021 20:05 UTC (build 7e736b2)