Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Web Browser

Below you will find reports with the tag of “Web Browser”

image from 2018 Cybercrime Report: Europe DeepDive

2018 Cybercrime Report: Europe DeepDive

The ThreatMetrix European Cybercrime Report: Q1 2018 is based on actual cybercrime attacks from January – March 2018 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from 2017 Cybercrime Report: Travel and Entertainment Industry DeepDive

2017 Cybercrime Report: Travel and Entertainment Industry DeepDive

This report from ThreatMetrix compiles their 2017 Cybercrime report in such a way that they offer unique insight into the travel and entertainment industry and how cybercrime is impacting that arena.

(more available)
Added: January 30, 2019
image from Cybercrime Report: Gaming And Betting

Cybercrime Report: Gaming And Betting

Using intelligence from the ThreatMetrix Digital Identity Network, gaming and gambling companies can accurately differentiate between responsible users and problem gamblers / fraudsters in real time.

(more available)
Added: January 30, 2019
image from Global Internationalized Domain Name Homograph Report Q2/2018

Global Internationalized Domain Name Homograph Report Q2/2018

In this new research report, Farsight Security set out to determine the prevalence and distribution of IDN homographs across the Internet. We examined 100M IDN resolutions over a 12-month period with a focus on over 450 top global brands across 11 sectors including finance, retail, and technology.

(more available)
Added: January 16, 2019
image from Threat Intelligence Report: QR Code Threat Landscape

Threat Intelligence Report: QR Code Threat Landscape

This paper offers insight into QR code usage and user interest and suggests that organizations should take time to consider and familiarize themselves with the potential security ramifications.

(more available)
Added: December 5, 2018
image from Peering Over The DAX 100 Threat Horizon

Peering Over The DAX 100 Threat Horizon

This report offers insight into the German DAX 100 Threat Horizon.

Added: November 29, 2018
image from LexisNexis Risk Solutions Fraud Mitigation Study:2017

LexisNexis Risk Solutions Fraud Mitigation Study:2017

From the report, “Fraud from stolen identities or cyber attacks/hacking were the types of fraud most concerning to fraud mitigation professionals.” Read on to discover more.

(more available)
Added: November 23, 2018
image from Vulnerability Intelligence Report

Vulnerability Intelligence Report

In this report, they provide an overview of current vulnerability disclosure trends and insights into real-world vulnerability demographics in enterprise environments. they analyze vulnerability prevalence in the wild, based on the number of affected enterprises, to highlight vulnerabilities that security practitioners are dealing with in practice - not just in theory.

(more available)
Added: November 16, 2018
image from ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar

ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar

Using data collected from the Lookout global sensor network, the Lookout research team was able to gain unique visibility into the ViperRAT malware, including 11 new, unreported applications. We also discovered and analyzed live, misconfigured malicious command and control servers (C2), from which we were able to identify how the attacker gets new, infected apps to secretly install and the types of activities they are monitoring. In addition, we uncovered the IMEIs of the targeted individuals (IMEIs will not be shared publicly for the privacy and safety of the victims) as well as the types of exfiltrated content.

(more available)
Added: November 15, 2018
image from From Shamoon To Stonedrill

From Shamoon To Stonedrill

This report provides new insights into the Shamoon 2.0 and StoneDrill attacks, including: 1. The discovery techniques and strategies we used for Shamoon and StoneDrill. 2. Details on the ransomware functionality found in Shamoon 2.0. This functionality is currently inactive but could be used in future attacks. 3. Details on the newly found StoneDrill functions, including its destructive capabilities (even with limited user privileges). 4. Details on the similarities between malware styles and malware components’ source code found in Shamoon, StoneDrill and NewsBeef.

(more available)
Added: November 15, 2018
image from Breaking The Weekest Link Of The Strongest Chain

Breaking The Weekest Link Of The Strongest Chain

This post regards the following event - “Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor. The attack compromised their devices and exfiltrated data to the attackers’ command and control server. In addition, the compromised devices were pushed Trojan updates, which allowed the attackers to extend their capabilities. The operation remains active at the time of writing this post, with attacks reported as recently as February 2017.”

(more available)
Added: November 15, 2018
image from Lazarus' False Flag Malware

Lazarus' False Flag Malware

The post contains Analysis on a wave of attacks targeting banks as well as the falsified origins of said attacks.

(more available)
Added: November 12, 2018
image from Certificate Authority Compromise: How Quickly Can Financial Services Restore Trust

Certificate Authority Compromise: How Quickly Can Financial Services Restore Trust

This paper cites a Dimensional Research survey of 250 IT security professionals in financial services organizations located in the U.S., U.K., Germany, France and Australia. The survey examines the challenges faced by the financial services industry in managing certificates, and the results illustrate the importance of incorporating CA-agility into a certificate management strategy. The survey also explores the federal government and other industries, including healthcare, retail and technology.

(more available)
Added: November 6, 2018
image from "Super Clean Plus" Is Anything But: Popular Cleanup App Hides Malicious Intent

"Super Clean Plus" Is Anything But: Popular Cleanup App Hides Malicious Intent

This paper analyzes a cleanup app that is actually malicious.

Added: October 26, 2018
image from 2018 Eye On Privacy Report

2018 Eye On Privacy Report

This paper tries to answer the question, “What does the general public know about data privacy?”

Added: October 26, 2018
image from Applying Deception Mechanisms for Detecting Sophisticated Cyber Attacks

Applying Deception Mechanisms for Detecting Sophisticated Cyber Attacks

The research department at TopSpin Security conducted an experiment to investigate the performance of deception technologies in a simulated corporate environment in which more than 50 professional hackers and security experts used their knowledge and skills to try to extract a pre-defined piece of data and stay undetected. The experiment sought to answer a number of questions, including: 1) What kind of attacker will be attracted to what different type of resources (traps)? 2) What deception mechanisms should the defending organization employ? 3) Where should they be placed? 4) What kind of traps should be used Every attack pattern was carefully monitored and upon completion the data logged was analyzed and aggregated. Trends, attack patterns and statistics were derived from the data logged.

(more available)
Added: October 26, 2018
image from CoinMiner And Other Malicious Cryptominers Targeting Android

CoinMiner And Other Malicious Cryptominers Targeting Android

SophosLabs takes a specific look at threats being downloaded on GooglePlay that mine a mobile phone’s resources while searching for cryptocurrency.

(more available)
Added: October 26, 2018
image from Cyber Threats To The Aerospace And Defense Industries

Cyber Threats To The Aerospace And Defense Industries

Read about the threat outlook for aerospace and defense sectors as threat groups seek to gain military and economic advantages.

(more available)
Added: October 26, 2018
image from Microsoft Security Intelligence Report Volume 22

Microsoft Security Intelligence Report Volume 22

This is the 22nd edition of the Microsoft Security Intelligence Report. In this report, they have organized data sets into two categories, cloud and endpoint. They are sharing data about a shorter time period, one quarter.

(more available)
Added: October 26, 2018
image from 2015 Vulnerability Statistics Report

2015 Vulnerability Statistics Report

This document discusses the vulnerabilities discovered by edgescanTM over the past year – 2015. The vulnerabilities discovered are a result of providing continuous vulnerability management to a wide range of client verticals; from Small Businesses to Global Enterprises; Telecoms & Media, Software Development, Gaming, Energy and Medical organizations.

(more available)
Added: October 25, 2018
image from 2017 Annual Security Report

2017 Annual Security Report

The Annual Cybersecurity Report highlights the relentless push-and-pull dynamic between cyber attackers and cyber defenders. It is intended to help organizations respond effectively to today’s rapidly evolving and sophisticated threats.

(more available)
Added: October 25, 2018
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 20:08 UTC (build b1d7be4)