Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Web Defacement

Below you will find reports with the tag of “Web Defacement”

image from Emerging Threats Protection Report

Emerging Threats Protection Report

In this report, we have researched the detected new round of offensive and destructive cyberattacks directed against Ukraine’s digital infrastructure and its alliances.

(more available)
Added: April 13, 2022
image from Cyber Threat Brief: US Recognizes Jerusalem As Capital Of Israel

Cyber Threat Brief: US Recognizes Jerusalem As Capital Of Israel

This report takes a look at the cyber threats that occurred when the US recognized Jerusalem as the Capital of Israel.

(more available)
Added: November 29, 2018
image from Threat Landscape: Republic of South Africa (RSA)

Threat Landscape: Republic of South Africa (RSA)

This report offers a view of The Republic of South Africa. And takes a look at the Threat Landscape of that nation.

(more available)
Added: November 29, 2018
image from The Recent Escalation Between Turkey And The U.S. Provokes Response From Cyber Groups

The Recent Escalation Between Turkey And The U.S. Provokes Response From Cyber Groups

The recent escalation in tensions between the United States and Turkey over the detention of pastor Andrew Brunson, have prompted Turkish patriotic hacktivist groups to target American websites. Historically, the two most prominent hacktivist groups Aslan Neferler Tim (ANT) and Turk Hack Team (THT) have reacted to political issues impacting Turkey, by targeting the perceived adversary with low level nuisance attacks such as web defacements and Distributed Denial of Service attacks (DDoS). As the political situation deteriorates, Anomali expects to see an increase in hacktivist related activity targeting American websites.

(more available)
Added: November 29, 2018
image from Russian Invasion of Georgia

Russian Invasion of Georgia

The Russian invasion of Georgia was preceded by an intensive build up of cyberattacks attempting to disrupt, deface and bring down critical Georgian governmental and civilian online infrastructure. The campaign has been reported in the media, with wide coverage suggesting the campaign was a spontaneous outburst of popular feeling in Russia lead by independent hackers. However, as this report suggests, the offensive was too large, coordinated, and sophisticated to be the work of independent hackers; the evidence leads by-and large to the Russian Business Network (RBN) in St. Petersburg, Russia. Whilst only a criminal investigation can directly prove the involvement of the Kremlin, both experts and commentators have accused Moscow of sponsoring the attacks as their magnitude requires the involvement of the kind of resources only a state-sponsor can provide.

(more available)
Added: November 9, 2018
image from Cyber Threat Landscape: The Aviation Industry

Cyber Threat Landscape: The Aviation Industry

This paper focusses completely on cybersecurity issues in the aviation industry.

Added: October 23, 2018
image from Web Application Attack Statistics Q4 2017

Web Application Attack Statistics Q4 2017

This report provides statistics on attacks performed against web applications during the fourth quarter of 2017.

Added: October 23, 2018
image from APT28: Center Of The Storm

APT28: Center Of The Storm

This report details observations of APT28’s, a Russian Sponsored cyber network, targeting, and an investigation into a related breach. They also provide an update on shifts in the group’s tool development and use, and summarize the tactics APT28 employs to compromise its victims.

(more available)
Added: October 20, 2018
image from DDoS Threat Report Q2 2016

DDoS Threat Report Q2 2016

This report takes a look at the DDoS threats that occurred in the second quarter of 2016.

Added: October 18, 2018
image from Digital Souks: Middle Eastern and North African Underground

Digital Souks: Middle Eastern and North African Underground

Trend Micro researchers’ in-depth explorations of the cybercriminal underworld— from Germany1, Brazil2, Japan3, North America4, and China5 to Russia6—have shown how financial gain motivates the way malware, crimeware, personally identifiable information (PII), and stolen commodities change hands. While their marketplaces are profit-driven and focused on flaunting their wares, we observed that the Middle Eastern and North African (MENA) underground was somewhat different with its ironic mix of ideology and felony.

(more available)
Added: October 17, 2018
© Cyentia Institute 2025
Library updated: June 27, 2025 12:08 UTC (build b1d7be4)