Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Web defacement

Below you will find reports with the tag of “Web defacement”

image from Emerging Threats Protection Report

Emerging Threats Protection Report

In this report, we have researched the detected new round of offensive and destructive cyberattacks directed against Ukraine’s digital infrastructure and its alliances. (more available)
Added: April 13, 2022
image from Cyber Threat Brief: US Recognizes Jerusalem As Capital Of Israel

Cyber Threat Brief: US Recognizes Jerusalem As Capital Of Israel

This report takes a look at the cyber threats that occurred when the US recognized Jerusalem as the Capital of Israel. (more available)
Added: November 29, 2018
image from Threat Landscape: Republic of South Africa (RSA)

Threat Landscape: Republic of South Africa (RSA)

This report offers a view of The Republic of South Africa. And takes a look at the Threat Landscape of that nation. (more available)
Added: November 29, 2018
image from The Recent Escalation Between Turkey And The U.S. Provokes Response From Cyber Groups

The Recent Escalation Between Turkey And The U.S. Provokes Response From Cyber Groups

The recent escalation in tensions between the United States and Turkey over the detention of pastor Andrew Brunson, have prompted Turkish patriotic hacktivist groups to target American websites. (more available)
Added: November 29, 2018
image from Russian Invasion of Georgia

Russian Invasion of Georgia

The Russian invasion of Georgia was preceded by an intensive build up of cyberattacks attempting to disrupt, deface and bring down critical Georgian governmental and civilian online infrastructure. (more available)
Added: November 9, 2018
image from Cyber Threat Landscape: The Aviation Industry

Cyber Threat Landscape: The Aviation Industry

This paper focusses completely on cybersecurity issues in the aviation industry.
Added: October 23, 2018
image from Web Application Attack Statistics Q4 2017

Web Application Attack Statistics Q4 2017

This report provides statistics on attacks performed against web applications during the fourth quarter of 2017.
Added: October 23, 2018
image from APT28: Center Of The Storm

APT28: Center Of The Storm

This report details observations of APT28’s, a Russian Sponsored cyber network, targeting, and an investigation into a related breach. They also provide an update on shifts in the group’s tool development and use, and summarize the tactics APT28 employs to compromise its victims. (more available)
Added: October 20, 2018
image from DDoS Threat Report Q2 2016

DDoS Threat Report Q2 2016

This report takes a look at the DDoS threats that occurred in the second quarter of 2016.
Added: October 18, 2018
image from Digital Souks: Middle Eastern and North African Underground

Digital Souks: Middle Eastern and North African Underground

Trend Micro researchers’ in-depth explorations of the cybercriminal underworld— from Germany1, Brazil2, Japan3, North America4, and China5 to Russia6—have shown how financial gain motivates the way malware, crimeware, personally identifiable information (PII), and stolen commodities change hands. (more available)
Added: October 17, 2018
© Cyentia Institute 2022
Library updated: July 1, 2022 04:08 UTC (build d6199b1)