Emerging Threats Protection Report
In this report, we have researched the detected new round of offensive and destructive cyberattacks directed against Ukraine’s digital infrastructure and its alliances. (more available)
Cyber Threat Brief: US Recognizes Jerusalem As Capital Of Israel
This report takes a look at the cyber threats that occurred when the US recognized Jerusalem as the Capital of Israel. (more available)
Threat Landscape: Republic of South Africa (RSA)
This report offers a view of The Republic of South Africa. And takes a look at the Threat Landscape of that nation. (more available)
The Recent Escalation Between Turkey And The U.S. Provokes Response From Cyber Groups
The recent escalation in tensions between the United States and Turkey over the detention of pastor Andrew Brunson, have prompted Turkish patriotic hacktivist groups to target American websites. (more available)
Russian Invasion of Georgia
The Russian invasion of Georgia was preceded by an intensive build up of cyberattacks attempting to disrupt, deface and bring down critical Georgian governmental and civilian online infrastructure. (more available)
Cyber Threat Landscape: The Aviation Industry
This paper focusses completely on cybersecurity issues in the aviation industry.
Web Application Attack Statistics Q4 2017
This report provides statistics on attacks performed against web applications during the fourth quarter of 2017.
APT28: Center Of The Storm
This report details observations of APT28’s, a Russian Sponsored cyber network, targeting, and an investigation into a related breach. They also provide an update on shifts in the group’s tool development and use, and summarize the tactics APT28 employs to compromise its victims. (more available)
DDoS Threat Report Q2 2016
This report takes a look at the DDoS threats that occurred in the second quarter of 2016.
Digital Souks: Middle Eastern and North African Underground
Trend Micro researchers’ in-depth explorations of the cybercriminal underworld— from Germany1, Brazil2, Japan3, North America4, and China5 to Russia6—have shown how financial gain motivates the way malware, crimeware, personally identifiable information (PII), and stolen commodities change hands. (more available)