Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Zero-day

Below you will find reports with the tag of “Zero-day”

image from DevSecOps Community Survey 2020

DevSecOps Community Survey 2020

The seventh annual survey from Sonatype covers the differences between mature and immature DevOps practices. Special focuses on developer satisfaction, security policy adherence, and security investments. (more available)
Added: June 12, 2020
image from Radware DDoS Protection Market Impact Report

Radware DDoS Protection Market Impact Report

This report goes in depth on Radware’s performance in mitigating DDoS attacks.
Added: May 21, 2020
image from Analysis: Pricing of Goods and Services on the Deep & Dark Web

Analysis: Pricing of Goods and Services on the Deep & Dark Web

The survey results and relevant observations are as follows: The inner workings of this underground economy havecome to play an influential role in many of the cyberand physical risks facing organizations today. (more available)
Added: February 18, 2020
image from Threat Insights Report: June 2019

Threat Insights Report: June 2019

Bromium Insights Report is designed to help our customers become more aware of emerging threats and trends and to equip security teams with knowledge and tools to combat today’s attacks and anticipate evolving threats to manage their security posture. (more available)
Added: July 10, 2019
image from RiskSense Vulnerability Weaponization Insights

RiskSense Vulnerability Weaponization Insights

This Spotlight report provides in-depth analysis of vulnerabilities and weaponization patterns across the entire family of Adobe products. By focusing on weaponization, we go beyond simply counting vulnerabilities, and instead reveal how popular software from a leading vendor becomes a beacon for attackers. (more available)
Added: May 3, 2019
image from SSL/TLS Certificates and Their Prevalence on the Dark Web (First Report)

SSL/TLS Certificates and Their Prevalence on the Dark Web (First Report)

To shine a light on the availability of SSL/TLS certificates on the dark web, the Evidence-based Cybersecurity Research Group at the Andrew Young School of Policy Studies at Georgia State University and the University of Surrey spearheaded a research program, sponsored by Venafi. (more available)
Added: May 3, 2019
image from DDoS Threat Report Q4 2018

DDoS Threat Report Q4 2018

This quarterly threat report offers insight into the DDoS attacks that occurred in the 4th quarter of 2018.
Added: March 26, 2019
image from The Deserialization Problem

The Deserialization Problem

The problem that occurs when applications deserialize data from untrusted sources is one of the most widespread security vulnerabilities to occur over the last couple years. (more available)
Added: March 26, 2019
image from The Life of a Zero day

The Life of a Zero day

From the report, “We live in incredible times, where we trust more of our lives to machines that are becoming ever more powerful. (more available)
Added: February 6, 2019
image from The State of AI in Cybersecurity: The Benefits, Limitations and Evolving Questions

The State of AI in Cybersecurity: The Benefits, Limitations and Evolving Questions

Osterman Research conducted an in-depth survey of decision makers and influencers. To qualify for the survey, individuals had to be knowledgeable about the security operations in their organizations and their organizations had to have at least 1,000 employees. (more available)
Added: January 15, 2019
image from Morphisec Labs Threat Report: December 2018

Morphisec Labs Threat Report: December 2018

This Morphisec Labs Threat Report is based on anonymized threat data collected from approximately 2,000,000 installed Morphisec endpoint agents as well as in-depth investigations conducted by Morphisec researchers. (more available)
Added: January 15, 2019
image from The Rise Of Machine Learning In Cybersecurity

The Rise Of Machine Learning In Cybersecurity

The purpose of this white paper is to help users understand how CrowdStrike ® uses ML to protect endpoints. To get there, we must first clarify what ML is and how it works. (more available)
Added: January 1, 2019
image from Security Is A Big Data Problem - It Belongs In The Cloud

Security Is A Big Data Problem - It Belongs In The Cloud

This white paper seeks to explore more fully how traditional AV has had its day, and how the principles of big data are now applicable to both detecting and preventing IT security threats. (more available)
Added: January 1, 2019
image from Endpoint Security Isn't Dead - It's Just Getting Smarter

Endpoint Security Isn't Dead - It's Just Getting Smarter

This report details a new Cylance survey of iTnews readers and provides insight into the state of endpoint security.
Added: December 29, 2018
image from A gut feeling of old acquaintances, new tools, and a common battleground

A gut feeling of old acquaintances, new tools, and a common battleground

This blog post discusses how WannaCry is a pet project of the Lazarus group.
Added: November 15, 2018
image from BlackOasis APT and new targeted attacks leveraging zeroday exploit

BlackOasis APT and new targeted attacks leveraging zeroday exploit

This post discusses the following event - “On October 10, 2017, Kaspersky Lab’s advanced exploit prevention systems identified a new Adobe Flash zero day exploit used in the wild against our customers. (more available)
Added: November 15, 2018
image from FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY

FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY

FireEye recently detected a malicious Microsoft Office RTF document that leveraged CVE-2017-8759, a SOAP WSDL parser code injection vulnerability. This vulnerability allows a malicious actor to inject arbitrary code during the parsing of SOAP WSDL definition contents. (more available)
Added: November 15, 2018
image from "Cyber Conflict" Decoy Document Used In Real Cyber Conflict

"Cyber Conflict" Decoy Document Used In Real Cyber Conflict

APT28 sent out a document disguising itself as a flyer relating to the Cyber Conflict U.S. conference. The document contains a VBA macro that executes a new variant of Seduploader. (more available)
Added: November 12, 2018
image from Internet Security Report Quarter 1

Internet Security Report Quarter 1

Have you ever wondered what 0 types of cyber attacks affect small to midsize businesses (SMBs) and distributed enterprises (DEs)? Well, you’ve come to the right place. (more available)
Added: October 26, 2018
image from Threat Intelligence Executive Report 2018: Volume 2

Threat Intelligence Executive Report 2018: Volume 2

This Threat report details some early 2018 threats like ransomware, North Korean hacking, the leveraging of newly exposed vulns.
Added: October 26, 2018
image from DeepGaurd: Proactive On-host Protection Against New And Emerging Threats

DeepGaurd: Proactive On-host Protection Against New And Emerging Threats

This whitepaper explains the trends and developments in computing that have made host-based behavioral analysis and exploit interception necessary elements of computer security and provides an overview of the technology and methodology used by DeepGuard, the Host-based Intrusion Prevention System (HIPS) of F-Secure’s security products. (more available)
Added: October 25, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2021
Library updated: February 26, 2021 00:08 UTC (build 7e736b2)