Report News -  

Úvod  APT  Apple  Attack  BigBrother  Cryptocurrency  Cyber  CyberCrime  CyberSpy  Hacking  ICS  Incidenty  IoT  Malware  Mobile  OS  Phishing  Ransomware  Report  Vulnerebility


 

Datum

Název

Firms

11.3.19

HOW EQUIFAX NEGLECTED CYBERSECURITY AND SUFFERED A DEVASTATING DATA BREACH U.S. House of Representatives Committee on Oversight and Government Reform

5.3.19

2019 DevSecOps Community Survey Sonatype

5.3.19

Chinese Cyberespionage Originating From Tsinghua University Infrastructure Recorded Future
2.3.19 ISTR 24: Symantec’s Annual Threat Report Reveals More Ambitious and Destructive Attacks Symantec
21.2.19 THREATS TO USERS OF ADULT WEBSITES IN 2018 February 2019 Kaspersky
20.2.19 Securing the supply chainCrowdStrike

20.2.19

QUARTERLY Threat Landscape Report Fortinet
30.1.19 ENISA Threat Landscape Report 2018 Enisa
24.1.19 2019 State of Malware Malwarebytes
22.1.19 Threat Trends Analysis Report Checkpoint
13.12.18 InfoArmor reports identification numbers of 120 million Brazilians exposed online InfoArmor
13.12.18 The Equifax Data Breach U.S. House of Representatives Committee on Oversight and Government Reform
26.11.18 Cyberthreats to financial institutions 2019: OVERVIEW AND PREDICTIONS Kaspersky
26.11.18 CRYPTOCURRENCY THREAT PREDICTIONS FOR 2019 Kaspersky
26.11.18 Kaspersky Security Bulletin: THREAT PREDICTIONS FOR INDUSTRIAL SECURITY IN 2019 Kaspersky
23.11.18 THREAT PREDICTIONS FOR 2019 Kaspersky
19.11.18 SOPHOSLABS 2019 THREAT REPORT Sophos
16.11.18 Buyer beware: cyberthreats targeting e-commerce, 18 Kaspersky
12.11.18 Android Security 17 Year In Review Android
10.11.18 Vulnerability Intelligence Report Tenable
8.11.18 China ’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’ s BGP Hijacking Military Cyber Affairs
8.11.18 INSIDER THREAT PROGRAM MATURITY FRAMEWORK National Insider Threat Task Force
8.11.18 A FRAMEWORK FOR CYBER INDICATIONS AND WARNING INSA
6.11.18 Cybersecurity Professionals Focus on Developing New Skills as Workforce Gap Widens (ISC)2
2.11.18 The hidden threat of cyberattacks in the energy and utilities industry Vectra
30.10.18 RANSOMWARE: an enterprise perspective Eset
30.10.18 Exposed and Vulnerable Critical Infrastructure: Stephen Hilt, Numaan Huq, Vladimir Kropotov,
Robert McArdle, Cedric Pernet, and Roel Reyes Water and Energy Industries
Trend Micro
19.10.18 ‘Operation Oceansalt’ Attacks South Korea, U.S., and Canada With Source Code From Chinese Hacker Group McAfee
19.10.18 GREYENERGY A successor to BlackEnergy Eset
18.10.18 Cybercrime tactics and techniques: Q3 18 Malwarebytes
15.10.18 The General Data Protection Regulation  Lawful basis for processing icon.
3.10.18 Malware Analysis Report Dissencting GandCrab v5 ZLabs
27.9.18 LOJAX First UEFI rootkit found in the wild, courtesy of the Sednit group Eset
22.9.18 From data boom to data doom: the risks and rewards of protecting personal data Kaspersky
20.9.18 F5 ReportApplication Protection REPORT F5
20.9.18 INTERNET ORGANISED CRIME THREAT ASSESSMENT IOCTA
20.9.18 Lucrative Ransomware Attacks: Analysis of the CryptoWall Version 3 Threat CyberThreat Alliance
20.9.18 BLACK HAT 18 HACKER SURVEY REPORT thycotic
19.9.18 Malware Analysis Report Dissecting the first Gafgyt bot implementing the “Non Un-Packable” NUP technique ZLabs
15.9.18 Framework for Improving Critical Infrastructure Cybersecurity NIST
15.9.18 5 Critical Steps to a More Mature Security Posture Secureworks
14.9.18 Threat Landscape for Industrial Automation Systems H1 20  
14.9.18 The State of SOAR Report, 18  
14.9.18 DATA PROTECTION Actions Taken by Equifax and Federal Agencies in Response to the 17 Brea  
14.9.18 CYBER THREATSCAPE REPORT 18  
28.8.18 Securing Wireless Infusion Pumps in Healthcare Delivery Organizations NIST
24.8.18 TURLA OUTLOOK BACKDOOR Eset
22.8.18 Triout - The Malware Framework for Android That Packs Potent Spyware Capabilities BitDefender
22.8.18 18 EMAIL SECURITY: TRENDS, CHALLENGES, AND BENCHMARKS GreatHorn
21.8.18 S O L E O IP R ela y - V uln e r a bilit y R e p o r t Project insecurity
21.8.18 18-CHINA-MILITARY-POWER-REPORT DoD
9.8.18 Attacker Behavior Industry Report Vectra
8.8.18 White Hat, Black Hat and the Emergence of the Gray Hat: The True Costs of Cybercrime Malwarebytes
8.8.18 O p e n E M R v 5.0.1.3 - V uln e r a bilit y R e p o r t Project insecurity
8.8.18 N E T S C O U T T H R E A T INTELLIGENCE REPORT  
3.8.18 Attacks on industrial enterprises using RMS and TeamViewer Kaspersky
3.8.18 HeroRAT: Analyzing the Telegram based Android malware ZLabs
1.8.18 SamSam: The (Almost) Six Million Dollar Ransomware F-Secure
30.7.18 18 EMAIL SECURITY: TRENDS, CHALLENGES, AND BENCHMARKS A look at
differences based on organization size, professional role, and email
GreatHorn
23.7.18 Chinese APT 27’s long-term espionage campaign in Syria is still ongoing ZLabs
22.7.18 REPORT OF THE ATTORNEY GENERAL’S CYBER DIGITAL TASK FORCE U.S. DoJ
22.7.18 China, Russia & North Korea Launching Sophisticated, Espionage-Focused Cyberattacks Carbon Black
22.7.18 THE BLACK MARKET REPORT Armor
19.7.18 Russian APT28 Operation Roman Holiday ZLabs
19.7.18 1st Half of 18 — Healthcare Cyber Research Report  
19.7.18 QUASAR, SOBAKEN AND VERMIN: A deeper look into an ongoing espionage campaign Eset
19.7.18 Cybercrime tactics and techniques: Q2 18 Malwarebytes
18.7.18 Building the UK financial sector’s operational resilience Bank of England
5.7.18 Cryptocurrency Anti-Money Laundering Report  
28.6.18 A New Twist In SSDP Attacks NETSCOUT
28.6.18 RedAlpha: New Campaigns Discovered Targeting the Tibetan Community Recorded Future
27.6.18 KSN Report: Ransomware and malicious cryptominers 2016-18 Kaspersky

27.6.18

The Human Behavior Risk Analysis Wiretap

25.6.18

A new variant of Ursnif Banking Trojan served by the Necurs botnet hits Italy ZLabs

18.5.18

U.S. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY STRATEGY

 

16.5.18

INDEPENDENT STUDY PINPOINTS SIGNIFICANT SCADA / ICS CYBERSECURITY RISKS

Fortinet

16.5.18

TheHuman FACTOR REPORT proofpoint.com People-centered threats define the landscape

ProofPoint

11.5.18

OPC UA security analysis

Kaspersky

9.5.18

Russian Targeting of Election Infrastructure During the 2016 Election: Summary of
Initial Findings and Recommendations

 

8.5.18

17 INTERNET CRIME REPORT

FBI

4.5.18

ZOO. CYBERESPIONAGE OPERATION

Kaspersky

4.5.18

THE CHANGING STATE OF RANSOMWARE

F-Secure

3.5.18

Comodo Cybersecurity Q1 18 REPORT

Comodo

25.4.18

The Bandios malware suite

ZLabs

24.4.18

Energetic Bear/Crouching Yeti: attacks on servers

Kaspersky

14.4.18

APT37 (REAPER) The Overlooked North Korean Actor

FireEye

14.4.18

Malware p.i. , Tracking Cloud Infections

Bitglass

13.4.18

UPnProxy: Blackhat Proxies via NAT Injections

Akamai

12.4.18

18 Data Breach Investigations Report

Verizon

12.4.18

Mirai-Variant IoT Botnet Used to Target Financial Sector in January 18

Recorded furniture

12.4.18

Cybercrime tactics and techniques: Q1 18

Malwarebytes

12.4.18

Mobile phishing 18: Myths and facts facing every modern enterprise today

Lockout

8.4.18

Owning the Battlefield

Cybereason

8.4.18

18 GLOBAL DATA RISK REPORT FROM THE VARONIS DATA LAB

Varonis

8.4.18

M-TRENDS18

FireEye

30.3.18

Attacker Behavior Industry Report

Vectra

27.3.18

SentinelOne: Global Ransomware Study 18

SentinelOne

27.3.18

Soft Target: The Top 10 Vulnerabilities Used by Cybercriminals

Recorded Future

14.3.18

GRIZZLY STEPPE – Russian Malicious Cyber Activity

NCCIC

10.3.18

The Slingshot APT

Kaspersky

10.3.18

Business Email Compromise (BEC) Attack Trends Report

Agari

10.3.18

Monero Mining Malware

NTT Security

1.3.18

BRIDGING THE GAP BETWEEN SECOPS INTENT AND REALITY

Threat stack

28.2.18

FINANCIAL CYBERTHREATS IN 17

Kaspersky

28.2.18

Malware Analysis Report: A new variant of Mobef Ransomware

ZLabs

22.2.18

By the Numbers: Global Cyber Risk Perception Survey

MARSCH

21.2.18

The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation

 

20.2.18

APT37 (REAPER)

FireEye

19.2.18

Vulnerability QuickView 17 Vulnerability Trends

VulnDB

17.2.18

Litecoin Emerges as the Next Dominant Dark Web Currency

Recorded furniture

17.2.18

Targeting of Olympic Games IT Infrastructure Remains Unattributed

Recorded furniture

13.2.18

The 17 State of Endpoint Security Risk

Penemon institut

12.2.18

Dark Caracal APT – The Pallas Family

ZLabs

7.2.18

DOOMED TO REPEAT HISTORY?

OPEN TECHNOLOGY INSTITUTE

26.1.18

Cybercrime tactics and techniques: 17 state of malware

Malwarebytes

22.1.18

Operation EvilTraff

ZLabs

19.1.18

THE 18 HACKER REPORT

Hackerone

19.1.18

Dark Caracal Cyber-espionage at a Global Scale

Lookout/EFC

19.1.18

Report-The-Year-of-the-Defender

Cybereason

19.1.18

iOS Security iOS 11 January 18

Apple

11.1.18

The stealth process injection of the new Ursnif malware

ZLabs

9.1.18

ISTR Volume 22

Symantec

3.1.18

Q3 17 Global DDoS Threat Landscape Report

Imperva

22.12.17

North Korea Bitten by Bitcoin Bug

Proofpoint

21.12.17

Malware Analysis Report: Bladabindi.Dec17

ZLabs

19.12.17

Kaspersky Security Bulletin: OVERALL STATISTICS FOR 17

Kaspersky

8.12.17

Framework for Improving Critical Infrastructure Cybersecurity 2.0

NIST

8.12.17

Cyber intrusion services casebook 17

CrowdStrike

4.12.17

Malware Analysis Report: Fake 3MobileUpdater

ZLabs

1.12.17

gtic-17-q3-threat-intelligence-report

NTT

29.11.17

Kaspersky Security Bulletin: STORY OF THE YEAR 17

Kaspersky

29.11.17

q3-17-state-of-the-internet-security-report

Akamai

28.11.17

17-benchmarking-us-government-websites

ITIF

21.11.17

OWASP Top 10 - 17

OWASP

19.11.17

Beyond Black Friday Threat Report 17

Kaspersky

16.11.17

KASPERSKY LAB THREAT PREDICTIONS FOR 18

Kaspersky

16.11.17

Appendix: Analysis of the Mokes/SmokeBot backdoor from the incident

Kaspersky

2.11.17

1H 17 Shadow A huge trove of patient data leaks, thanks to Data Report

Symantec

1.11.17

Malware Analysis Report: Bad Rabbit

ZLabs

15.10.17

Post-Soviet Bank Heists: A Hybrid Cybercrime Study

Spider labs

15.10.17

DoD Cybersecurity Discipline Implementation Pl

DoD USA

15.10.17

Office 365 Adoption Survey

Barracude

7.10.17

ISTR Email Threats 17

Symantec

4.10.17

Appthority’s report

Appthority

29.9.17

The Apple of Your EFI

Duo Labs Report

28.9.17

Threat Landscape for Industrial Automation Systems in H1 17

Kaspersky

27.9.17

INTERNET ORGANISED CRIME THREAT ASSESSMENT 17

Europol

23.9.17

Webroot_Quarterly_Threat_Trends_September_17

Webroot

18.9.17

Zimperium_Mobile_Threat_Report_Q2_17

Zimperium

18.9.17

NotPetya-report.pdf

ZLabs

11.9.17

ISTR Ransomware 17

Symantec

23.8.17

q2-17-state-of-the-internet-security-report.pdf

Akamai

9.8.17

National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework

NIST

5.8.17

Kaspersky KSN Report Ransomware 2016-17

Kaspersky

5.8.17

AV-TEST Security Report 2016/17

AV-Test

5.8.17

APPLICATION SECURITY STATISTICS REPORT 17

White Hat

1.8.17

Symantec ISTR Financial Threats Review 17

Symantec

1.8.17

Cybercrime tactics and techniques Q2 17

Malwarebytes

31.7.17

RDoS Attacks: DDoS For Ransom Blooms in the Spring

Radware

31.7.17

Comodo Threat Research Labs Q2 17 REPORT

Comodo

31.7.17

Comodo Threat Research Labs Q1 17 REPORT

Comodo

31.7.17

Symantec ISTR

Symantec