Report News -  

Úvod  APT  Apple  Attack  BigBrother  Cryptocurrency  Cyber  CyberCrime  CyberSpy  Hacking  ICS  Incidenty  IoT  Malware  Mobile  OS  Phishing  Ransomware  Report  Vulnerebility


Datum Název Categorie Firms

14.10.19

The potential of social robots for persuasion and manipulation: a proof of concept study Cyber Kaspersky

8.10.19

Managed Detection and Response Analytics report Report Kaspersky

1.10.19

Zprava-o-stavu-kyberneticke-bezpecnosti-cr-2018-cz Report NÚKIB ČR

29.8.19

Incident Response Analytics Report 2018 Incidenty  Report Kaspersky

28.8.19

MATRIX: A LOW-KEY TARGETED RANSOMWARE Report SOPHOS
28.8.19 SOPHOSLABS 2019 THREAT REPORT Report SOPHOS
28.8.19 Baldr vs The World Malware SOPHOS

23.8.19

Federal Information Security Modernization Act of 2014 Cyber FISMA

29.7.19

2019 SonicWall Cyber Threat Report Report SonicWall

12.7.19

Reinventing Cybersecurity with Artificial Intelligence Cyber Capgemini institute
26.06.2019 FEDERAL CYBERSECURITY: AMERICA’S DATA AT RISK BigBrother Committee on Homeland Security and Governmental Affairs
23.06.2019 CYBERSECURITY MANAGEMENT AND OVERSIGHT AT THE JET PROPULSION LABORATORY Cyber NASA
09.05.2019 TURLA LIGHTNEURON APT Eset
03.05.2019 CRITICAL INFRASTRUCTURE PROTECTION Actions Needed to Address Weaknesses in TSA’s Pipeline Security Program Management ICS GAO
03.05.2019 OE-417 Electric Emergency and Disturbance Report - Calendar Year 2019 Report WECC
27.04.2019 Cybercrime tactics and techniques Q1 2019 Report Malwarebytes
11.03.2019 HOW EQUIFAX NEGLECTED CYBERSECURITY AND SUFFERED A DEVASTATING DATA BREACH Incidenty U.S. House of Representatives Committee on Oversight and Government Reform
05.03.2019 2019 DevSecOps Community Survey Cyber Sonatype
05.03.2019 Chinese Cyberespionage Originating From Tsinghua University Infrastructure BigBrother Recorded Future
02.03.2019 ISTR 24: Symantec’s Annual Threat Report Reveals More Ambitious and Destructive Attacks Report Symantec
21.02.2019 THREATS TO USERS OF ADULT WEBSITES IN 2018 February 2019 Report Kaspersky
20.02.2019 Securing the supply chain Attack CrowdStrike
20.02.2019 QUARTERLY Threat Landscape Report Report Fortinet
30.01.2019 ENISA Threat Landscape Report 2018 Report Enisa
24.01.2019 2019 State of Malware Malware Malwarebytes
22.01.2019 Threat Trends Analysis Report Report Checkpoint
13.12.2018 InfoArmor reports identification numbers of 120 million Brazilians exposed online Incidenty InfoArmor
13.12.2018 The Equifax Data Breach Incidenty U.S. House of Representatives Committee on Oversight and Government Reform
26.11.2018 Cyberthreats to financial institutions 2019: OVERVIEW AND PREDICTIONS Cyber Kaspersky
26.11.2018 CRYPTOCURRENCY THREAT PREDICTIONS FOR 2019 Cyber Kaspersky
26.11.2018 Kaspersky Security Bulletin: THREAT PREDICTIONS FOR INDUSTRIAL SECURITY IN2019 Cyber Kaspersky
23.11.2018 THREAT PREDICTIONS FOR2019 Cyber Kaspersky
19.11.2018 SOPHOSLABS 2019 THREAT REPORT Cyber Sophos
16.11.2018 Buyer beware: cyberthreats targeting e-commerce, 2018 Cyber Kaspersky
12.11.2018 Android Security 2017 Year In Review Report Android
10.11.2018 Vulnerability Intelligence Report Vulnerebility Tenable
08.11.2018 China ’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’ s BGP Hijacking BigBrother Military Cyber Affairs
08.11.2018 INSIDER THREAT PROGRAM MATURITY FRAMEWORK Cyber National Insider Threat Task Force
08.11.2018 A FRAMEWORK FOR CYBER INDICATIONS AND WARNING Cyber INSA
06.11.2018 Cybersecurity Professionals Focus on Developing New Skills as Workforce Gap Widens Cyber (ISC)2
02.11.2018 The hidden threat of cyberattacks in the energy and utilities industry ICS Vectra
30.10.2018 RANSOMWARE: an enterprise perspective Ransomware Eset
30.10.2018 Exposed and Vulnerable Critical Infrastructure: Stephen Hilt, Numaan Huq, Vladimir Kropotov, Robert McArdle, Cedric Pernet, and Roel Reyes Water and Energy Industries ICS Trend Micro
19.10.2018 ‘Operation Oceansalt’ Attacks South Korea, U.S., and Canada With Source Code From Chinese Hacker Group BigBrother McAfee
19.10.2018 GREYENERGY A successor to BlackEnergy Ransomware Eset
18.10.2018 Cybercrime tactics and techniques: Q3 2018 Report Malwarebytes
15.10.2018 The General Data Protection RegulationLawful basis for processing Cyber icon.
03.10.2018 Malware Analysis Report Dissencting GandCrab v5 Ransomware ZLabs
27.09.2018 LOJAX First UEFI rootkit found in the wild, courtesy of the Sednit group Malware Eset
22.09.2018 From data boom to data doom: the risks and rewards of protecting personal data Cyber Kaspersky
20.09.2018 F5 ReportApplication Protection REPORT Report F5
20.09.2018 BLACK HAT 2018 HACKER SURVEY REPORT Report thycotic
20.09.2018 Lucrative Ransomware Attacks: Analysis of the CryptoWall Version 3 Threat Ransomware CyberThreat Alliance
20.09.2018 INTERNET ORGANISED CRIME THREAT ASSESSMENT CyberCrime IOCTA
19.09.2018 Malware Analysis Report Dissecting the first Gafgyt bot implementing the “Non Un-Packable” NUP technique Malware ZLabs
15.09.2018 Framework for Improving Critical Infrastructure Cybersecurity Cyber NIST
15.09.2018 5 Critical Steps to a More Mature Security Posture Cyber Secureworks
14.09.2018 DATA PROTECTION Actions Taken by Equifax and Federal Agencies in Response to the 2017 Brea Cyber  
14.09.2018 The State of SOAR Report, 2018 Report  
14.09.2018 CYBER THREATSCAPE REPORT 2018 Report  
14.09.2018 Threat Landscape for Industrial Automation Systems H1 20 ICS  
28.08.2018 Securing Wireless Infusion Pumps in Healthcare Delivery Organizations Cyber NIST
24.08.2018 TURLA OUTLOOK BACKDOOR APT Eset
22.08.2018 2018 EMAIL SECURITY: TRENDS, CHALLENGES, AND BENCHMARKS Phishing GreatHorn
22.08.2018 Triout - The Malware Framework for Android That Packs Potent Spyware Capabilities Malware BitDefender
21.08.2018 2018-CHINA-MILITARY-POWER-REPORT BigBrother DoD
21.08.2018 S O L E O IP R ela y - V uln e r a bilit y R e p o r t Vulnerebility Project insecurity
09.08.2018 Attacker Behavior Industry Report Attack Vectra
08.08.2018 O p e n E M R v 5.0.1.3 - V uln e r a bilit y R e p o r t Report Project insecurity
08.08.2018 N E T S C O U T T H R E A T INTELLIGENCE REPORT Report  
08.08.2018 White Hat, Black Hat and the Emergence of the Gray Hat: The True Costs of Cybercrime CyberCrime Malwarebytes
03.08.2018 Attacks on industrial enterprises using RMS and TeamViewer Attack Kaspersky
03.08.2018 HeroRAT: Analyzing the Telegram based Android malware Malware ZLabs
01.08.2018 SamSam: The (Almost) Six Million Dollar Ransomware Ransomware F-Secure
30.07.2018 2018 EMAIL SECURITY: TRENDS, CHALLENGES, AND BENCHMARKS A look at differences based on organization size,professional role, and email Phishing GreatHorn
23.07.2018 Chinese APT 27’s long-term espionage campaign in Syria is still ongoing APT ZLabs
22.07.2018 REPORT OF THE ATTORNEY GENERAL’S CYBER DIGITAL TASK FORCE BigBrother U.S. DoJ
22.07.2018 China, Russia & North Korea Launching Sophisticated, Espionage-Focused Cyberattacks BigBrother Carbon Black
22.07.2018 THE BLACK MARKET REPORT Cyber Armor
19.07.2018 QUASAR, SOBAKEN AND VERMIN: A deeper look into an ongoing espionage campaign BigBrother Eset
19.07.2018 1st Half of 2018 — Healthcare Cyber Research Report Report  
19.07.2018 Cybercrime tactics and techniques: Q2 2018 Report Malwarebytes
19.07.2018 Russian APT28 Operation Roman Holiday APT ZLabs
18.07.2018 Building the UK financial sector’s operational resilience BigBrother Bank of England
05.07.2018 Cryptocurrency Anti-Money Laundering Report Cryptocurrency  
28.06.2018 RedAlpha: New Campaigns Discovered Targeting the Tibetan Community Cyber Recorded Future
28.06.2018 A New Twist In SSDP Attacks Attack NETSCOUT
27.06.2018 The Human Behavior Risk Analysis Cyber Wiretap
27.06.2018 KSN Report: Ransomware and malicious cryptominers 2016-2018 Ransomware Kaspersky
25.06.2018 A new variant of Ursnif Banking Trojan served by the Necurs botnet hits Italy Malware ZLabs
18.05.2018 U.S. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY STRATEGY BigBrother  
16.05.2018 TheHuman FACTOR REPORT proofpoint.com People-centered threats define the landscape Cyber ProofPoint
16.05.2018 INDEPENDENT STUDY PINPOINTS SIGNIFICANT SCADA / ICS CYBERSECURITY RISKS ICS Fortinet
11.05.2018 OPC UA security analysis BigBrother Kaspersky
09.05.2018 Russian Targeting of Election Infrastructure During the 2016 Election: Summary of Initial Findings and Recommendations BigBrother  
08.05.2018 2017 INTERNET CRIME REPORT BigBrother FBI
04.05.2018 ZOO. CYBERESPIONAGE OPERATION BigBrother Kaspersky
04.05.2018 THE CHANGING STATE OF RANSOMWARE Ransomware F-Secure
03.05.2018 Comodo Cybersecurity Q1 2018 REPORT Report Comodo
25.04.2018 The Bandios malware suite Malware ZLabs
24.04.2018 Energetic Bear/Crouching Yeti: attacks on servers APT Kaspersky
14.04.2018 Malware p.i. , Tracking Cloud Infections Malware Bitglass
14.04.2018 APT37 (REAPER) The Overlooked North Korean Actor APT FireEye
13.04.2018 UPnProxy: Blackhat Proxies via NAT Injections Malware Akamai
12.04.2018 Mirai-Variant IoT Botnet Used to Target Financial Sector in January 2018 IoT Recorded furniture
12.04.2018 Mobile phishing 2018: Myths and facts facing every modern enterprise today Phishing Lockout
12.04.2018 2018 Data Breach Investigations Report Incidenty Verizon
12.04.2018 Cybercrime tactics and techniques: Q1 2018 Report Malwarebytes
08.04.2018 M-TRENDS2018 Cyber FireEye
08.04.2018 2018 GLOBAL DATA RISK REPORT FROM THE VARONIS DATA LAB Incidenty Varonis
08.04.2018 Owning the Battlefield Ransomware Cybereason
30.03.2018 Attacker Behavior Industry Report Attack Vectra
27.03.2018 Soft Target: The Top 10 Vulnerabilities Used by Cybercriminals Vulnerebility Recorded Future
27.03.2018 SentinelOne: Global Ransomware Study 2018 Ransomware SentinelOne
14.03.2018 GRIZZLY STEPPE – Russian Malicious Cyber Activity BigBrother NCCIC
10.03.2018 Monero Mining Malware Cryptocurrency NTT Security
10.03.2018 Business Email Compromise (BEC) Attack Trends Report Attack Agari
10.03.2018 The Slingshot APT APT Kaspersky
01.03.2018 BRIDGING THE GAP BETWEEN SECOPS INTENT AND REALITY Cyber Threat stack
28.02.2018 FINANCIAL CYBERTHREATS IN 2017 Cyber Kaspersky
28.02.2018 Malware Analysis Report: A new variant of Mobef Ransomware Malware ZLabs
22.02.2018 By the Numbers: Global Cyber Risk Perception Survey Cyber MARSCH
21.02.2018 The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation Malware  
20.02.2018 APT37 (REAPER) APT FireEye
19.02.2018 Vulnerability QuickView 2017 Vulnerability Trends Vulnerebility VulnDB
17.02.2018 Litecoin Emerges as the Next Dominant Dark Web Currency Cryptocurrency Recorded furniture
17.02.2018 Targeting of Olympic Games IT Infrastructure Remains Unattributed Cyber Recorded furniture
13.02.2018 The 2017 State of Endpoint Security Risk Report Penemon institut
12.02.2018 Dark Caracal APT – The Pallas Family APT ZLabs
07.02.2018 DOOMED TO REPEAT HISTORY? Cyber OPEN TECHNOLOGY INSTITUTE
26.01.2018 Cybercrime tactics and techniques: 2017 state of malware CyberCrime Malwarebytes
22.01.2018 Operation EvilTraff BigBrother ZLabs
19.01.2018 Dark Caracal Cyber-espionage at a Global Scale BigBrother Lookout/EFC
19.01.2018 THE 2018 HACKER REPORT Report Hackerone
19.01.2018 Report-The-Year-of-the-Defender Report Cybereason
19.01.2018 iOS Security iOS 11 January 2018 Apple Apple
11.01.2018 The stealth process injection of the new Ursnif malware Malware ZLabs
09.01.2018 ISTR Volume 22 Report Symantec
03.01.2018 Q3 2017 Global DDoS Threat Landscape Report Attack Imperva
22.12.2017 North Korea Bitten by Bitcoin Bug BigBrother Proofpoint
21.12.2017 Malware Analysis Report: Bladabindi.Dec17 Malware ZLabs
19.12.2017 Kaspersky Security Bulletin: OVERALL STATISTICS FOR 2017 Report Kaspersky
08.12.2017 Framework for Improving Critical Infrastructure Cybersecurity 2.0 Cyber NIST
08.12.2017 Cyber intrusion services casebook 2017 Cyber CrowdStrike
04.12.2017 Malware Analysis Report: Fake 3MobileUpdater Malware ZLabs
01.12.2017 gtic-2017-q3-threat-intelligence-report Report NTT
29.11.2017 Kaspersky Security Bulletin: STORY OF THE YEAR2017 Report Kaspersky
29.11.2017 q3-2017-state-of-the-internet-security-report Report Akamai
28.11.2017 2017-benchmarking-us-government-websites BigBrother ITIF
21.11.2017 OWASP Top 10 - 2017 Report OWASP
19.11.2017 Beyond Black Friday Threat Report 2017 Report Kaspersky
16.11.2017 KASPERSKY LAB THREAT PREDICTIONS FOR 2018 Cyber Kaspersky
16.11.2017 Appendix: Analysis of the Mokes/SmokeBot backdoor from the incident Incidenty Kaspersky
02.11.2017 1H 2017 Shadow A huge trove of patient data leaks, thanks to Data Report Incidenty Symantec
01.11.2017 Malware Analysis Report: Bad Rabbit Malware ZLabs
15.10.2017 DoD Cybersecurity Discipline Implementation Pl BigBrother DoD USA
15.10.2017 Post-Soviet Bank Heists: A Hybrid Cybercrime Study Cyber Spider labs
15.10.2017 Office 365 Adoption Survey Cyber Barracude
07.10.2017 ISTR Email Threats 2017 Report Symantec
04.10.2017 Appthority’s report Report Appthority
29.09.2017 The Apple of Your EFI Apple Duo Labs Report
28.09.2017 Threat Landscape for Industrial Automation Systems in H1 2017 ICS Kaspersky
27.09.2017 INTERNET ORGANISED CRIME THREAT ASSESSMENT 2017 CyberCrime Europol
23.09.2017 Webroot_Quarterly_Threat_Trends_September_2017 Report Webroot
18.09.2017 Zimperium_Mobile_Threat_Report_Q2_2017 Report Zimperium
18.09.2017 NotPetya-report.pdf Ransomware ZLabs
11.09.2017 ISTR Ransomware 2017 Report Symantec
23.08.2017 q2-2017-state-of-the-internet-security-report.pdf Report Akamai
09.08.2017 National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework Cyber NIST
05.08.2017 Kaspersky KSN Report Ransomware 2016-2017 Report Kaspersky
05.08.2017 AV-TEST Security Report 2016/2017 Report AV-Test
05.08.2017 APPLICATION SECURITY STATISTICS REPORT 2017 Report White Hat
01.08.2017 Symantec ISTR Financial Threats Review 2017 Report Symantec
01.08.2017 Cybercrime tactics and techniques Q2 2017 Report Malwarebytes
31.07.2017 RDoS Attacks: DDoS For Ransom Blooms in the Spring Attack Radware
31.07.2017 Comodo Threat Research Labs Q2 2017 REPORT Report Comodo
31.07.2017 Comodo Threat Research Labs Q1 2017 REPORT Report Comodo
31.07.2017 Symantec ISTR Report Symantec