Report News -  

Úvod  APT  Apple  Attack  BigBrother  Cryptocurrency  Cyber  CyberCrime  CyberSpy  Hacking  ICS  Incidenty  IoT  Malware  Mobile  OS  Phishing  Ransomware  Report  Spam  Vulnerebility


Datum

Název

Categorie

Firms

13.2.20 2020 State of Malware Report Cyber Malwarebytes
13.2.20 2020 SONICWALL CYBER THREAT REPORT Cyber SONICWALL

13.2.20

2019 INTERNET CRIME REPORT CyberCrime FBI

31.1.20

A LANDSCAPE OF MALWARE USED ON THE PORTUGUESE TOP LEVEL DOMA Malware Cipher

31.1.20

2019 Website Threat Research Report Spam Sucuri
23.1.20 NIST PRIVACY FRAMEWORK Cyber NIST
22.1.20 The Global Risks Report 2020 Cyber World Economic Forum

21.12.19

Assessing Russian Activities and Intentions in Recent US Electio BigBrother Cybereason
12.12.19 Kaspersky Security Bulletin ‘19 Statistics Report Kaspersky

22.11.19

ENISA threat landscape for 5G Networks

Report  Mobile

ENISA

20.11.19

The cake is a lie! Uncovering the secret world of malware-like cheats in video games

Report

Kaspersky

14.10.19

The potential of social robots for persuasion and manipulation: a proof of concept study

Cyber

Kaspersky

8.10.19

Managed Detection and Response Analytics report

Report

Kaspersky

1.10.19

Zprava-o-stavu-kyberneticke-bezpecnosti-cr-2018-cz

Report

NÚKIB ČR

29.8.19

Incident Response Analytics Report 2018

Incidenty  Report

Kaspersky

28.8.19

MATRIX: A LOW-KEY TARGETED RANSOMWARE

Report

SOPHOS

28.8.19

SOPHOSLABS 2019 THREAT REPORT

Report

SOPHOS

28.8.19

Baldr vs The World

Malware

SOPHOS

23.8.19

Federal Information Security Modernization Act of 2014

Cyber

FISMA

29.7.19

2019 SonicWall Cyber Threat Report

Report

SonicWall

12.7.19

Reinventing Cybersecurity with Artificial Intelligence

Cyber

Capgemini institute

26.06.19

FEDERAL CYBERSECURITY: AMERICA’S DATA AT RISK

BigBrother

Committee on Homeland Security and Governmental Affairs

23.06.19

CYBERSECURITY MANAGEMENT AND OVERSIGHT AT THE JET PROPULSION LABORATORY

Cyber

NASA

09.05.19

TURLA LIGHTNEURON

APT

Eset

03.05.19

CRITICAL INFRASTRUCTURE PROTECTION Actions Needed to Address Weaknesses in TSA’s Pipeline Security Program Management

ICS

GAO

03.05.19

OE-417 Electric Emergency and Disturbance Report - Calendar Year 2019

Report

WECC

27.04.19

Cybercrime tactics and techniques Q1 2019

Report

Malwarebytes

11.03.19

HOW EQUIFAX NEGLECTED CYBERSECURITY AND SUFFERED A DEVASTATING DATA BREACH

Incidenty

U.S. House of Representatives Committee on Oversight and Government Reform

05.03.19

2019 DevSecOps Community Survey

Cyber

Sonatype

05.03.19

Chinese Cyberespionage Originating From Tsinghua University Infrastructure

BigBrother

Recorded Future

02.03.19

ISTR 24: Symantec’s Annual Threat Report Reveals More Ambitious and Destructive Attacks

Report

Symantec

21.02.19

THREATS TO USERS OF ADULT WEBSITES IN 2018 February 2019

Report

Kaspersky

20.02.19

Securing the supply chain

Attack

CrowdStrike

20.02.19

QUARTERLY Threat Landscape Report

Report

Fortinet

30.01.19

ENISA Threat Landscape Report 2018

Report

Enisa

24.01.19

2019 State of Malware

Malware

Malwarebytes

22.01.19

Threat Trends Analysis Report

Report

Checkpoint

13.12.18

InfoArmor reports identification numbers of 120 million Brazilians exposed online

Incidenty

InfoArmor

13.12.18

The Equifax Data Breach

Incidenty

U.S. House of Representatives Committee on Oversight and Government Reform

26.11.18

Cyberthreats to financial institutions 2019: OVERVIEW AND PREDICTIONS

Cyber

Kaspersky

26.11.18

CRYPTOCURRENCY THREAT PREDICTIONS FOR 2019

Cyber

Kaspersky

26.11.18

Kaspersky Security Bulletin: THREAT PREDICTIONS FOR INDUSTRIAL SECURITY IN2019

Cyber

Kaspersky

23.11.18

THREAT PREDICTIONS FOR2019

Cyber

Kaspersky

19.11.18

SOPHOSLABS 2019 THREAT REPORT

Cyber

Sophos

16.11.18

Buyer beware: cyberthreats targeting e-commerce, 2018

Cyber

Kaspersky

12.11.18

Android Security 2017 Year In Review

Report

Android

10.11.18

Vulnerability Intelligence Report

Vulnerebility

Tenable

08.11.18

China ’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’ s BGP Hijacking

BigBrother

Military Cyber Affairs

08.11.18

INSIDER THREAT PROGRAM MATURITY FRAMEWORK

Cyber

National Insider Threat Task Force

08.11.18

A FRAMEWORK FOR CYBER INDICATIONS AND WARNING

Cyber

INSA

06.11.18

Cybersecurity Professionals Focus on Developing New Skills as Workforce Gap Widens

Cyber

(ISC)2

02.11.18

The hidden threat of cyberattacks in the energy and utilities industry

ICS

Vectra

30.10.18

RANSOMWARE: an enterprise perspective

Ransomware

Eset

30.10.18

Exposed and Vulnerable Critical Infrastructure: Stephen Hilt, Numaan Huq, Vladimir Kropotov, Robert McArdle, Cedric Pernet, and Roel Reyes Water and Energy Industries

ICS

Trend Micro

19.10.18

‘Operation Oceansalt’ Attacks South Korea, U.S., and Canada With Source Code From Chinese Hacker Group

BigBrother

McAfee

19.10.18

GREYENERGY A successor to BlackEnergy

Ransomware

Eset

18.10.18

Cybercrime tactics and techniques: Q3 2018

Report

Malwarebytes

15.10.18

The General Data Protection RegulationLawful basis for processing

Cyber

icon.

03.10.18

Malware Analysis Report Dissencting GandCrab v5

Ransomware

ZLabs

27.09.18

LOJAX First UEFI rootkit found in the wild, courtesy of the Sednit group

Malware

Eset

22.09.18

From data boom to data doom: the risks and rewards of protecting personal data

Cyber

Kaspersky

20.09.18

F5 ReportApplication Protection REPORT

Report

F5

20.09.18

BLACK HAT 2018 HACKER SURVEY REPORT

Report

thycotic

20.09.18

Lucrative Ransomware Attacks: Analysis of the CryptoWall Version 3 Threat

Ransomware

CyberThreat Alliance

20.09.18

INTERNET ORGANISED CRIME THREAT ASSESSMENT

CyberCrime

IOCTA

19.09.18

Malware Analysis Report Dissecting the first Gafgyt bot implementing the “Non Un-Packable” NUP technique

Malware

ZLabs

15.09.18

Framework for Improving Critical Infrastructure Cybersecurity

Cyber

NIST

15.09.18

5 Critical Steps to a More Mature Security Posture

Cyber

Secureworks

14.09.18

DATA PROTECTION Actions Taken by Equifax and Federal Agencies in Response to the 2017 Brea

Cyber

 

14.09.18

The State of SOAR Report, 2018

Report

 

14.09.18

CYBER THREATSCAPE REPORT 2018

Report

 

14.09.18

Threat Landscape for Industrial Automation Systems H1 20

ICS

 

28.08.18

Securing Wireless Infusion Pumps in Healthcare Delivery Organizations

Cyber

NIST

24.08.18

TURLA OUTLOOK BACKDOOR

APT

Eset

22.08.18

2018 EMAIL SECURITY: TRENDS, CHALLENGES, AND BENCHMARKS

Phishing

GreatHorn

22.08.18

Triout - The Malware Framework for Android That Packs Potent Spyware Capabilities

Malware

BitDefender

21.08.18

2018-CHINA-MILITARY-POWER-REPORT

BigBrother

DoD

21.08.18

S O L E O IP R ela y - V uln e r a bilit y R e p o r t

Vulnerebility

Project insecurity

09.08.18

Attacker Behavior Industry Report

Attack

Vectra

08.08.18

O p e n E M R v 5.0.1.3 - V uln e r a bilit y R e p o r t

Report

Project insecurity

08.08.18

N E T S C O U T T H R E A T INTELLIGENCE REPORT

Report

 

08.08.18

White Hat, Black Hat and the Emergence of the Gray Hat: The True Costs of Cybercrime

CyberCrime

Malwarebytes

03.08.18

Attacks on industrial enterprises using RMS and TeamViewer

Attack

Kaspersky

03.08.18

HeroRAT: Analyzing the Telegram based Android malware

Malware

ZLabs

01.08.18

SamSam: The (Almost) Six Million Dollar Ransomware

Ransomware

F-Secure

30.07.18

2018 EMAIL SECURITY: TRENDS, CHALLENGES, AND BENCHMARKS A look at differences based on organization size,professional role, and email

Phishing

GreatHorn

23.07.18

Chinese APT 27’s long-term espionage campaign in Syria is still ongoing

APT

ZLabs

22.07.18

REPORT OF THE ATTORNEY GENERAL’S CYBER DIGITAL TASK FORCE

BigBrother

U.S. DoJ

22.07.18

China, Russia & North Korea Launching Sophisticated, Espionage-Focused Cyberattacks

BigBrother

Carbon Black

22.07.18

THE BLACK MARKET REPORT

Cyber

Armor

19.07.18

QUASAR, SOBAKEN AND VERMIN: A deeper look into an ongoing espionage campaign

BigBrother

Eset

19.07.18

1st Half of 2018 — Healthcare Cyber Research Report

Report

 

19.07.18

Cybercrime tactics and techniques: Q2 2018

Report

Malwarebytes

19.07.18

Russian APT28 Operation Roman Holiday

APT

ZLabs

18.07.18

Building the UK financial sector’s operational resilience

BigBrother

Bank of England

05.07.18

Cryptocurrency Anti-Money Laundering Report

Cryptocurrency

 

28.06.18

RedAlpha: New Campaigns Discovered Targeting the Tibetan Community

Cyber

Recorded Future

28.06.18

A New Twist In SSDP Attacks

Attack

NETSCOUT

27.06.18

The Human Behavior Risk Analysis

Cyber

Wiretap

27.06.18

KSN Report: Ransomware and malicious cryptominers 2016-2018

Ransomware

Kaspersky

25.06.18

A new variant of Ursnif Banking Trojan served by the Necurs botnet hits Italy

Malware

ZLabs

18.05.18

U.S. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY STRATEGY

BigBrother

 

16.05.18

TheHuman FACTOR REPORT proofpoint.com People-centered threats define the landscape

Cyber

ProofPoint

16.05.18

INDEPENDENT STUDY PINPOINTS SIGNIFICANT SCADA / ICS CYBERSECURITY RISKS

ICS

Fortinet

11.05.18

OPC UA security analysis

BigBrother

Kaspersky

09.05.18

Russian Targeting of Election Infrastructure During the 2016 Election: Summary of Initial Findings and Recommendations

BigBrother

 

08.05.18

2017 INTERNET CRIME REPORT

BigBrother

FBI

04.05.18

ZOO. CYBERESPIONAGE OPERATION

BigBrother

Kaspersky

04.05.18

THE CHANGING STATE OF RANSOMWARE

Ransomware

F-Secure

03.05.18

Comodo Cybersecurity Q1 2018 REPORT

Report

Comodo

25.04.18

The Bandios malware suite

Malware

ZLabs

24.04.18

Energetic Bear/Crouching Yeti: attacks on servers

APT

Kaspersky

14.04.18

Malware p.i. , Tracking Cloud Infections

Malware

Bitglass

14.04.18

APT37 (REAPER) The Overlooked North Korean Actor

APT

FireEye

13.04.18

UPnProxy: Blackhat Proxies via NAT Injections

Malware

Akamai

12.04.18

Mirai-Variant IoT Botnet Used to Target Financial Sector in January 2018

IoT

Recorded furniture

12.04.18

Mobile phishing 2018: Myths and facts facing every modern enterprise today

Phishing

Lockout

12.04.18

2018 Data Breach Investigations Report

Incidenty

Verizon

12.04.18

Cybercrime tactics and techniques: Q1 2018

Report

Malwarebytes

08.04.18

M-TRENDS2018

Cyber

FireEye

08.04.18

2018 GLOBAL DATA RISK REPORT FROM THE VARONIS DATA LAB

Incidenty

Varonis

08.04.18

Owning the Battlefield

Ransomware

Cybereason

30.03.18

Attacker Behavior Industry Report

Attack

Vectra

27.03.18

Soft Target: The Top 10 Vulnerabilities Used by Cybercriminals

Vulnerebility

Recorded Future

27.03.18

SentinelOne: Global Ransomware Study 2018

Ransomware

SentinelOne

14.03.18

GRIZZLY STEPPE – Russian Malicious Cyber Activity

BigBrother

NCCIC

10.03.18

Monero Mining Malware

Cryptocurrency

NTT Security

10.03.18

Business Email Compromise (BEC) Attack Trends Report

Attack

Agari

10.03.18

The Slingshot APT

APT

Kaspersky

01.03.18

BRIDGING THE GAP BETWEEN SECOPS INTENT AND REALITY

Cyber

Threat stack

28.02.18

FINANCIAL CYBERTHREATS IN 2017

Cyber

Kaspersky

28.02.18

Malware Analysis Report: A new variant of Mobef Ransomware

Malware

ZLabs

22.02.18

By the Numbers: Global Cyber Risk Perception Survey

Cyber

MARSCH

21.02.18

The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation

Malware

 

20.02.18

APT37 (REAPER)

APT

FireEye

19.02.18

Vulnerability QuickView 2017 Vulnerability Trends

Vulnerebility

VulnDB

17.02.18

Litecoin Emerges as the Next Dominant Dark Web Currency

Cryptocurrency

Recorded furniture

17.02.18

Targeting of Olympic Games IT Infrastructure Remains Unattributed

Cyber

Recorded furniture

13.02.18

The 2017 State of Endpoint Security Risk

Report

Penemon institut

12.02.18

Dark Caracal APT – The Pallas Family

APT

ZLabs

07.02.18

DOOMED TO REPEAT HISTORY?

Cyber

OPEN TECHNOLOGY INSTITUTE

26.01.18

Cybercrime tactics and techniques: 2017 state of malware

CyberCrime

Malwarebytes

22.01.18

Operation EvilTraff

BigBrother

ZLabs

19.01.18

Dark Caracal Cyber-espionage at a Global Scale

BigBrother

Lookout/EFC

19.01.18

THE 2018 HACKER REPORT

Report

Hackerone

19.01.18

Report-The-Year-of-the-Defender

Report

Cybereason

19.01.18

iOS Security iOS 11 January 2018

Apple

Apple

11.01.18

The stealth process injection of the new Ursnif malware

Malware

ZLabs

09.01.18

ISTR Volume 22

Report

Symantec

03.01.18

Q3 2017 Global DDoS Threat Landscape Report

Attack

Imperva

22.12.17

North Korea Bitten by Bitcoin Bug

BigBrother

Proofpoint

21.12.17

Malware Analysis Report: Bladabindi.Dec17

Malware

ZLabs

19.12.17

Kaspersky Security Bulletin: OVERALL STATISTICS FOR 2017

Report

Kaspersky

08.12.17

Framework for Improving Critical Infrastructure Cybersecurity 2.0

Cyber

NIST

08.12.17

Cyber intrusion services casebook 2017

Cyber

CrowdStrike

04.12.17

Malware Analysis Report: Fake 3MobileUpdater

Malware

ZLabs

01.12.17

gtic-2017-q3-threat-intelligence-report

Report

NTT

29.11.17

Kaspersky Security Bulletin: STORY OF THE YEAR2017

Report

Kaspersky

29.11.17

q3-2017-state-of-the-internet-security-report

Report

Akamai

28.11.17

2017-benchmarking-us-government-websites

BigBrother

ITIF

21.11.17

OWASP Top 10 - 2017

Report

OWASP

19.11.17

Beyond Black Friday Threat Report 2017

Report

Kaspersky

16.11.17

KASPERSKY LAB THREAT PREDICTIONS FOR 2018

Cyber

Kaspersky

16.11.17

Appendix: Analysis of the Mokes/SmokeBot backdoor from the incident

Incidenty

Kaspersky

02.11.17

1H 2017 Shadow A huge trove of patient data leaks, thanks to Data Report

Incidenty

Symantec

01.11.17

Malware Analysis Report: Bad Rabbit

Malware

ZLabs

15.10.17

DoD Cybersecurity Discipline Implementation Pl

BigBrother

DoD USA

15.10.17

Post-Soviet Bank Heists: A Hybrid Cybercrime Study

Cyber

Spider labs

15.10.17

Office 365 Adoption Survey

Cyber

Barracude

07.10.17

ISTR Email Threats 2017

Report

Symantec

04.10.17

Appthority’s report

Report

Appthority

29.09.17

The Apple of Your EFI

Apple

Duo Labs Report

28.09.17

Threat Landscape for Industrial Automation Systems in H1 2017

ICS

Kaspersky

27.09.17

INTERNET ORGANISED CRIME THREAT ASSESSMENT 2017

CyberCrime

Europol

23.09.17

Webroot_Quarterly_Threat_Trends_September_2017

Report

Webroot

18.09.17

Zimperium_Mobile_Threat_Report_Q2_2017

Report

Zimperium

18.09.17

NotPetya-report.pdf

Ransomware

ZLabs

11.09.17

ISTR Ransomware 2017

Report

Symantec

23.08.17

q2-2017-state-of-the-internet-security-report.pdf

Report

Akamai

09.08.17

National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework

Cyber

NIST

05.08.17

Kaspersky KSN Report Ransomware 2016-2017

Report

Kaspersky

05.08.17

AV-TEST Security Report 2016/2017

Report

AV-Test

05.08.17

APPLICATION SECURITY STATISTICS REPORT 2017

Report

White Hat

01.08.17

Symantec ISTR Financial Threats Review 2017

Report

Symantec

01.08.17

Cybercrime tactics and techniques Q2 2017

Report

Malwarebytes

31.07.17

RDoS Attacks: DDoS For Ransom Blooms in the Spring

Attack

Radware

31.07.17

Comodo Threat Research Labs Q2 2017 REPORT

Report

Comodo

31.07.17

Comodo Threat Research Labs Q1 2017 REPORT

Report

Comodo

31.07.17

Symantec ISTR

Report

Symantec