Report News -  Úvod  APT  ICS  Malware  CyberCrime  Ransomware  Vulnerebility  Hacking  OS  Mobile  CyberSpy  Report 


 

Datum

Název

Firms

13.12.2018InfoArmor reports identification numbers of 120 million Brazilians exposed onlineInfoArmor
13.12.2018The Equifax Data BreachU.S. House of Representatives Committee on Oversight and Government Reform
26.11.2018Cyberthreats to financial institutions 2019: OVERVIEW AND PREDICTIONSKaspersky
26.11.2018CRYPTOCURRENCY THREAT PREDICTIONS FOR 2019Kaspersky
26.11.2018Kaspersky Security Bulletin: THREAT PREDICTIONS FOR INDUSTRIAL SECURITY IN 2019Kaspersky
23.11.2018THREAT PREDICTIONS FOR 2019Kaspersky
19.11.2018SOPHOSLABS 2019 THREAT REPORTSophos
16.11.2018Buyer beware: cyberthreats targeting e-commerce, 2018Kaspersky
12.11.2018Android Security 2017 Year In ReviewAndroid
10.11.2018Vulnerability Intelligence ReportTenable
8.11.2018China ’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’ s BGP Hijacking Military Cyber Affairs
8.11.2018INSIDER THREAT PROGRAM MATURITY FRAMEWORKNational Insider Threat Task Force
8.11.2018A FRAMEWORK FOR CYBER INDICATIONS AND WARNINGINSA
6.11.2018Cybersecurity Professionals Focus on Developing New Skills as Workforce Gap Widens(ISC)2
2.11.2018The hidden threat of cyberattacks in the energy and utilities industryVectra
30.10.2018RANSOMWARE: an enterprise perspectiveEset
30.10.2018Exposed and Vulnerable Critical Infrastructure: Stephen Hilt, Numaan Huq, Vladimir Kropotov,
Robert McArdle, Cedric Pernet, and Roel Reyes Water and Energy Industries
Trend Micro
19.10.2018‘Operation Oceansalt’ Attacks South Korea, U.S., and Canada With Source Code From Chinese Hacker GroupMcAfee
19.10.2018GREYENERGY A successor to BlackEnergyEset
18.10.2018Cybercrime tactics and techniques: Q3 2018Malwarebytes
15.10.2018The General Data Protection Regulation  Lawful basis for processingicon.
3.10.2018Malware Analysis Report Dissencting GandCrab v5ZLabs
27.9.2018LOJAX First UEFI rootkit found in the wild, courtesy of the Sednit groupEset
22.9.2018From data boom to data doom: the risks and rewards of protecting personal dataKaspersky
20.9.2018F5 ReportApplication Protection REPORTF5
20.9.2018INTERNET ORGANISED CRIME THREAT ASSESSMENTIOCTA
20.9.2018Lucrative Ransomware Attacks: Analysis of the CryptoWall Version 3 ThreatCyberThreat Alliance
20.9.2018BLACK HAT 2018 HACKER SURVEY REPORTthycotic
19.9.2018Malware Analysis Report Dissecting the first Gafgyt bot implementing the “Non Un-Packable” NUP techniqueZLabs
15.9.2018Framework for Improving Critical Infrastructure Cybersecurity NIST
15.9.20185 Critical Steps to a More Mature Security PostureSecureworks
14.9.2018Threat Landscape for Industrial Automation Systems H1 20 
14.9.2018The State of SOAR Report, 2018 
14.9.2018DATA PROTECTION Actions Taken by Equifax and Federal Agencies in Response to the 2017 Brea 
14.9.2018CYBER THREATSCAPE REPORT 2018 
28.8.2018Securing Wireless Infusion Pumps in Healthcare Delivery OrganizationsNIST
24.8.2018TURLA OUTLOOK BACKDOOR Eset
22.8.2018Triout - The Malware Framework for Android That Packs Potent Spyware CapabilitiesBitDefender
22.8.20182018 EMAIL SECURITY: TRENDS, CHALLENGES, AND BENCHMARKSGreatHorn
21.8.2018S O L E O IP R ela y - V uln e r a bilit y R e p o r tProject insecurity
21.8.20182018-CHINA-MILITARY-POWER-REPORTDoD
9.8.2018Attacker Behavior Industry ReportVectra
8.8.2018White Hat, Black Hat and the Emergence of the Gray Hat: The True Costs of CybercrimeMalwarebytes
8.8.2018O p e n E M R v 5.0.1.3 - V uln e r a bilit y R e p o r tProject insecurity
8.8.2018N E T S C O U T T H R E A T INTELLIGENCE REPORT 
3.8.2018Attacks on industrial enterprises using RMS and TeamViewerKaspersky
3.8.2018HeroRAT: Analyzing the Telegram based Android malwareZLabs
1.8.2018SamSam: The (Almost) Six Million Dollar RansomwareF-Secure
30.7.20182018 EMAIL SECURITY: TRENDS, CHALLENGES, AND BENCHMARKS A look at
differences based on organization size, professional role, and email
GreatHorn
23.7.2018Chinese APT 27’s long-term espionage campaign in Syria is still ongoingZLabs
22.7.2018REPORT OF THE ATTORNEY GENERAL’S CYBER DIGITAL TASK FORCE U.S. DoJ
22.7.2018China, Russia & North Korea Launching Sophisticated, Espionage-Focused CyberattacksCarbon Black
22.7.2018THE BLACK MARKET REPORTArmor
19.7.2018Russian APT28 Operation Roman HolidayZLabs
19.7.20181st Half of 2018 — Healthcare Cyber Research Report  
19.7.2018QUASAR, SOBAKEN AND VERMIN: A deeper look into an ongoing espionage campaignEset
19.7.2018Cybercrime tactics and techniques: Q2 2018Malwarebytes
18.7.2018Building the UK financial sector’s operational resilienceBank of England
5.7.2018Cryptocurrency Anti-Money Laundering Report 
28.6.2018A New Twist In SSDP Attacks NETSCOUT
28.6.2018RedAlpha: New Campaigns Discovered Targeting the Tibetan CommunityRecorded Future
27.6.2018KSN Report: Ransomware and malicious cryptominers 2016-2018Kaspersky

27.6.2018

The Human Behavior Risk AnalysisWiretap

25.6.2018

A new variant of Ursnif Banking Trojan served by the Necurs botnet hits ItalyZLabs

18.5.2018

U.S. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY STRATEGY

 

16.5.2018

INDEPENDENT STUDY PINPOINTS SIGNIFICANT SCADA / ICS CYBERSECURITY RISKS

Fortinet

16.5.2018

TheHuman FACTOR REPORT proofpoint.com People-centered threats define the landscape

ProofPoint

11.5.2018

OPC UA security analysis

Kaspersky

9.5.2018

Russian Targeting of Election Infrastructure During the 2016 Election: Summary of
Initial Findings and Recommendations

 

8.5.2018

2017 INTERNET CRIME REPORT

FBI

4.5.2018

ZOO. CYBERESPIONAGE OPERATION

Kaspersky

4.5.2018

THE CHANGING STATE OF RANSOMWARE

F-Secure

3.5.2018

Comodo Cybersecurity Q1 2018 REPORT

Comodo

25.4.2018

The Bandios malware suite

ZLabs

24.4.2018

Energetic Bear/Crouching Yeti: attacks on servers

Kaspersky

14.4.2018

APT37 (REAPER) The Overlooked North Korean Actor

FireEye

14.4.2018

Malware p.i. , Tracking Cloud Infections

Bitglass

13.4.2018

UPnProxy: Blackhat Proxies via NAT Injections

Akamai

12.4.2018

2018 Data Breach Investigations Report

Verizon

12.4.2018

Mirai-Variant IoT Botnet Used to Target Financial Sector in January 2018

Recorded furniture

12.4.2018

Cybercrime tactics and techniques: Q1 2018

Malwarebytes

12.4.2018

Mobile phishing 2018: Myths and facts facing every modern enterprise today

Lockout

8.4.2018

Owning the Battlefield

Cybereason

8.4.2018

2018 GLOBAL DATA RISK REPORT FROM THE VARONIS DATA LAB

Varonis

8.4.2018

M-TRENDS2018

FireEye

31.3.2018

Cyber Defence Magazines - March 2018

CDM

30.3.2018

Attacker Behavior Industry Report

Vectra

27.3.2018

Threat Landscape for Industrial Automation Systems in H2 2017

Kaspersky

27.3.2018

SentinelOne: Global Ransomware Study 2018

SentinelOne

27.3.2018

Soft Target: The Top 10 Vulnerabilities Used by Cybercriminals

Recorded Future

14.3.2018

GRIZZLY STEPPE – Russian Malicious Cyber Activity

NCCIC

10.3.2018

The Slingshot APT

Kaspersky

10.3.2018

Business Email Compromise (BEC) Attack Trends Report

Agari

10.3.2018

Monero Mining Malware

NTT Security

1.3.2018

BRIDGING THE GAP BETWEEN SECOPS INTENT AND REALITY

Threat stack

28.2.2018

FINANCIAL CYBERTHREATS IN 2017

Kaspersky

28.2.2018

Malware Analysis Report: A new variant of Mobef Ransomware

ZLabs

22.2.2018

By the Numbers: Global Cyber Risk Perception Survey

MARSCH

21.2.2018

The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation

 

20.2.2018

APT37 (REAPER)

FireEye

19.2.2018

Vulnerability QuickView 2017 Vulnerability Trends

VulnDB

17.2.2018

Litecoin Emerges as the Next Dominant Dark Web Currency

Recorded furniture

17.2.2018

Targeting of Olympic Games IT Infrastructure Remains Unattributed

Recorded furniture

13.2.2018

The 2017 State of Endpoint Security Risk

Penemon institut

12.2.2018

Dark Caracal APT – The Pallas Family

ZLabs

7.2.2018

DOOMED TO REPEAT HISTORY?

OPEN TECHNOLOGY INSTITUTE

26.1.2018

Cybercrime tactics and techniques: 2017 state of malware

Malwarebytes

22.1.2018

Operation EvilTraff

ZLabs

19.1.2018

THE 2018 HACKER REPORT

Hackerone

19.1.2018

Dark Caracal Cyber-espionage at a Global Scale

Lookout/EFC

19.1.2018

Report-The-Year-of-the-Defender

Cybereason

19.1.2018

iOS Security iOS 11 January 2018

Apple

11.1.2018

The stealth process injection of the new Ursnif malware

ZLabs

9.1.2018

ISTR Volume 22

Symantec

3.1.2018

Q3 2017 Global DDoS Threat Landscape Report

Imperva

22.12.2017

North Korea Bitten by Bitcoin Bug

Proofpoint

21.12.2017

Malware Analysis Report: Bladabindi.Dec17

ZLabs

19.12.2017

Kaspersky Security Bulletin: OVERALL STATISTICS FOR 2017

Kaspersky

8.12.2017

Framework for Improving Critical Infrastructure Cybersecurity 2.0

NIST

8.12.2017

Cyber intrusion services casebook 2017

CrowdStrike

4.12.2017

Malware Analysis Report: Fake 3MobileUpdater

ZLabs

1.12.2017

gtic-2017-q3-threat-intelligence-report

NTT

29.11.2017

Kaspersky Security Bulletin: STORY OF THE YEAR 2017

Kaspersky

29.11.2017

q3-2017-state-of-the-internet-security-report

Akamai

28.11.2017

2017-benchmarking-us-government-websites

ITIF

21.11.2017

OWASP Top 10 - 2017

OWASP

19.11.2017

Beyond Black Friday Threat Report 2017

Kaspersky

16.11.2017

KASPERSKY LAB THREAT PREDICTIONS FOR 2018

Kaspersky

16.11.2017

Appendix: Analysis of the Mokes/SmokeBot backdoor from theincident

Kaspersky

2.11.2017

1H 2017 Shadow A huge trove of patient data leaks, thanks to Data Report

Symantec

1.11.2017

Malware Analysis Report: Bad Rabbit

ZLabs

15.10.2017

Post-Soviet Bank Heists: A Hybrid Cybercrime Study

Spider labs

15.10.2017

DoD Cybersecurity Discipline Implementation Pl

DoD USA

15.10.2017

Office 365 Adoption Survey

Barracude

7.10.2017

ISTR Email Threats 2017

Symantec

4.10.2017

Appthority’s report

Appthority

29.9.2017

The Apple of Your EFI

Duo Labs Report

28.9.2017

Threat Landscape for Industrial Automation Systems in H1 2017

Kaspersky

27.9.2017

INTERNET ORGANISED CRIME THREAT ASSESSMENT 2017

Europol

23.9.2017

Webroot_Quarterly_Threat_Trends_September_2017

Webroot

18.9.2017

Zimperium_Mobile_Threat_Report_Q2_2017

Zimperium

18.9.2017

NotPetya-report.pdf

ZLabs

11.9.2017

ISTR Ransomware 2017

Symantec

23.8.2017

q2-2017-state-of-the-internet-security-report.pdf

Akamai

9.8.2017

National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework

NIST

5.8.2017

Kaspersky KSN Report Ransomware 2016-2017

Kaspersky

5.8.2017

AV-TEST Security Report 2016/2017

AV-Test

5.8.2017

APPLICATION SECURITY STATISTICS REPORT 2017

White Hat

1.8.2017

Symantec ISTR Financial Threats Review 2017

Symantec

1.8.2017

Cybercrime tactics and techniques Q2 2017

Malwarebytes

31.7.2017

RDoS Attacks: DDoS For Ransom Blooms in the Spring

Radware

31.7.2017

Comodo Threat Research Labs Q2 2017 REPORT

Comodo

31.7.2017

Comodo Threat Research Labs Q1 2017 REPORT

Comodo

31.7.2017

Symantec ISTR

Symantec