Report News -  

Úvod  APT  Apple  ICS  Malware  CyberCrime  Ransomware  Vulnerebility  Hacking  OS  Mobile  CyberSpy  Report  Incidenty  Attack  Cyber  BigBrother  Cryptocurrency  Phishing  IoT


 

Datum

Název

Firms

30.1.19ENISA Threat Landscape Report 2018Enisa
24.1.192019 State of MalwareMalwarebytes
22.1.19Threat Trends Analysis ReportCheckpoint
13.12.18InfoArmor reports identification numbers of 120 million Brazilians exposed onlineInfoArmor
13.12.18The Equifax Data BreachU.S. House of Representatives Committee on Oversight and Government Reform
26.11.18Cyberthreats to financial institutions 2019: OVERVIEW AND PREDICTIONSKaspersky
26.11.18CRYPTOCURRENCY THREAT PREDICTIONS FOR 2019Kaspersky
26.11.18Kaspersky Security Bulletin: THREAT PREDICTIONS FOR INDUSTRIAL SECURITY IN 2019Kaspersky
23.11.18THREAT PREDICTIONS FOR 2019Kaspersky
19.11.18SOPHOSLABS 2019 THREAT REPORTSophos
16.11.18Buyer beware: cyberthreats targeting e-commerce, 18Kaspersky
12.11.18Android Security 17 Year In ReviewAndroid
10.11.18Vulnerability Intelligence ReportTenable
8.11.18China ’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’ s BGP Hijacking Military Cyber Affairs
8.11.18INSIDER THREAT PROGRAM MATURITY FRAMEWORKNational Insider Threat Task Force
8.11.18A FRAMEWORK FOR CYBER INDICATIONS AND WARNINGINSA
6.11.18Cybersecurity Professionals Focus on Developing New Skills as Workforce Gap Widens(ISC)2
2.11.18The hidden threat of cyberattacks in the energy and utilities industryVectra
30.10.18RANSOMWARE: an enterprise perspectiveEset
30.10.18Exposed and Vulnerable Critical Infrastructure: Stephen Hilt, Numaan Huq, Vladimir Kropotov,
Robert McArdle, Cedric Pernet, and Roel Reyes Water and Energy Industries
Trend Micro
19.10.18‘Operation Oceansalt’ Attacks South Korea, U.S., and Canada With Source Code From Chinese Hacker GroupMcAfee
19.10.18GREYENERGY A successor to BlackEnergyEset
18.10.18Cybercrime tactics and techniques: Q3 18Malwarebytes
15.10.18The General Data Protection Regulation  Lawful basis for processingicon.
3.10.18Malware Analysis Report Dissencting GandCrab v5ZLabs
27.9.18LOJAX First UEFI rootkit found in the wild, courtesy of the Sednit groupEset
22.9.18From data boom to data doom: the risks and rewards of protecting personal dataKaspersky
20.9.18F5 ReportApplication Protection REPORTF5
20.9.18INTERNET ORGANISED CRIME THREAT ASSESSMENTIOCTA
20.9.18Lucrative Ransomware Attacks: Analysis of the CryptoWall Version 3 ThreatCyberThreat Alliance
20.9.18BLACK HAT 18 HACKER SURVEY REPORTthycotic
19.9.18Malware Analysis Report Dissecting the first Gafgyt bot implementing the “Non Un-Packable” NUP techniqueZLabs
15.9.18Framework for Improving Critical Infrastructure Cybersecurity NIST
15.9.185 Critical Steps to a More Mature Security PostureSecureworks
14.9.18Threat Landscape for Industrial Automation Systems H1 20 
14.9.18The State of SOAR Report, 18 
14.9.18DATA PROTECTION Actions Taken by Equifax and Federal Agencies in Response to the 17 Brea 
14.9.18CYBER THREATSCAPE REPORT 18 
28.8.18Securing Wireless Infusion Pumps in Healthcare Delivery OrganizationsNIST
24.8.18TURLA OUTLOOK BACKDOOR Eset
22.8.18Triout - The Malware Framework for Android That Packs Potent Spyware CapabilitiesBitDefender
22.8.1818 EMAIL SECURITY: TRENDS, CHALLENGES, AND BENCHMARKSGreatHorn
21.8.18S O L E O IP R ela y - V uln e r a bilit y R e p o r tProject insecurity
21.8.1818-CHINA-MILITARY-POWER-REPORTDoD
9.8.18Attacker Behavior Industry ReportVectra
8.8.18White Hat, Black Hat and the Emergence of the Gray Hat: The True Costs of CybercrimeMalwarebytes
8.8.18O p e n E M R v 5.0.1.3 - V uln e r a bilit y R e p o r tProject insecurity
8.8.18N E T S C O U T T H R E A T INTELLIGENCE REPORT 
3.8.18Attacks on industrial enterprises using RMS and TeamViewerKaspersky
3.8.18HeroRAT: Analyzing the Telegram based Android malwareZLabs
1.8.18SamSam: The (Almost) Six Million Dollar RansomwareF-Secure
30.7.1818 EMAIL SECURITY: TRENDS, CHALLENGES, AND BENCHMARKS A look at
differences based on organization size, professional role, and email
GreatHorn
23.7.18Chinese APT 27’s long-term espionage campaign in Syria is still ongoingZLabs
22.7.18REPORT OF THE ATTORNEY GENERAL’S CYBER DIGITAL TASK FORCE U.S. DoJ
22.7.18China, Russia & North Korea Launching Sophisticated, Espionage-Focused CyberattacksCarbon Black
22.7.18THE BLACK MARKET REPORTArmor
19.7.18Russian APT28 Operation Roman HolidayZLabs
19.7.181st Half of 18 — Healthcare Cyber Research Report  
19.7.18QUASAR, SOBAKEN AND VERMIN: A deeper look into an ongoing espionage campaignEset
19.7.18Cybercrime tactics and techniques: Q2 18Malwarebytes
18.7.18Building the UK financial sector’s operational resilienceBank of England
5.7.18Cryptocurrency Anti-Money Laundering Report 
28.6.18A New Twist In SSDP Attacks NETSCOUT
28.6.18RedAlpha: New Campaigns Discovered Targeting the Tibetan CommunityRecorded Future
27.6.18KSN Report: Ransomware and malicious cryptominers 2016-18Kaspersky

27.6.18

The Human Behavior Risk AnalysisWiretap

25.6.18

A new variant of Ursnif Banking Trojan served by the Necurs botnet hits ItalyZLabs

18.5.18

U.S. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY STRATEGY

 

16.5.18

INDEPENDENT STUDY PINPOINTS SIGNIFICANT SCADA / ICS CYBERSECURITY RISKS

Fortinet

16.5.18

TheHuman FACTOR REPORT proofpoint.com People-centered threats define the landscape

ProofPoint

11.5.18

OPC UA security analysis

Kaspersky

9.5.18

Russian Targeting of Election Infrastructure During the 2016 Election: Summary of
Initial Findings and Recommendations

 

8.5.18

17 INTERNET CRIME REPORT

FBI

4.5.18

ZOO. CYBERESPIONAGE OPERATION

Kaspersky

4.5.18

THE CHANGING STATE OF RANSOMWARE

F-Secure

3.5.18

Comodo Cybersecurity Q1 18 REPORT

Comodo

25.4.18

The Bandios malware suite

ZLabs

24.4.18

Energetic Bear/Crouching Yeti: attacks on servers

Kaspersky

14.4.18

APT37 (REAPER) The Overlooked North Korean Actor

FireEye

14.4.18

Malware p.i. , Tracking Cloud Infections

Bitglass

13.4.18

UPnProxy: Blackhat Proxies via NAT Injections

Akamai

12.4.18

18 Data Breach Investigations Report

Verizon

12.4.18

Mirai-Variant IoT Botnet Used to Target Financial Sector in January 18

Recorded furniture

12.4.18

Cybercrime tactics and techniques: Q1 18

Malwarebytes

12.4.18

Mobile phishing 18: Myths and facts facing every modern enterprise today

Lockout

8.4.18

Owning the Battlefield

Cybereason

8.4.18

18 GLOBAL DATA RISK REPORT FROM THE VARONIS DATA LAB

Varonis

8.4.18

M-TRENDS18

FireEye

30.3.18

Attacker Behavior Industry Report

Vectra

27.3.18

SentinelOne: Global Ransomware Study 18

SentinelOne

27.3.18

Soft Target: The Top 10 Vulnerabilities Used by Cybercriminals

Recorded Future

14.3.18

GRIZZLY STEPPE – Russian Malicious Cyber Activity

NCCIC

10.3.18

The Slingshot APT

Kaspersky

10.3.18

Business Email Compromise (BEC) Attack Trends Report

Agari

10.3.18

Monero Mining Malware

NTT Security

1.3.18

BRIDGING THE GAP BETWEEN SECOPS INTENT AND REALITY

Threat stack

28.2.18

FINANCIAL CYBERTHREATS IN 17

Kaspersky

28.2.18

Malware Analysis Report: A new variant of Mobef Ransomware

ZLabs

22.2.18

By the Numbers: Global Cyber Risk Perception Survey

MARSCH

21.2.18

The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation

 

20.2.18

APT37 (REAPER)

FireEye

19.2.18

Vulnerability QuickView 17 Vulnerability Trends

VulnDB

17.2.18

Litecoin Emerges as the Next Dominant Dark Web Currency

Recorded furniture

17.2.18

Targeting of Olympic Games IT Infrastructure Remains Unattributed

Recorded furniture

13.2.18

The 17 State of Endpoint Security Risk

Penemon institut

12.2.18

Dark Caracal APT – The Pallas Family

ZLabs

7.2.18

DOOMED TO REPEAT HISTORY?

OPEN TECHNOLOGY INSTITUTE

26.1.18

Cybercrime tactics and techniques: 17 state of malware

Malwarebytes

22.1.18

Operation EvilTraff

ZLabs

19.1.18

THE 18 HACKER REPORT

Hackerone

19.1.18

Dark Caracal Cyber-espionage at a Global Scale

Lookout/EFC

19.1.18

Report-The-Year-of-the-Defender

Cybereason

19.1.18

iOS Security iOS 11 January 18

Apple

11.1.18

The stealth process injection of the new Ursnif malware

ZLabs

9.1.18

ISTR Volume 22

Symantec

3.1.18

Q3 17 Global DDoS Threat Landscape Report

Imperva

22.12.17

North Korea Bitten by Bitcoin Bug

Proofpoint

21.12.17

Malware Analysis Report: Bladabindi.Dec17

ZLabs

19.12.17

Kaspersky Security Bulletin: OVERALL STATISTICS FOR 17

Kaspersky

8.12.17

Framework for Improving Critical Infrastructure Cybersecurity 2.0

NIST

8.12.17

Cyber intrusion services casebook 17

CrowdStrike

4.12.17

Malware Analysis Report: Fake 3MobileUpdater

ZLabs

1.12.17

gtic-17-q3-threat-intelligence-report

NTT

29.11.17

Kaspersky Security Bulletin: STORY OF THE YEAR 17

Kaspersky

29.11.17

q3-17-state-of-the-internet-security-report

Akamai

28.11.17

17-benchmarking-us-government-websites

ITIF

21.11.17

OWASP Top 10 - 17

OWASP

19.11.17

Beyond Black Friday Threat Report 17

Kaspersky

16.11.17

KASPERSKY LAB THREAT PREDICTIONS FOR 18

Kaspersky

16.11.17

Appendix: Analysis of the Mokes/SmokeBot backdoor from the incident

Kaspersky

2.11.17

1H 17 Shadow A huge trove of patient data leaks, thanks to Data Report

Symantec

1.11.17

Malware Analysis Report: Bad Rabbit

ZLabs

15.10.17

Post-Soviet Bank Heists: A Hybrid Cybercrime Study

Spider labs

15.10.17

DoD Cybersecurity Discipline Implementation Pl

DoD USA

15.10.17

Office 365 Adoption Survey

Barracude

7.10.17

ISTR Email Threats 17

Symantec

4.10.17

Appthority’s report

Appthority

29.9.17

The Apple of Your EFI

Duo Labs Report

28.9.17

Threat Landscape for Industrial Automation Systems in H1 17

Kaspersky

27.9.17

INTERNET ORGANISED CRIME THREAT ASSESSMENT 17

Europol

23.9.17

Webroot_Quarterly_Threat_Trends_September_17

Webroot

18.9.17

Zimperium_Mobile_Threat_Report_Q2_17

Zimperium

18.9.17

NotPetya-report.pdf

ZLabs

11.9.17

ISTR Ransomware 17

Symantec

23.8.17

q2-17-state-of-the-internet-security-report.pdf

Akamai

9.8.17

National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework

NIST

5.8.17

Kaspersky KSN Report Ransomware 2016-17

Kaspersky

5.8.17

AV-TEST Security Report 2016/17

AV-Test

5.8.17

APPLICATION SECURITY STATISTICS REPORT 17

White Hat

1.8.17

Symantec ISTR Financial Threats Review 17

Symantec

1.8.17

Cybercrime tactics and techniques Q2 17

Malwarebytes

31.7.17

RDoS Attacks: DDoS For Ransom Blooms in the Spring

Radware

31.7.17

Comodo Threat Research Labs Q2 17 REPORT

Comodo

31.7.17

Comodo Threat Research Labs Q1 17 REPORT

Comodo

31.7.17

Symantec ISTR

Symantec