Report News -  Úvod  APT  ICS  Malware  CyberCrime  Ransomware  Vulnerebility  Hacking  OS  Mobile  CyberSpy  Update 18.10.2018 15:00:40


 

Datum

Název

Kategorie

Firms

18.10.2018Cybercrime tactics and techniques: Q3 2018 Malwarebytes
15.10.2018The General Data Protection Regulation  Lawful basis for processing icon.
3.10.2018Malware Analysis Report Dissencting GandCrab v5 ZLabs
27.9.2018LOJAX First UEFI rootkit found in the wild, courtesy of the Sednit group Eset
22.9.2018From data boom to data doom: the risks and rewards of protecting personal data Kaspersky
20.9.2018F5 ReportApplication Protection REPORT F5
20.9.2018INTERNET ORGANISED CRIME THREAT ASSESSMENT IOCTA
20.9.2018Lucrative Ransomware Attacks: Analysis of the CryptoWall Version 3 Threat CyberThreat Alliance
20.9.2018BLACK HAT 2018 HACKER SURVEY REPORT thycotic
19.9.2018Malware Analysis Report Dissecting the first Gafgyt bot implementing the “Non Un-Packable” NUP technique ZLabs
15.9.2018Framework for Improving Critical Infrastructure Cybersecurity  NIST
15.9.20185 Critical Steps to a More Mature Security Posture Secureworks
14.9.2018Threat Landscape for Industrial Automation Systems H1 20  
14.9.2018The State of SOAR Report, 2018  
14.9.2018DATA PROTECTION Actions Taken by Equifax and Federal Agencies in Response to the 2017 Brea  
14.9.2018CYBER THREATSCAPE REPORT 2018  
28.8.2018Securing Wireless Infusion Pumps in Healthcare Delivery Organizations NIST
24.8.2018TURLA OUTLOOK BACKDOOR  Eset
22.8.2018Triout - The Malware Framework for Android That Packs Potent Spyware Capabilities BitDefender
22.8.20182018 EMAIL SECURITY: TRENDS, CHALLENGES, AND BENCHMARKS GreatHorn
21.8.2018S O L E O IP R ela y - V uln e r a bilit y R e p o r t Project insecurity
21.8.20182018-CHINA-MILITARY-POWER-REPORT DoD
9.8.2018Attacker Behavior Industry Report Vectra
8.8.2018White Hat, Black Hat and the Emergence of the Gray Hat: The True Costs of Cybercrime Malwarebytes
8.8.2018O p e n E M R v 5.0.1.3 - V uln e r a bilit y R e p o r t Project insecurity
8.8.2018N E T S C O U T T H R E A T INTELLIGENCE REPORT  
3.8.2018Attacks on industrial enterprises using RMS and TeamViewer Kaspersky
3.8.2018HeroRAT: Analyzing the Telegram based Android malware ZLabs
1.8.2018SamSam: The (Almost) Six Million Dollar Ransomware F-Secure
30.7.20182018 EMAIL SECURITY: TRENDS, CHALLENGES, AND BENCHMARKS A look at differences based on organization size, professional role, and email GreatHorn
23.7.2018Chinese APT 27’s long-term espionage campaign in Syria is still ongoing ZLabs
22.7.2018REPORT OF THE ATTORNEY GENERAL’S CYBER DIGITAL TASK FORCE  U.S. DoJ
22.7.2018China, Russia & North Korea Launching Sophisticated, Espionage-Focused Cyberattacks Carbon Black
22.7.2018THE BLACK MARKET REPORT Armor
19.7.2018Russian APT28 Operation Roman Holiday ZLabs
19.7.20181st Half of 2018 — Healthcare Cyber Research Report   
19.7.2018QUASAR, SOBAKEN AND VERMIN: A deeper look into an ongoing espionage campaign Eset
19.7.2018Cybercrime tactics and techniques: Q2 2018 Malwarebytes
18.7.2018Building the UK financial sector’s operational resilience Bank of England
5.7.2018Cryptocurrency Anti-Money Laundering Report  
28.6.2018A New Twist In SSDP Attacks  NETSCOUT
28.6.2018RedAlpha: New Campaigns Discovered Targeting the Tibetan Community Recorded Future
27.6.2018KSN Report: Ransomware and malicious cryptominers 2016-2018 Kaspersky

27.6.2018

The Human Behavior Risk Analysis Wiretap

25.6.2018

A new variant of Ursnif Banking Trojan served by the Necurs botnet hits Italy ZLabs

18.5.2018

U.S. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY STRATEGY

  

16.5.2018

INDEPENDENT STUDY PINPOINTS SIGNIFICANT SCADA / ICS CYBERSECURITY RISKS

 

Fortinet

16.5.2018

TheHuman FACTOR REPORT proofpoint.com People-centered threats define the landscape

 

ProofPoint

11.5.2018

OPC UA security analysis

 

Kaspersky

9.5.2018

Russian Targeting of Election Infrastructure During the 2016 Election: Summary of Initial Findings and Recommendations

  

8.5.2018

2017 INTERNET CRIME REPORT

 

FBI

4.5.2018

ZOO. CYBERESPIONAGE OPERATION

 

Kaspersky

4.5.2018

THE CHANGING STATE OF RANSOMWARE

 

F-Secure

3.5.2018

Comodo Cybersecurity Q1 2018 REPORT

 

Comodo

25.4.2018

The Bandios malware suite

 

ZLabs

24.4.2018

Energetic Bear/Crouching Yeti: attacks on servers

 

Kaspersky

14.4.2018

APT37 (REAPER) The Overlooked North Korean Actor

 

FireEye

14.4.2018

Malware p.i. , Tracking Cloud Infections

 

Bitglass

13.4.2018

UPnProxy: Blackhat Proxies via NAT Injections

 

Akamai

12.4.2018

2018 Data Breach Investigations Report

 

Verizon

12.4.2018

Mirai-Variant IoT Botnet Used to Target Financial Sector in January 2018

 

Recorded furniture

12.4.2018

Cybercrime tactics and techniques: Q1 2018

 

Malwarebytes

12.4.2018

Mobile phishing 2018: Myths and facts facing every modern enterprise today

 

Lockout

8.4.2018

Owning the Battlefield

 

Cybereason

8.4.2018

2018 GLOBAL DATA RISK REPORT FROM THE VARONIS DATA LAB

 

Varonis

8.4.2018

M-TRENDS2018

 

FireEye

31.3.2018

Cyber Defence Magazines - March 2018

 

CDM

30.3.2018

Attacker Behavior Industry Report

 

Vectra

27.3.2018

Threat Landscape for Industrial Automation Systems in H2 2017

 

Kaspersky

27.3.2018

SentinelOne: Global Ransomware Study 2018

 

SentinelOne

27.3.2018

Soft Target: The Top 10 Vulnerabilities Used by Cybercriminals

 

Recorded Future

14.3.2018

GRIZZLY STEPPE – Russian Malicious Cyber Activity

 

NCCIC

10.3.2018

The Slingshot APT

 

Kaspersky

10.3.2018

Business Email Compromise (BEC) Attack Trends Report

 

Agari

10.3.2018

Monero Mining Malware

 

NTT Security

1.3.2018

BRIDGING THE GAP BETWEEN SECOPS INTENT AND REALITY

 

Threat stack

28.2.2018

FINANCIAL CYBERTHREATS IN 2017

 

Kaspersky

28.2.2018

Malware Analysis Report: A new variant of Mobef Ransomware

 

ZLabs

22.2.2018

By the Numbers: Global Cyber Risk Perception Survey

 

MARSCH

21.2.2018

The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation

  

20.2.2018

APT37 (REAPER)

 

FireEye

19.2.2018

Vulnerability QuickView 2017 Vulnerability Trends

 

VulnDB

17.2.2018

Litecoin Emerges as the Next Dominant Dark Web Currency

 

Recorded furniture

17.2.2018

Targeting of Olympic Games IT Infrastructure Remains Unattributed

 

Recorded furniture

13.2.2018

The 2017 State of Endpoint Security Risk

 

Penemon institut

12.2.2018

Dark Caracal APT – The Pallas Family

 

ZLabs

7.2.2018

DOOMED TO REPEAT HISTORY?

 

OPEN TECHNOLOGY INSTITUTE

26.1.2018

Cybercrime tactics and techniques: 2017 state of malware

 

Malwarebytes

22.1.2018

Operation EvilTraff

 

ZLabs

19.1.2018

THE 2018 HACKER REPORT

 

Hackerone

19.1.2018

Dark Caracal Cyber-espionage at a Global Scale

 

Lookout/EFC

19.1.2018

Report-The-Year-of-the-Defender

 

Cybereason

19.1.2018

iOS Security iOS 11 January 2018

 

Apple

11.1.2018

The stealth process injection of the new Ursnif malware

 

ZLabs

9.1.2018

ISTR Volume 22

 

Symantec

3.1.2018

Q3 2017 Global DDoS Threat Landscape Report

 

Imperva

22.12.2017

North Korea Bitten by Bitcoin Bug

 

Proofpoint

21.12.2017

Malware Analysis Report: Bladabindi.Dec17

 

ZLabs

19.12.2017

Kaspersky Security Bulletin: OVERALL STATISTICS FOR 2017

 

Kaspersky

8.12.2017

Framework for Improving Critical Infrastructure Cybersecurity 2.0

 

NIST

8.12.2017

Cyber intrusion services casebook 2017

 

CrowdStrike

4.12.2017

Malware Analysis Report: Fake 3MobileUpdater

 

ZLabs

1.12.2017

gtic-2017-q3-threat-intelligence-report

 

NTT

29.11.2017

Kaspersky Security Bulletin: STORY OF THE YEAR 2017

 

Kaspersky

29.11.2017

q3-2017-state-of-the-internet-security-report

 

Akamai

28.11.2017

2017-benchmarking-us-government-websites

 

ITIF

21.11.2017

OWASP Top 10 - 2017

 

OWASP

19.11.2017

Beyond Black Friday Threat Report 2017

 

Kaspersky

16.11.2017

KASPERSKY LAB THREAT PREDICTIONS FOR 2018

 

Kaspersky

16.11.2017

Appendix: Analysis of the Mokes/SmokeBot backdoor from theincident

 

Kaspersky

2.11.2017

1H 2017 Shadow A huge trove of patient data leaks, thanks to Data Report

 

Symantec

1.11.2017

Malware Analysis Report: Bad Rabbit

 

ZLabs

15.10.2017

Post-Soviet Bank Heists: A Hybrid Cybercrime Study

 

Spider labs

15.10.2017

DoD Cybersecurity Discipline Implementation Pl

 

DoD USA

15.10.2017

Office 365 Adoption Survey

 

Barracude

7.10.2017

ISTR Email Threats 2017

 

Symantec

4.10.2017

Appthority’s report

 

Appthority

29.9.2017

The Apple of Your EFI

 

Duo Labs Report

28.9.2017

Threat Landscape for Industrial Automation Systems in H1 2017

 

Kaspersky

27.9.2017

INTERNET ORGANISED CRIME THREAT ASSESSMENT 2017

 

Europol

23.9.2017

Webroot_Quarterly_Threat_Trends_September_2017

 

Webroot

18.9.2017

Zimperium_Mobile_Threat_Report_Q2_2017

 

Zimperium

18.9.2017

NotPetya-report.pdf

 

ZLabs

11.9.2017

ISTR Ransomware 2017

 

Symantec

23.8.2017

q2-2017-state-of-the-internet-security-report.pdf

 

Akamai

9.8.2017

National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework

 

NIST

5.8.2017

Kaspersky KSN Report Ransomware 2016-2017

 

Kaspersky

5.8.2017

AV-TEST Security Report 2016/2017

 

AV-Test

5.8.2017

APPLICATION SECURITY STATISTICS REPORT 2017

 

White Hat

1.8.2017

Symantec ISTR Financial Threats Review 2017

 

Symantec

1.8.2017

Cybercrime tactics and techniques Q2 2017

 

Malwarebytes

31.7.2017

RDoS Attacks: DDoS For Ransom Blooms in the Spring

 

Radware

31.7.2017

Comodo Threat Research Labs Q2 2017 REPORT

 

Comodo

31.7.2017

Comodo Threat Research Labs Q1 2017 REPORT

 

Comodo

31.7.2017

Symantec ISTR

 

Symantec