Reports

ENISA published “Proactive detection – Measures and information sources” reportENISA published “Proactive detection – Measures and information sources” report

ENISA published “Proactive detection – Measures and information sources” report

EU Agency for Cybersecurity ENISA has published a new report of the proactive detection of incidents, including measures and information…

5 years ago
Phishers turning hard-working: CERT-GIB records upsurge of phishing resource blockages as duration of attacks growsPhishers turning hard-working: CERT-GIB records upsurge of phishing resource blockages as duration of attacks grows

Phishers turning hard-working: CERT-GIB records upsurge of phishing resource blockages as duration of attacks grows

Group-IB, a Singapore-based cybersecurity company, observed the growth of the lifespan of phishing attacks in the second half of 2019. This…

5 years ago
Europol analyses on criminal operations in Europe during COVID-19 CrisisEuropol analyses on criminal operations in Europe during COVID-19 Crisis

Europol analyses on criminal operations in Europe during COVID-19 Crisis

Threat actors and criminal organizations continue to take advantage of the COVID-19 pandemic to make money, Europol warns. Europol published…

5 years ago
NSA and ASD issue a report warning of web shells deploymentsNSA and ASD issue a report warning of web shells deployments

NSA and ASD issue a report warning of web shells deployments

A joint report released by the U.S. NSA and the Australian Signals Directorate (ASD) warns of attackers increasingly exploiting vulnerable…

5 years ago
Healthcare sector targeted : what you need to know about the hackers very unusual strategyHealthcare sector targeted : what you need to know about the hackers very unusual strategy

Healthcare sector targeted : what you need to know about the hackers very unusual strategy

Orange Cyberdefense’s Epidemiology Lab has published a report on cyberattacks targeting the healthcare sector. While COVID-19 infections around the world…

5 years ago
Most ransomware attacks take place outside the working hoursMost ransomware attacks take place outside the working hours

Most ransomware attacks take place outside the working hours

Most of the ransomware attacks targeting the enterprises occur outside working hours, during the nighttime or during the weekend. Security…

5 years ago
Most of the attacks on Telecom Sector in 2019 were carried out by China-linked hackersMost of the attacks on Telecom Sector in 2019 were carried out by China-linked hackers

Most of the attacks on Telecom Sector in 2019 were carried out by China-linked hackers

China-linked cyber espionage groups increasingly targeted organizations in the telecommunications industry in 2019. According to the CrowdStrike 2020 Global Threat…

5 years ago
Which are the most dangerous mobile app stores online?Which are the most dangerous mobile app stores online?

Which are the most dangerous mobile app stores online?

An interesting report published by RiskIQ on 2019 Mobile App Threat Landscape, lists the most dangerous mobile app store online.…

5 years ago
FireEye Mandiant M-Trends 2020 report: 500+ new Malware strains in 2019FireEye Mandiant M-Trends 2020 report: 500+ new Malware strains in 2019

FireEye Mandiant M-Trends 2020 report: 500+ new Malware strains in 2019

FireEye’s report revealed that the incident response division Mandiant observed more than 500 new malware families in 2019. According to…

5 years ago
Dragos Report: Analysis of ICS flaws disclosed in 2019Dragos Report: Analysis of ICS flaws disclosed in 2019

Dragos Report: Analysis of ICS flaws disclosed in 2019

More than 400 flaws affecting industrial control systems (ICS) were disclosed in 2019, more than 100 were zero-day vulnerabilities. According…

5 years ago