Threat Reports

cyber security

Quarterly Threat Report

TOP THREATS AND TRENDS

The Quarterly Threat Summary captures threats, trends and transformations we see within our customer base and in the wider security market.

Empleado analizando datos para la seguridad de la información informática

Full Report

THE HUMAN FACTOR REPORT

Today’s advanced attacks focus more on exploiting human flaws than system flaws. To explore this under-reported aspect of enterprise threats, we created The Human Factor.

Ransomware Survival Guide

PROTECT YOUR ORGANIZATION

Ransomware attackers collected more than $209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015. 

Past Reports

The Q2 Threat report details the increased threats all corporations face today.

Q1 Threat Report captures threats, trends and transformations we see within our customer base and in the wider security market.

Building on trends we saw throughout 2016, cyber attackers shifted their techniques and approaches in the fourth quarter to maximise returns on investments in malware and infrastructure.

Cyber threats shifted dramatically in the third quarter, as the relative quiet of the second quarter gave way to explosions in both the volume of campaigns and the variety of threats.

The first five months of 2016 were dominated by malicious email campaigns of unprecedented volume.

Ransomware and Impostor (aka BEC) phishing dominated the threat landscape in the first three months of 2016 as attackers continued to exploit ‘the human factor’ and rapidly monetize compromises.

December 2015

DarkSideLoader — You Don’t Need To Jailbreak Your iPhone To Find Malware

September 2015

Targeted Attacks: PlugX Infects, Arid Viper Returns

August 2015

The Missing .LNK: Dridex Actor Tries New File Format

July 2015

It’s Not Personal, It’s Business: Malware Return on Investment and the Return of Malicious Macros

June 2015

When Threat Intelligence Meets Business Intelligence

May 2015

Best Practices in Incident Response Automation

April 2015

The Human Factor 2015: Attackers Drive Business End-User Clicks

March 2015

From Hacking Systems to Hacking People

February 2015

Cybersecurity: Tackling the Threat from Within