Threat Reports

Quarterly Threat Report
TOP THREATS AND TRENDS
The Quarterly Threat Summary captures threats, trends and transformations we see within our customer base and in the wider security market.

Full Report
THE HUMAN FACTOR REPORT
Today’s advanced attacks focus more on exploiting human flaws than system flaws. To explore this under-reported aspect of enterprise threats, we created The Human Factor.

Ransomware Survival Guide
PROTECT YOUR ORGANIZATION
Ransomware attackers collected more than $209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.
Past Reports
April - June 2017
Download Report
April - June 2017The Q2 Threat report details the increased threats all corporations face today.
January - March 2017
Download Report
January - March 2017Q1 Threat Report captures threats, trends and transformations we see within our customer base and in the wider security market.
October - December 2016
Download Report
October - December 2016Building on trends we saw throughout 2016, cyber attackers shifted their techniques and approaches in the fourth quarter to maximise returns on investments in malware and infrastructure.
July - September 2016
Download Report
July - September 2016Cyber threats shifted dramatically in the third quarter, as the relative quiet of the second quarter gave way to explosions in both the volume of campaigns and the variety of threats.
April - June 2016
Download Report
April - June 2016The first five months of 2016 were dominated by malicious email campaigns of unprecedented volume.
January - March 2016
Download Report
January - March 2016Ransomware and Impostor (aka BEC) phishing dominated the threat landscape in the first three months of 2016 as attackers continued to exploit ‘the human factor’ and rapidly monetize compromises.
December 2015
Download Report
December 2015DarkSideLoader — You Don’t Need To Jailbreak Your iPhone To Find Malware
September 2015
Download Report
September 2015Targeted Attacks: PlugX Infects, Arid Viper Returns
August 2015
Download Report
August 2015July 2015
Download Report
July 2015It’s Not Personal, It’s Business: Malware Return on Investment and the Return of Malicious Macros
June 2015
Download Report
June 2015When Threat Intelligence Meets Business Intelligence
May 2015
Download Report
May 2015Best Practices in Incident Response Automation
April 2015
Download Report
April 2015The Human Factor 2015: Attackers Drive Business End-User Clicks
March 2015
Download Report
March 2015From Hacking Systems to Hacking People
February 2015
Download Report
February 2015Cybersecurity: Tackling the Threat from Within