Threat Reports

Quarterly Threat Report

TOP THREATS AND TRENDS

In this report, you'll learn key developments in the threat landscape and how to protect your business against the latest attacks, including:

  • What to look for in the latest versions of business email compromise
  • Which malicious JavaScript attachments are showing up the most in emails
  • How mobile exploit kits are leveraging multiple vulnerabilities to give attackers control of devices
  • How to protect against social phishing that has overwhelmed corporations

Full Report

THE HUMAN FACTOR REPORT

Highlights of this year’s report:

  • Extending a shift that began in 2014, URL-based campaigns gave way to massive, constantly evolving campaigns that deliver malware payloads through malicious documents. 
  • Social engineering has become the No. 1 infection vector. 
  • Campaigns are more tailored to target regions.
  • Social media and mobile apps are no longer corner cases for information security policy. Instead, they have become a key route to victims. 

Ransomware Survival Guide

PROTECT YOUR ORGANIZATION FROM TODAY'S FASTEST GROWING CYBER THREAT

In this guide you will learn: 

  • Why ransomware is surging
  • What to do before, during, and after a ransomware attack.
  • Why you shouldn’t pay ransoms—and why you may have to
  • What  free decryption tools can’t protect you
  • How to stop ransomware at the gates

Exploring Specific Threats, Trends, and Transformations

Ransomware and Impostor (aka BEC) phishing dominated the threat landscape in the first three months of 2016 as attackers continued to exploit ‘the human factor’ and rapidly monetize compromises.

DarkSideLoader — You Don’t Need To Jailbreak Your iPhone To Find Malware

Targeted Attacks: PlugX Infects, Arid Viper Returns

The Missing .LNK: Dridex Actor Tries New File Format

It’s Not Personal, It’s Business: Malware Return on Investment and the Return of Malicious Macros

When Threat Intelligence Meets Business Intelligence

Best Practices in Incident Response Automation

The Human Factor 2015: Attackers Drive Business End-User Clicks

From Hacking Systems to Hacking People

Cybersecurity: Tackling the Threat from Within