Threat Reports

cyber security

Quarterly Threat Report

TOP THREATS AND TRENDS

The Quarterly Threat Report captures threats, trends and transformations we see within our customer base and in the wider security market.

Empleado analizando datos para la seguridad de la información informática

Full Report

THE HUMAN FACTOR REPORT

Today’s advanced attacks focus more on exploiting human flaws than system flaws. To explore this under-reported aspect of enterprise threats, we created The Human Factor.

Ransomware Survival Guide

PROTECT YOUR ORGANIZATION

Ransomware attackers collected more than $209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.  

Past Reports

January - March 2019

Download Report

The Q1 2019 Threat Report highlights the threats, trends, and key takeaways for threats we see within our global customer base and in the broader threat landscape.

October - December 2018

Download Report

The Q4 2018 Threat Report provides actionable intelligence to better combat today’s attacks, anticipate emerging threats, and manage your security posture.

July - September 2018

The Q3 2018 Threat Report provides insight into the shifting threat landscape that can inform your cybersecurity strategy.

The Q2 2018 Threat Report features key takeaways and trends from today's advanced attacks across email, the web, and social media channels.

The Q1 2018 Threat Report highlights the threats, trends, and key takeaways of threats we see within our large customer base and in the wider threat landscape.

The Q4 Threat Report captures threats, trends and transformations we see within our customer base and in the wider security market.

The Q3 Threat Report details email-based threat trends, coinminer mania and exploit kits.

April - June 2017

The Q2 Threat report details the increased threats all corporations face today.

Q1 Threat Report captures threats, trends and transformations we see within our customer base and in the wider security market.

Building on trends we saw throughout 2016, cyber attackers shifted their techniques and approaches in the fourth quarter to maximize returns on investments in malware and infrastructure.

Q3 Threat Summary tracks Locky ransomware, social threats, BEC, and more

The first five months of 2016 were dominated by malicious email campaigns of unprecedented volume.

Ransomware and Impostor (aka BEC) phishing dominated the threat landscape in the first three months of 2016 as attackers continued to exploit ‘the human factor’ and rapidly monetize compromises.

DarkSideLoader — You Don’t Need To Jailbreak Your iPhone To Find Malware

September 2015

Targeted Attacks: PlugX Infects, Arid Viper Returns

August 2015

The Missing .LNK: Dridex Actor Tries New File Format

July 2015

It’s Not Personal, It’s Business: Malware Return on Investment and the Return of Malicious Macros

June 2015

When Threat Intelligence Meets Business Intelligence

May 2015

Best Practices in Incident Response Automation

April 2015

The Human Factor 2015: Attackers Drive Business End-User Clicks

March 2015

From Hacking Systems to Hacking People

February 2015

Cybersecurity: Tackling the Threat from Within