Quarterly Threat Report
TOP THREATS AND TRENDS
The Quarterly Threat Report captures threats, trends and transformations we see within our customer base and in the wider security market.
THE HUMAN FACTOR REPORT
Today’s advanced attacks focus more on exploiting human flaws than system flaws. To explore this under-reported aspect of enterprise threats, we created The Human Factor.
Ransomware Survival Guide
PROTECT YOUR ORGANIZATION
Ransomware attackers collected more than $209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.
January - March 2019
The Q1 2019 Threat Report highlights the threats, trends, and key takeaways for threats we see within our global customer base and in the broader threat landscape.
July - September 2018
The Q3 2018 Threat Report provides insight into the shifting threat landscape that can inform your cybersecurity strategy.
January - March 2018
Download ReportJanuary - March 2018
The Q1 2018 Threat Report highlights the threats, trends, and key takeaways of threats we see within our large customer base and in the wider threat landscape.
April - June 2017
The Q2 Threat report details the increased threats all corporations face today.
October - December 2016
Download ReportOctober - December 2016
Building on trends we saw throughout 2016, cyber attackers shifted their techniques and approaches in the fourth quarter to maximize returns on investments in malware and infrastructure.
January - March 2016
Download ReportJanuary - March 2016
Ransomware and Impostor (aka BEC) phishing dominated the threat landscape in the first three months of 2016 as attackers continued to exploit ‘the human factor’ and rapidly monetize compromises.
Targeted Attacks: PlugX Infects, Arid Viper Returns
It’s Not Personal, It’s Business: Malware Return on Investment and the Return of Malicious Macros
When Threat Intelligence Meets Business Intelligence
Best Practices in Incident Response Automation
The Human Factor 2015: Attackers Drive Business End-User Clicks
From Hacking Systems to Hacking People
Cybersecurity: Tackling the Threat from Within