Reading Room
H Papers & Reports Conference
Category
White Papers
30.7.20
27.5.20
26.2.20
25.2.20
MosaicRegressor: Lurking in the Shadows of UEFI
Malware
Threat landscape for industrial automation systems H1 2020
ICS
Compromised Personal Network Indicators and Mitigations
Cyber
2020 FERC, NERC and REs Report Cyber Planning for Response and Recovery Study (CYPRES)
Kybernetické bezpečnosti České republiky za rok 2019
BigBrother
Digital Education: The cyberrisks of the online classroom
More Evidence of APT Hackers-for-Hire Used for Industrial Espionage
APT
SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE ON RUSSIAN ACTIVE MEASURES CAMPAIGNS AND INTERFERENCE IN THE 2016 U.S. ELECTION VOLUME 5: COUNTERINTELLIGENCE THREATS AND VULNERABILITIES
Incident Response Analyst Report 2019
Incidenty
Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia
2020-data-breach-investigations-report
Five Clear Steps to Enhance SecOps with MITRE ATT&CK
Report
2019 APPLICATION PROTECTION REPORT 2ND EDITION
THE STATE OF RANSOMWARE 2020
2019 TLS TELEMETRY REPORT
M-TRENDS 2020 FIREEYE MANDIANT SERVICES | SPECIAL REPORT
M-TRENDS 2019
M-TRENDS 2018
M-TRENDS 2017
M-TRENDS 2016
M-TRENDS 2015
M-TRENDS 2014
M-TRENDS 2013
M-TRENDS 2012
M-TRENDS 2011
M-TRENDS 2010
2019 YEAR IN REVIEW ICS VULNERABILITIES
2019 YEAR IN REVIEW THE ICS L ANDSCAPE AND THREAT ACTIVIT Y GROUPS
2019 YEAR IN REVIEW LESSONS LEARNED FROM THE FRONT LINES OF ICS CYBERSECURITY
2019 Year End Report Vulnerability QuickView
Vulnerebility
2020 State of Malware Report
2020 SONICWALL CYBER THREAT REPORT
2019 INTERNET CRIME REPORT
CyberCrime
A LANDSCAPE OF MALWARE USED ON THE PORTUGUESE TOP LEVEL DOMA
2019 Website Threat Research Report
Spam
NIST PRIVACY FRAMEWORK
The Global Risks Report 2020