Category: Reports

ICS cybersecurity: A view from the field

Over the past few years, even mass media have been writing about industrial control systems (ICS) cybersecurity incidents with increasing frequency. Unfortunately, the problem lies not only in targeted attacks, such as BlackEnergy or Operation Ghoul, aimed at the industrial sector, but also …

Internet Security Threat Report

Cyber attackers revealed new levels of ambition in 2016, a year marked by extraordinary attacks, including multi-million dollar virtual bank heists, overt attempts to disrupt the US electoral process by state-sponsored groups, and some of the biggest distributed denial of …

2017 Data Breach Investigations Report

“These findings relate specifically to the occurrence (likelihood) of security breaches leading to data compromise … not attacks, not impact, not general security incidents and not risk.” The study has since evolved to include security incidents and not just breaches …

Cyber Warfare

The Information Age is fast becoming the age of the zero-day vulnerability, the kind of holes in software that allow attackers get in to steal, destroy, or manipulate data. As a measure of global Internet security, the number of zero …

Trustwave global security report 2016

Cybercrime is big business. We hear it so often that the words threaten to lose their impact. But the details still have the capacity to shock. In last year’s report, we demonstrated how attackers launching a malware infection campaign could …