| DATE | NAME | Report | CATEGORY | 
| 9.7.22 | Dynamic analysis of firmware components in IoT devices | Report | ICS | 
| 24.6.22 | Common TTPs of modern ransomware groups | Report | Ransomware | 
| 9.6.22 | ESET THREAT REPORT T1 2022 | Report | Threats Report | 
| 3.6.22 | Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces | Report | Malware | 
| 29.5.22 | GhostTouch: Targeted Attacks on Touchscreens without Physical Touch | Report | Hacking | 
| 26.5.22 | Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web | Report | Hacking | 
| 26.5.22 | Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment | Report | Security | 
| 24.6.22 | Common TTPs of modern ransomware groups | Report | Ransomware | 
| 9.6.22 | ESET THREAT REPORT T1 2022 | Report | Threats Report | 
| 3.6.22 | R4IoT | Report | Ransomware | 
| 29.5.22 | 2021 Credential Stuffing Report | Report | Credential Stuffing | 
| 16.3.21 | State of Malware  2021 | Report | Malware | 
| 6.3.21 | SPEAR PHISHING TARGETING ICS SUPPLY CHAIN – ANALYSIS | Report | ICS | 
| 5.3.21 | RANSOMWARE UNCOVERED 2020—2021 | Report | Ransomware | 
| 2.3.21 | Embracing a Zero Trust Security Model  | Report | BigBrother | 
| 2.3.21 | China-Linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions | Report | BigBrother | 
| 2.3.21 | A Global Perspective of the SideWinder APT  | Report | APT | 
| 27.02.2021 | The State of Stalkerware in 2020 | Report | Cyber | 
| 27.02.2021 | RYUK RANSOMWARE  | Report | Ransomware | 
| 26.02.2021 | Lazarus targets defense industry with ThreatNeedle | Report | ICS | 
| 25.02.2021 | ICS CYBERSECURITY YEAR IN REVIEW 2020 | Report | ICS | 
| 25.02.2021 | ICS CYBERSECURITY YEAR IN REVIEW 2020 EXECUTIVE SUMMARY | Report | ICS | 
| 18.02.2021 | SANDWORM INTRUSION SET CAMPAIGN TARGETING CENTREON SYSTEMS | Report | APT | 
| 14.01.2021 | DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels | Report | Attack | 
| 13.01.2021 | PLATYPUS: Software-based Power Side-Channel Attacks on x86 | Report | Attack | 
| 12.01.2021 | Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions | Report | APT | 
| 11.01.2021 | A GLOBAL RESET Cyber Security Predictions 2021 | Report | Cyber | 
| 10.01.2021 | Advisory: APT29 targets COVID-19 vaccine development | Report | APT | 
| 09.01.2021 | MOLERATS IN THE CLOUD | Report | CyberSpy | 
| 08.01.2021 | RANSOMWARE IN ICS ENVIRONMENTS | Report | ICS | 
| 07.01.2021 | NSA CYBERSECURITY 2020 YEAR IN REVIEW | Report | BigBrother | 
| 06.01.2021 | TENABLE’S 2020 THREAT LANDSCAPE RETROSPECTIVE | Report | Cyber | 
| 05.01.2021 | 2019 GLOBAL THREAT REPORT ADVERSARY TRADECRAFT AND THE IMPORTANCE OF SPEED | Report | Cyber | 
| 04.01.2021 | “Winnti” | Report | Malware | 
| 03.01.2021 | “Lebanese Cedar” APT | Report | APT | 
| 02.01.2021 | How China Detects and Blocks Shadowsocks  | Report | BigBrother | 
| 01.01.2021 | Securing the Pandemic-Disrupted Workplace | Report | Cyber | 
| 2020 | DLL SIDE-LOADING | Report | Hacking | 
| 2020 | Attacks on industrial enterprises using RMS and TeamViewer: new data  | Report | ICS | 
| 2020 | Chinese State-Sponsored Actors Exploit Publicly Known Vulnerabilitie | Report | APT | 
| 2020 | ESET_Threat_Report_Q3 2020 | Report | Cyber | 
| 2020 | Connected Medical Device Securit A Deep Dive into Healthcare Network | Report | Cyber | 
| 2020 | Iranian Nation-State APT Groups 'Black Box' Leak | Report | APT | 
| 2020 | NEW MALWARE SAMPLES IDENTIFIED IN POINT-OF-SALE COMPROMISES  | Report | Malware | 
| 2020 | From January 2019 to April 2020 The year in review  | Report | Cyber | 
| 2020 | MosaicRegressor: Lurking in the Shadows of UEFI | Report | Malware | 
| 2020 | Threat landscape for industrial automation systems H1 2020  | Report | ICS | 
| 2020 | Compromised Personal Network Indicators and Mitigations  | Report | Cyber | 
| 2020 | 2020 FERC, NERC and REs Report Cyber Planning for Response and Recovery Study (CYPRES) | Report | Cyber | 
| 2020 | Kybernetické bezpečnosti České republiky za rok 2019 | Report | BigBrother | 
| 2020 | Digital Education: The cyberrisks of the online classroom | Report | Cyber | 
| 2020 | More Evidence of APT Hackers-for-Hire Used for Industrial Espionage | Report | APT | 
| 2020 | SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE ON RUSSIAN ACTIVE MEASURES CAMPAIGNS AND INTERFERENCE IN THE 2016 U.S. ELECTION VOLUME 5: COUNTERINTELLIGENCE THREATS AND VULNERABILITIES  | Report | BigBrother | 
| 2020 | Incident Response Analyst Report 2019 | Report | Incidenty | 
| 2020 | Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia | Report | APT | 
| 2020 | 2020-data-breach-investigations-report | Report | Incidenty | 
| 2020 | Five Clear Steps to Enhance SecOps with MITRE ATT&CK  | Report | Report | 
| 2020 | 2019 APPLICATION PROTECTION REPORT 2ND EDITION | Report | Report | 
| 2020 | THE STATE OF RANSOMWARE 2020 | Report | Report | 
| 2020 | 2019 TLS TELEMETRY REPORT | Report | Report | 
| 2020 | M-TRENDS 2020 FIREEYE MANDIANT SERVICES | SPECIAL REPORT | Report | Report | 
| 2020 | M-TRENDS 2019  | Report | Report | 
| 2020 | M-TRENDS 2018 | Report | Report | 
| 2020 | M-TRENDS 2017  | Report | Report | 
| 2020 | M-TRENDS 2016  | Report | Report | 
| 2020 | M-TRENDS 2015  | Report | Report | 
| 2020 | M-TRENDS 2014  | Report | Report | 
| 2020 | M-TRENDS 2013  | Report | Report | 
| 2020 | M-TRENDS 2012  | Report | Report | 
| 2020 | M-TRENDS 2011  | Report | Report | 
| 2020 | M-TRENDS 2010  | Report | Report | 
| 2020 | 2019 YEAR IN REVIEW ICS VULNERABILITIES | Report | ICS | 
| 2020 | 2019 YEAR IN REVIEW THE ICS L ANDSCAPE AND THREAT ACTIVIT Y GROUPS | Report | ICS | 
| 2020 | 2019 YEAR IN REVIEW LESSONS LEARNED FROM THE FRONT LINES OF ICS CYBERSECURITY | Report | ICS | 
| 2020 | 2019 Year End Report Vulnerability QuickView | Report | Vulnerebility | 
| 2020 | 2020 State of Malware Report | Report | Cyber | 
| 2020 | 2020 SONICWALL CYBER THREAT REPORT | Report | Cyber | 
| 2020 | 2019 INTERNET CRIME REPORT | Report | CyberCrime | 
| 2020 | A LANDSCAPE OF MALWARE USED ON THE PORTUGUESE TOP LEVEL DOMA | Report | Malware | 
| 2020 | 2019 Website Threat Research Report | Report | Spam | 
| 2020 | NIST PRIVACY FRAMEWORK | Report | Cyber | 
| 2020 | The Global Risks Report 2020 | Report | Cyber | 
| 2020 | Assessing Russian Activities and Intentions in Recent US Electio | Report | BigBrother | 
| 2020 | Kaspersky Security Bulletin ‘19 Statistics | Report | Report | 
| 2020 | ENISA threat landscape for 5G Networks | Report | Report  Mobile | 
| 2020 | The cake is a lie! Uncovering the secret world of malware-like cheats in video games | Report | Report | 
| 2020 | The potential of social robots for persuasion and manipulation: a proof of concept study | Report | Cyber | 
| 2020 | Managed Detection and Response Analytics report | Report | Report | 
| 2020 | Zprava-o-stavu-kyberneticke-bezpecnosti-cr-2018-cz | Report | Report | 
| 2020 | Incident Response Analytics Report 2018 | Report | Incidenty  Report | 
| 2020 | MATRIX: A LOW-KEY TARGETED RANSOMWARE | Report | Report | 
| 2020 | SOPHOSLABS 2019 THREAT REPORT | Report | Report | 
| 2020 | Baldr vs The World | Report | Malware | 
| 2020 | Federal Information Security Modernization Act of 2014 | Report | Cyber | 
| 2020 | 2019 SonicWall Cyber Threat Report | Report | Report | 
| 2020 | Reinventing Cybersecurity with Artificial Intelligence | Report | Cyber | 
| 2020 | FEDERAL CYBERSECURITY: AMERICA’S DATA AT RISK  | Report | BigBrother | 
| 2020 | CYBERSECURITY MANAGEMENT AND OVERSIGHT AT THE JET PROPULSION LABORATORY | Report | Cyber | 
| 2020 | TURLA LIGHTNEURON | Report | APT | 
| 2020 | CRITICAL INFRASTRUCTURE PROTECTION Actions Needed to Address Weaknesses in TSA’s Pipeline Security Program Management  | Report | ICS | 
| 2020 | OE-417 Electric Emergency and Disturbance Report - Calendar Year 2019  | Report | Report | 
| 2020 | Cybercrime tactics and techniques Q1 2019 | Report | Report | 
| 2020 | HOW EQUIFAX NEGLECTED CYBERSECURITY AND SUFFERED A DEVASTATING DATA BREACH | Report | Incidenty | 
| 2020 | 2019 DevSecOps Community Survey | Report | Cyber | 
| 2020 | Chinese Cyberespionage Originating From Tsinghua University Infrastructure | Report | BigBrother | 
| 2020 | ISTR 24: Symantec’s Annual Threat Report Reveals More Ambitious and Destructive Attacks | Report | Report | 
| 2020 | THREATS TO USERS OF ADULT WEBSITES IN 2018 February 2019 | Report | Report | 
| 2020 | Securing the supply chain | Report | Attack | 
| 2020 | QUARTERLY Threat Landscape Report | Report | Report | 
| 2020 | ENISA Threat Landscape Report 2018 | Report | Report | 
| 2020 | 2019 State of Malware | Report | Malware | 
| 2020 | Threat Trends Analysis Report | Report | Report | 
| 2020 | InfoArmor reports identification numbers of 120 million Brazilians exposed online | Report | Incidenty | 
| 2020 | The Equifax Data Breach | Report | Incidenty | 
| 2020 | Cyberthreats to financial institutions 2019: OVERVIEW AND PREDICTIONS | Report | Cyber | 
| 2020 | CRYPTOCURRENCY THREAT PREDICTIONS FOR 2019 | Report | Cyber | 
| 2020 | Kaspersky Security Bulletin: THREAT PREDICTIONS FOR INDUSTRIAL SECURITY IN2019 | Report | Cyber | 
| 2020 | THREAT PREDICTIONS FOR2019 | Report | Cyber | 
| 2020 | SOPHOSLABS 2019 THREAT REPORT | Report | Cyber | 
| 2020 | Buyer beware: cyberthreats targeting e-commerce, 2018 | Report | Cyber | 
| 2020 | Android Security 2017 Year In Review | Report | Report | 
| 2020 | Vulnerability Intelligence Report | Report | Vulnerebility | 
| 2020 | China ’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’ s BGP Hijacking  | Report | BigBrother | 
| 2020 | INSIDER THREAT PROGRAM MATURITY FRAMEWORK | Report | Cyber | 
| 2020 | A FRAMEWORK FOR CYBER INDICATIONS AND WARNING | Report | Cyber | 
| 2020 | Cybersecurity Professionals Focus on Developing New Skills as Workforce Gap Widens | Report | Cyber | 
| 2020 | The hidden threat of cyberattacks in the energy and utilities industry | Report | ICS | 
| 2020 | RANSOMWARE: an enterprise perspective | Report | Ransomware | 
| 2020 | Exposed and Vulnerable Critical Infrastructure: Stephen Hilt, Numaan Huq, Vladimir Kropotov, Robert McArdle, Cedric Pernet, and Roel Reyes Water and Energy Industries | Report | ICS | 
| 2020 | ‘Operation Oceansalt’ Attacks South Korea, U.S., and Canada With Source Code From Chinese Hacker Group | Report | BigBrother | 
| 2020 | GREYENERGY A successor to BlackEnergy | Report | Ransomware | 
| 2020 | Cybercrime tactics and techniques: Q3 2018 | Report | Report | 
| 2020 | The General Data Protection RegulationLawful basis for processing | Report | Cyber | 
| 2020 | Malware Analysis Report Dissencting GandCrab v5 | Report | Ransomware | 
| 2020 | LOJAX First UEFI rootkit found in the wild, courtesy of the Sednit group | Report | Malware | 
| 2020 | From data boom to data doom: the risks and rewards of protecting personal data | Report | Cyber | 
| 2020 | F5 ReportApplication Protection REPORT | Report | Report | 
| 2020 | BLACK HAT 2018 HACKER SURVEY REPORT | Report | Report | 
| 2020 | Lucrative Ransomware Attacks: Analysis of the CryptoWall Version 3 Threat | Report | Ransomware | 
| 2020 | INTERNET ORGANISED CRIME THREAT ASSESSMENT | Report | CyberCrime | 
| 2020 | Malware Analysis Report Dissecting the first Gafgyt bot implementing the “Non Un-Packable” NUP technique | Report | Malware | 
| 2020 | Framework for Improving Critical Infrastructure Cybersecurity  | Report | Cyber | 
| 2020 | 5 Critical Steps to a More Mature Security Posture | Report | Cyber | 
| 2020 | DATA PROTECTION Actions Taken by Equifax and Federal Agencies in Response to the 2017 Brea | Report | Cyber | 
| 2020 | The State of SOAR Report, 2018 | Report | Report | 
| 2020 | CYBER THREATSCAPE REPORT 2018 | Report | Report | 
| 2020 | Threat Landscape for Industrial Automation Systems H1 20 | Report | ICS | 
| 2020 | Securing Wireless Infusion Pumps in Healthcare Delivery Organizations | Report | Cyber | 
| 2020 | TURLA OUTLOOK BACKDOOR  | Report | APT | 
| 2020 | 2018 EMAIL SECURITY: TRENDS, CHALLENGES, AND BENCHMARKS | Report | Phishing | 
| 2020 | Triout - The Malware Framework for Android That Packs Potent Spyware Capabilities | Report | Malware | 
| 2020 | 2018-CHINA-MILITARY-POWER-REPORT | Report | BigBrother | 
| 2020 | S O L E O IP R ela y - V uln e r a bilit y R e p o r t | Report | Vulnerebility | 
| 2020 | Attacker Behavior Industry Report | Report | Attack | 
| 2020 | O p e n E M R v 5.0.1.3 - V uln e r a bilit y R e p o r t | Report | Report | 
| 2020 | N E T S C O U T T H R E A T INTELLIGENCE REPORT | Report | Report | 
| 2020 | White Hat, Black Hat and the Emergence of the Gray Hat: The True Costs of Cybercrime | Report | CyberCrime | 
| 2020 | Attacks on industrial enterprises using RMS and TeamViewer | Report | Attack | 
| 2020 | HeroRAT: Analyzing the Telegram based Android malware | Report | Malware | 
| 2020 | SamSam: The (Almost) Six Million Dollar Ransomware | Report | Ransomware | 
| 2020 | 2018 EMAIL SECURITY: TRENDS, CHALLENGES, AND BENCHMARKS A look at differences based on organization size,professional role, and email | Report | Phishing | 
| 2020 | Chinese APT 27’s long-term espionage campaign in Syria is still ongoing | Report | APT | 
| 2020 | REPORT OF THE ATTORNEY GENERAL’S CYBER DIGITAL TASK FORCE  | Report | BigBrother | 
| 2020 | China, Russia & North Korea Launching Sophisticated, Espionage-Focused Cyberattacks | Report | BigBrother | 
| 2020 | THE BLACK MARKET REPORT | Report | Cyber | 
| 2020 | QUASAR, SOBAKEN AND VERMIN: A deeper look into an ongoing espionage campaign | Report | BigBrother | 
| 2020 | 1st Half of 2018 — Healthcare Cyber Research Report  | Report | Report | 
| 2020 | Cybercrime tactics and techniques: Q2 2018 | Report | Report | 
| 2020 | Russian APT28 Operation Roman Holiday | Report | APT | 
| 2020 | Building the UK financial sector’s operational resilience | Report | BigBrother | 
| 2020 | Cryptocurrency Anti-Money Laundering Report | Report | Cryptocurrency | 
| 2020 | RedAlpha: New Campaigns Discovered Targeting the Tibetan Community | Report | Cyber | 
| 2020 | A New Twist In SSDP Attacks  | Report | Attack | 
| 2020 | The Human Behavior Risk Analysis | Report | Cyber | 
| 2020 | KSN Report: Ransomware and malicious cryptominers 2016-2018 | Report | Ransomware | 
| 2020 | A new variant of Ursnif Banking Trojan served by the Necurs botnet hits Italy | Report | Malware | 
| 2020 | U.S. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY STRATEGY | Report | BigBrother | 
| 2020 | TheHuman FACTOR REPORT proofpoint.com People-centered threats define the landscape | Report | Cyber | 
| 2020 | INDEPENDENT STUDY PINPOINTS SIGNIFICANT SCADA / ICS CYBERSECURITY RISKS | Report | ICS | 
| 2020 | OPC UA security analysis | Report | BigBrother | 
| 2020 | Russian Targeting of Election Infrastructure During the 2016 Election: Summary of Initial Findings and Recommendations | Report | BigBrother | 
| 2020 | 2017 INTERNET CRIME REPORT | Report | BigBrother | 
| 2020 | ZOO. CYBERESPIONAGE OPERATION  | Report | BigBrother | 
| 2020 | THE CHANGING STATE OF RANSOMWARE | Report | Ransomware | 
| 2020 | Comodo Cybersecurity Q1 2018 REPORT | Report | Report | 
| 2020 | The Bandios malware suite  | Report | Malware | 
| 2020 | Energetic Bear/Crouching Yeti: attacks on servers | Report | APT | 
| 2020 | Malware p.i. , Tracking Cloud Infections | Report | Malware | 
| 2020 | APT37 (REAPER) The Overlooked North Korean Actor  | Report | APT | 
| 2020 | UPnProxy: Blackhat Proxies via NAT Injections | Report | Malware | 
| 2020 | Mirai-Variant IoT Botnet Used to Target Financial Sector in January 2018 | Report | IoT | 
| 2020 | Mobile phishing 2018: Myths and facts facing every modern enterprise today | Report | Phishing | 
| 2020 | 2018 Data Breach Investigations Report | Report | Incidenty | 
| 2020 | Cybercrime tactics and techniques: Q1 2018 | Report | Report | 
| 2020 | M-TRENDS2018 | Report | Cyber | 
| 2020 | 2018 GLOBAL DATA RISK REPORT FROM THE VARONIS DATA LAB | Report | Incidenty | 
| 2020 | Owning the Battlefield | Report | Ransomware | 
| 2020 | Attacker Behavior Industry Report | Report | Attack | 
| 2020 | Soft Target: The Top 10 Vulnerabilities Used by Cybercriminals | Report | Vulnerebility | 
| 2020 | SentinelOne: Global Ransomware Study 2018 | Report | Ransomware | 
| 2020 | GRIZZLY STEPPE – Russian Malicious Cyber Activity  | Report | BigBrother | 
| 2020 | Monero Mining Malware  | Report | Cryptocurrency | 
| 2020 | Business Email Compromise (BEC) Attack Trends Report | Report | Attack | 
| 2020 | The Slingshot APT | Report | APT | 
| 2020 | BRIDGING THE GAP BETWEEN SECOPS INTENT AND REALITY | Report | Cyber | 
| 2020 | FINANCIAL CYBERTHREATS IN 2017 | Report | Cyber | 
| 2020 | Malware Analysis Report: A new variant of Mobef Ransomware | Report | Malware | 
| 2020 | By the Numbers: Global Cyber Risk Perception Survey | Report | Cyber | 
| 2020 | The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation | Report | Malware | 
| 2020 | APT37 (REAPER) | Report | APT | 
| 2020 | Vulnerability QuickView 2017 Vulnerability Trends | Report | Vulnerebility | 
| 2020 | Litecoin Emerges as the Next Dominant Dark Web Currency | Report | Cryptocurrency | 
| 2020 | Targeting of Olympic Games IT Infrastructure Remains Unattributed | Report | Cyber | 
| 2020 | The 2017 State of Endpoint Security Risk | Report | Report | 
| 2020 | Dark Caracal APT – The Pallas Family | Report | APT | 
| 2020 | DOOMED TO REPEAT HISTORY? | Report | Cyber | 
| 2020 | Cybercrime tactics and techniques: 2017 state of malware | Report | CyberCrime | 
| 2020 | Operation EvilTraff | Report | BigBrother | 
| 2020 | Dark Caracal Cyber-espionage at a Global Scale | Report | BigBrother | 
| 2020 | THE 2018 HACKER REPORT | Report | Report | 
| 2020 | Report-The-Year-of-the-Defender | Report | Report | 
| 2020 | iOS Security iOS 11 January 2018 | Report | Apple | 
| 2020 | The stealth process injection of the new Ursnif malware | Report | Malware | 
| 2020 | ISTR Volume 22 | Report | Report | 
| 2020 | Q3 2017 Global DDoS Threat Landscape Report | Report | Attack | 
| 2020 | North Korea Bitten by Bitcoin Bug | Report | BigBrother | 
| 2020 | Malware Analysis Report: Bladabindi.Dec17 | Report | Malware | 
| 2020 | Kaspersky Security Bulletin: OVERALL STATISTICS FOR 2017 | Report | Report | 
| 2020 | Framework for Improving Critical Infrastructure Cybersecurity 2.0 | Report | Cyber | 
| 2020 | Cyber intrusion services casebook 2017 | Report | Cyber | 
| 2020 | Malware Analysis Report: Fake 3MobileUpdater | Report | Malware | 
| 2020 | gtic-2017-q3-threat-intelligence-report | Report | Report | 
| 2020 | Kaspersky Security Bulletin: STORY OF THE YEAR2017  | Report | Report | 
| 2020 | q3-2017-state-of-the-internet-security-report | Report | Report | 
| 2020 | 2017-benchmarking-us-government-websites | Report | BigBrother | 
| 2020 | OWASP Top 10 - 2017 | Report | Report | 
| 2020 | Beyond Black Friday Threat Report 2017 | Report | Report | 
| 2020 | KASPERSKY LAB THREAT PREDICTIONS FOR 2018 | Report | Cyber | 
| 2020 | Appendix: Analysis of the Mokes/SmokeBot backdoor from the incident | Report | Incidenty | 
| 2020 | 1H 2017 Shadow A huge trove of patient data leaks, thanks to Data Report | Report | Incidenty | 
| 2020 | Malware Analysis Report: Bad Rabbit  | Report | Malware | 
| 2020 | DoD Cybersecurity Discipline Implementation Pl | Report | BigBrother | 
| 2020 | Post-Soviet Bank Heists: A Hybrid Cybercrime Study | Report | Cyber | 
| 2020 | Office 365 Adoption Survey | Report | Cyber | 
| 2020 | ISTR Email Threats 2017 | Report | Report | 
| 2020 | Appthority’s report | Report | Report | 
| 2020 | The Apple of Your EFI | Report | Apple | 
| 2020 | Threat Landscape for Industrial Automation Systems in H1 2017  | Report | ICS | 
| 2020 | INTERNET ORGANISED CRIME THREAT ASSESSMENT 2017 | Report | CyberCrime | 
| 2020 | Webroot_Quarterly_Threat_Trends_September_2017 | Report | Report | 
| 2020 | Zimperium_Mobile_Threat_Report_Q2_2017 | Report | Report | 
| 2020 | NotPetya-report.pdf | Report | Ransomware | 
| 2020 | ISTR Ransomware 2017 | Report | Report | 
| 2020 | q2-2017-state-of-the-internet-security-report.pdf | Report | Report | 
| 2020 | National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework | Report | Cyber | 
| 2020 | Kaspersky KSN Report Ransomware 2016-2017 | Report | Report | 
| 2020 | AV-TEST Security Report 2016/2017 | Report | Report | 
| 2020 | APPLICATION SECURITY STATISTICS REPORT 2017 | Report | Report | 
| 2020 | Symantec ISTR Financial Threats Review 2017 | Report | Report | 
| 2020 | Cybercrime tactics and techniques Q2 2017 | Report | Report | 
| 2020 | RDoS Attacks: DDoS For Ransom Blooms in the Spring | Report | Attack | 
| 2020 | Comodo Threat Research Labs Q2 2017 REPORT | Report | Report | 
| 2020 | Comodo Threat Research Labs Q1 2017 REPORT | Report | Report | 
| 2020 | Symantec ISTR | Report |  |