Any.Run | Annual Report 2022 | 2023 |
Arctic Wolf | The 2023 State of Cybersecurity | 2023 |
Avast | Q4 2022 Threat Report | 2023 |
BD | BD 2022 Cybersecurity Annual Report | 2023 |
BeyondTrust | Microsoft Vulnerabilities Report 2023 | 2023 |
Blackberry | Global Threat Intelligence Report | 2023 |
Check Point | 2023 Cyber Security Report | 2023 |
Cisco | Cisco 2023 Data Privacy Benchmark Study | 2023 |
Cisco | Cisco Cybersecurity Readiness Index | 2023 |
CrowdStrike | CrowdStrike 2023 Global Threat Report | 2023 |
Cyble | Underground Threat Activity Report 2022 | 2023 |
Datto | Datto SMB Cybersecurity for MSPs Report | 2023 |
Google | Google Threat Horizons | 2023 |
IBM Security X-Force | IBM Security X-Force Threat Intelligence Index 2023 | 2023 |
IBM X-Force | X-Force Threat Intelligence Index 2023 | 2023 |
IC3 | FBI Internet Crime Report 2022 - Direct Download PDF | 2023 |
Kaspersky | The mobile malware threat landscape in 2022 | 2023 |
Mandiant | Global Perspectives on Threat Intelligence Report | 2023 |
McAfee | 2023 McAfee Consumer Mobile Threat Report | 2023 |
Meta | Adversarial Threat Report, Q4 2022 | 2023 |
ODNI | Annual Threat Assessment of the U.S. Intelligence Community | 2023 |
Orange Cyberdefense | Cy-Xplorer 2023 | 2023 |
proofpoint | State of the Phish Report | 2023 |
proofpoint | 2023 Human Factor | 2023 |
PwC | Cyber Threats 2022: A Year in Retrospect | 2023 |
RecordedFuture | 2022 Annual Report | 2023 |
Red Canary | Red Canary 2023 Threat Detection Report | 2023 |
RiskLens | 2023 Cybersecurity Risk Report | 2023 |
SonicWall | 2023 SonicWall Cyber Threat Report | 2023 |
Sophos Labs | Sophos 2023 Threat Report | 2023 |
TrendMicro | 2022 Annual Cybersecurity Report | 2023 |
Unit 42 | 2023 Unit 42 Ransomware and Extortion Report | 2023 |
Veeam | 2022 Ransomware Trends Report | 2023 |
Verizon | 2023 Data Breach Investigations Report | 2023 |
Accenture | 2021 Cyber Threat Intelligence Report - Vol 1 and Vol 2 | 2022 |
Apple | Apple Platform Security Guide | 2022 |
Arctic Wolf | 2022 Trends - The State of Cybesecurity | 2022 |
AT&T | Cyber Security Insights Report | 2022 |
Avast | Q4 '21 Report | 2022 |
BakerHostetler | Data Security Incident Response Report - Resilience and Perseverance | 2022 |
BeyondTrust | Microsoft Vulnerabilities Report | 2022 |
Blackberry | BlackBerry 2022 Threat Report | 2022 |
Bulletproof | Bulletproof Annual Cyber Security Report 2022 | 2022 |
Check Point | Cyber Security Report 2022 | 2022 |
CISA | 2021 Top Routinely Exploited Vulnerabilities | 2022 |
Cisco | Cisco 2022 Data Privacy Benchmark Study | 2022 |
CrowdStrike | 2022 Global Threat Report | 2022 |
CyberEdge Group | 2022 Cyberthreat Defense Report | 2022 |
Google | Threat Horizons - Cloud Threat Intelligence | 2022 |
Group-IB | Ransomware Uncovered 2021/2022 | 2022 |
IBM - X-Force | X-Force Threat Intelligence Index 2022 | 2022 |
IDC | Worldwide Digital Forensics in Public Safety 2022 Vendor Assessment | 2022 |
Kaspersky | Mobile malware evolution 2021 | 2022 |
Kroll | Q4 2021 Threat Landscape | 2022 |
Mandiant | M-Trends 2022 | 2022 |
Mcafee Labs | Threat Predictions Report | 2022 |
Meta | Adversarial Threat Report | 2022 |
ODNI | 2022 Annual Threat Assessment of the U.S. Intelligence Community | 2022 |
PwC | Cyber Threats 2021: A Year in Retrospect | 2022 |
RecordedFuture | 2021 Vulnerabilty Landscape | 2022 |
Red Canary | 2022 Threat Detection Report (Direct Link) | 2022 |
RIA | Cyber Security in Estonia 2022 - Direct Download Link | 2022 |
SonicWall | 2022 Cyber Threat Report | 2022 |
SophosLabs | SophosLabs Threat Report | 2022 |
State Security Department of Lithuania | National Threat Assessment | 2022 |
Toshiba | 2021 Cyber Security Report | 2022 |
UK Government | Cyber Security Breaches Survey 2022 | 2022 |
Unit 42 | 2022 Unit 42 Ransomware Threat Report | 2022 |
US-CISA | Live Releases of Cyber Threat Analysis Reports | 2022 |
Verizon | 2022 Data Breach Investigation Report (DBIR) | 2022 |
vmware | Global Incident Response Threat Report: Manipulating Reality | 2022 |
Apple | Apple Platform Security | 2021 |
Avanan | 1H Cyber Attack Report | 2021 |
Avast | Q3 '21 Report | 2021 |
Baker Hostetler | Data Security Incident Response Report - Disruption and Transformation | 2021 |
BDO.cw | BDO Cyber H1 2021 Threat Intelligence Report | 2021 |
Blackberry | 2021 Threat Report Highlights | 2021 |
Bulletproof | Bulletproof Annual Cyber Security Report | 2021 |
Cisco | Threat Insights/Threat Explainers | 2021 |
Cisco | Security Outcomes Study, Data Privacy Benchmark Study, CISO Benchmark, | 2021 |
CompTIA | State of Cybersecurity 2021 | 2021 |
ConnectWise | Perch MSP Threat Report | 2021 |
CrowdStrike | Global Threat Report | 2021 |
Crowdstrike | Nowhere to Hide - 2021 Threat Hunting Report | 2021 |
ENISA | ENISA Threat Landscape 2021 | 2021 |
ESET | Threat Report T3 2021 | 2021 |
ESET | Threat Report T2 2021 | 2021 |
FinCen | Financial Trend Analysis - Ransomware Trends in Bank Secrecy Act Data Between 01/21 & 06/21 | 2021 |
FireEye | M-Trends | 2021 |
Google | Android Enterprise Security Paper | 2021 |
Hiscox | Hiscox Cyber Readiness Report | 2021 |
HP Wolf Security | Threat Insights Report Q4 | 2021 |
HP Wolf Security | HP Wolf Security Threat Insights Report - Q3 - 2021 | 2021 |
IBM | Cost of Data Breach Study | 2021 |
IBM - X-Force | 2021 IBM Security X-Force Cloud Threat Landscape Report | 2021 |
ISACA | State of Cybersecurity, 2021 Part 2 | 2021 |
Kaspersky | Advanced Threat Predictions for 2022 | 2021 |
Kaspersky | Kaspersky Security Bulletin 2020/2021 [EU] | 2021 |
Kroll | Global Fraud and Risk Report 2021 | 2021 |
MalwareBytes | 2021 State of Malware Report | 2021 |
McAfee Labs | Advanced Threat Reserach Report - Oct 2021 | 2021 |
Microsoft | Microsoft Digital Defense Report | 2021 |
SophosLabs | SophosLabs Threat Report | 2021 |
Trend Micro | Attacks from All Angles | 2021 |
Verizon | Data Breach Investigations Report | 2021 |
Verizon | Mobile Security Index | 2021 |
VirusTotal | VirusTotal Ransomware Activity Report | 2021 |
VMWare | The State of Incident Response - 2021 | 2021 |
VMWare | Global Security Insights Report | 2021 |
Accenture | Third Annual State of Cyber Resilience | 2020 |
AT&T | Cybersecurity Insights Report | 2020 |
Beazley | Beazley Breach Briefing | 2020 |
Bullet Proof | Annual Cyber Security Industry Report 2020 | 2020 |
Check Point Research | Cyber Security Report | 2020 |
CrowdStrike | Global Threat Report | 2020 |
Crypsis | Incident Response and Data Breach Report | 2020 |
ENISA | ENISA Threat Landscape - 2020 | 2020 |
FBI - IC3 | Internet Crime Report | 2020 |
FireEye | M-Trends | 2020 |
F-Secure | F-Secure Annual State of CyberSecurity Webinar | 2020 |
Herjavec Group | Official Annual Cybercrime Report | 2020 |
Hiscox | Hiscox Cyber Readiness Report | 2020 |
ISACA | State of Cybersecurity 2020 | 2020 |
Kasperskey | Kaspersky Security Bulletin - 2020 | 2020 |
Kroll | Global Fraud and Risk Report | 2020 |
MalwareBytes | State of Malware Report | 2020 |
Microsoft | Microsoft Digital Defense Report | 2020 |
Optiv | Cyber Threat Intelligence Estimate | 2020 |
SonicWall | Sonicwall Cyber Threat Report | 2020 |
SophosLabs | SophosLabs Threat Report | 2020 |
Verizon | Data Breach Investigations Report | 2020 |
Verizon | Mobile Security Index | 2020 |
VMware Carbon Black Threat Analysis Unit | Cybersecurity Outlook Report | 2020 |
Beazley | Beazley Breach Briefing | 2019 |
CrowdStrike | Global Threat Report | 2019 |
FireEye | M-Trends | 2019 |
MalwareBytes | State of Malware Report | 2019 |
RSA | Current State of Cybercrime | 2019 |
SonicWall | Security Annual Threat Report | 2019 |
Symantec | Internet Security Threat Report | 2019 |
TrustWave | TrustWave Global Security Report | 2019 |
Verizon | Data Breach Investigations Report | 2019 |
Verizon | Data Breach Investigations Report | 2019 |
Baker Hostetler | Data Security Incident Response Report | 2018 |
CrowdStrike | Global Threat Report | 2018 |
FireEye | M-Trends | 2018 |
Microsoft | Microsoft Annual Security Intelligence Report | 2018 |
Optiv | Cyber Threat Intelligence Estimate | 2018 |
Secureworks | Secureworks State of Cybercrime Report | 2018 |
U.S. House of Representatives Committee on Oversight and Government Reform | The Congressional Report on Equifax Hack | 2018 |
Verizon | Data Breach Investigations Report | 2018 |
Cisco | Cisco Mid-Year and Annual Cyber Security Reports | 2017 |
ENISA | ENISA Threat Landscape Report | 2017 |
FireEye | M-Trends | 2017 |
Flashpoint | Business Risk Intelligence (BRI) Decision Report | 2017 |
F-Secure | F-Secure Annual State of CyberSecurity Report | 2017 |
Kaspersky | Kaspersky Quarterly Malware Report | 2017 |
Kroll | Global Fraud Report | 2017 |
MalwareBytes | State of Malware Report | 2017 |
Verizon | Verizon Annual Breach Report | 2017 |
Verizon | Data Breach Investigations Report | 2017 |
FireEye | M-Trends | 2016 |
Flashpoint | Business Risk Intelligence Decision Report | 2016 |
Google | Android Security Annual Report | 2016 |
IBM | Cost of Data Breach Study | 2016 |
IBM | Cyber Security Intelligence Index | 2016 |
Kroll | Annual Data Breach Trends | 2016 |
Mcafee Labs | Threats Predictions report | 2016 |
Pwnie Express | Internet of Evil Things Report | 2016 |
Redspin | Protected Health Information (PHI) | 2016 |
Symantec | Internet Security Threat Report | 2016 |
AT&T | Cybersecurity Insights Report | 2015 |
FireEye | M-Trends | 2015 |
Google | Android Security Annual Report | 2015 |
FireEye | M-Trends | 2014 |