Vigilant threat studies has been saved
Analysis
Vigilant threat studies
Insights for better threat management and response
Threat Studies are detailed reports reflecting research on ongoing threats or emerging threat trends, typically focused on specific threat actors or technical issues that are persistent over time. These studies contain detailed information on adversary tools, techniques and practices (TTPs) and associated indicators of compromise (IoCs). The threats identified for study are chosen based on their relevance and impact to our clients, and to provide coverage of threat areas that are not currently being reported by other contributors in the broader threat research community.
Explore content
- Vigilant threat studies: Black-market ecosystem
- The evolution of the Nymaim Criminal Enterprise
- Hacktivism
- Ransomware
- Join the conversation
Vigilant threat studies: Black-market ecosystem
Cyber-criminal black markets are a constantly evolving ecosystem that reflects broader trends and behaviors. However, they present difficulties to researchers when they attempt to study these dark and deep web businesses at the macroeconomic level. Many approaches fail to address the broader implications of a good or service, the actual role they serve, and the relationships a tool or service has within the cyber-criminal economy. Learn more about the Deloitte Threat Intelligence and Analytics (TIA) investigation.
The evolution of the Nymaim Criminal Enterprise
This paper traces the shifts and uses of the Nymaim family of malware from its original
Hacktivism: A defender’s playbook
This tactical guide arms organizations with the intelligence needed to know the adversary and their tactics, and to implement the right security measures to mitigate risk, today, and for the future (August 12, 2016).
Ransomware: Holding your data hostage
This study reviews the history of ransomware, describes common infection vectors and ransomware types, and proposes strategies for detection, remediation, and recovery (August 12, 2016).
Recommendations
Beneath the surface of a cyberattack
A deeper look at business impacts