Third-Party Content
“F-Secured: Your Complete Guide to Online Security in 2024”
“AI will play a pivotal role in shaping the evolution of our society, as well as how scammers and cyber criminals amplify their operations.” See F-Secure’s new report for more (Published April 2024). View the Report
Mobile Threat Intelligence Framework (MoTIF) Principles Version 1.0
MoTIF a first version of a framework for describing how adversaries attack and use mobile networks, based on the TTPs they use (published April 2024) View MoTIF
The GSMA’s ‘MoTIF’ – what it is and how it was established
GSMA MOTIF Chair, Enea AB’s Cathal McDaid, explains what the Mobile Threat Intelligence Framework (MOTIF) is and why it’s needed (April 2024). View the Blog
The EU’s Cyber Resilience Act: Requirements Standards Mapping
This ENISA study maps the most relevant among existing cybersecurity standards to each of the requirements of the EU’s Cyber Resilience Act as well as highlights possible gaps to be addressed. (published 2024). View the Report
Enea’s “Bridging The Gap” survey report
Enea’s survey report: “Mobile Network Security: Bridging the gap between enterprise needs and CSP capabilities” (published March 2024). View the Report
Cisco’s 2024 Cybersecurity Readiness Index
Only 3% of respondent organizations qualify for Cisco’s “Mature” category. Nearly three-quarters (71%) fall in the bottom two categories – Formative, 60% and Beginner, 11%. (Published March 2024). View the Report
Recorded Future’s 2023 Annual Report
Throughout 2023, threat actors increasingly favored vulnerabilities that would allow the exploitation of multiple victim enterprises through a single vulnerability in a third-party product (Published March 2024). View the Report
GSMA’s “Mobile Telecommunications Security Landscape 2024”
GSMA’s “Mobile Telecommunications Security Landscape 2024” (published February 2024). View the Report
Red Canary’s 2024 Threat Detection Report
While both defenders and cybercriminals have discovered use cases for GenAI, Red Canary sees defenders as having the edge (Published February 2024). View the Report
The FBI’s “Internet Crime Report 2023”
Investment fraud was once again the costliest type of crime with losses rising to $4.57 billion in 2023 The second-costliest type of crime was business e-mail compromise (BEC). Tech support scams were the third-costliest (Published March 2024). View the Report
Palo Alto Networks Unit 42 Incident Response Report
In the past year, attackers’ initial access most often started with a software vulnerability. The largest attack campaigns began with successful exploitation of internet-facing systems. From there, the stories varied (published 2024). View the Report
Poneomon Institute Survey Report on Preparing for a Quantum Safe Future
Organizations must overcome several barriers on the path to preparing for a safe post-quantum computing future. How does your organization measure up? (Published October 2023). View the Survey Report
