Third-Party
Stats & Surveys
GSMA’s “Mobile Device Theft – State of Affairs”
The need for better collaborative intelligence sharing of information on the techniques and tactics employed by criminals is one of the take-aways from this new GSMA report (published February 2025). View the Report
GSMA’s “Mobile Telecommunications Security Landscape 2025”
GSMA’s seventh annual Mobile Telecommunications Security Landscape report 2025 (published February 2025). View the Report
Red Piranha’s “2025 Threat Intelligence & Ransomware Report”
A steep rise in double extortion tactics and hybrid cloud-targeting attacks as well as notable dominance of malware variants like LockBit, Cl0p, and BlackCat are among the highlights of Red Piranha’s new threat report (Published February 2025). View the report
NCC Group’s “Cyber Threat Monitoring Report 2024”
2024 saw the highest volume of annual ransomware cases since NCC Group started monitoring ransomware activity, with 5,263 attacks (Published January 2025). View the report
Whalebone’s “Network Security Threat Landscape Report 2024”
Whalebone shares its most recent threat intel findings observed across all malicious traffic analyzed DNS resolvers (Published January 2025). View the report
CTA’s “Cybersecurity in the Age of Gen AI Part 2”
Cyber Threat Alliance’s Cybersecurity in the Age of Gen AI Joint Part 2 – Navigating Cyber threats to Gen AI systems (Published January 2025). View the report
CTA’s “Cybersecurity in the Age of Gen AI Part 1”
Cyber Threat Alliance’s Cybersecurity in the Age of Gen AI Joint Part I – Combating GenAI Assisted Cyber Threats (Published January 2025). View the report
FortiGuard Lab’s “Cyber Threat Predictions for 2025”
Emerging attack trends to watch for in 2025 and beyond from Fortinet’s FortiGuard Labs (Published January 2025). View the report
Google Cloud’s “Cybersecurity Forecast 2025”
AI-powered attacks, geopolitical tensions, and sophisticated cyber crime attacks are just a few of the challenges organizations will face in the coming year. (Published December 2024) (Published November 2024). View the report
Russian Influence Operations: “Operation Undercut”
“Operation Undercut” Shows Multifaceted Nature of SDA’s Influence Operations (Published November 2024). View the Report
Vulnerability Disclosure Policy Usage in Global Consumer IoT in 2024
64% of the companies surveyed didn’t have a way for security researchers to contact them acording to this new Copper Horse report on VDP usage in consumer IoT (Published November 2024). View the Report
Gen’s Q3 2024 Threat Report
Cybercriminals are taking scams to the next level, from sneaky malware disguised as CAPTCHA prompts to a surge in “Scam-Yourself Attacks” (Published November 2024).
View the Report
