Threat Reports

Our research team comprises some of the best minds in information security. With a strong pulse on how geopolitical activity intersects cybersecurity, we provide key insights on global attack trends and bring those stories to life with threat reports. View Threat Reports

Iron Rain: Understanding Nation-State Motives and APT Groups
Iron Rain: Understanding Nation-State Motives and APT Groups

Explore the tactics, techniques and procedures as well as predictions on the subsequent evolution of their operations in 2021 and beyond.

Global Incident Response Threat Report: The Cybersecurity Tipping Point
The Cybersecurity Tipping Point

Election, COVID-19 create perfect storm for increasingly sophisticated cyberattacks.

COVID-19 Continues to Create a Larger Surface Area for Cyberattacks
COVID-19 Continues to Create a Larger Surface Area for Cyberattacks

Incident response professionals note an increase in counter IR and island hopping.

Global Threat Report: Extended Enterprise Under Threat
Extended Enterprise Under Threat

94% of organizations worldwide have suffered a data breach as a result of a cyberattack in the past 12 months.

Modern Bank Heists 3.0
Modern Bank Heists 3.0

25 CISOs from leading financial institutions reveal their thoughts on the 2020 attack landscape.

Focusing on the Endpoint as a Key Element of Your Security Infrastructure
Focusing on the Endpoint as a Key Element of Your Security Infrastructure

Endpoints are being attacked in a variety of ways, including email-based phishing, ransomware, malware, and drive-by downloads from web surfing.

2020 Cybersecurity Outlook Report
2020 Cybersecurity Outlook Report

In this report, we use key data from cyberattacks seen over the last year to tell a clear story on how attackers are evolving and what defenders are doing to evolve their own behaviors.

2019 Holiday Threat Report
2019 Holiday Threat Report

The following report presents the highlights of our latest research and includes specific recommendations for how retailers can enjoy a happy holiday season.

Defender Power On The Rise
Defender Power On The Rise

Over 2000 CIOs, CTOs and CISOs, across multiple territories, discuss the challenges and issues facing global businesses when it comes to escalating cyberattacks.

Access Mining: How a Prominent Cryptomining Botnet is Paving the Way for a Lucrative and Illicit Revenue Model
Access Mining: How a Prominent Cryptomining Botnet is Paving the Way for a Lucrative and Illicit Revenue Model

VMware Carbon Black’s Threat Analysis Unit has uncovered a secondary component in a well-known cryptomining campaign.

Research Blogs

Our expert team of researchers and thought leadership authors stay dialed in to the latest attack methods and trends, and brings those strategic and tactical insights to the public via our award-winning blog. View Blog Posts

bg-cta

Get Started Now

Ready to see how VMware Carbon Black can simplify your security stack?

cross