IAB White Papers

(View All Report Types)
Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Demystifying Initial Access Brokers (IABS) and Their Links to Ransomware
sponsored by Outpost24
WHITE PAPER: This white paper examines the role of Initial Access Brokers in cybercrime, detailing how they obtain and sell corporate network access to ransomware groups. It analyzes access sales on forums, pricing trends, and the relationship between IABs and ransomware operators. Read the full white paper to understand this critical cybersecurity threat.
Posted: 06 Mar 2025 | Published: 06 Mar 2025

Outpost24

The Rising Threat of Traffers
sponsored by Outpost24
RESEARCH CONTENT: This report examines the threat of traffers - cybercriminal groups focused on credential theft. It explores their structure, tools, and impact on underground markets. Learn how traffers operate, spread malware, and profit from stolen data. Read the full report to understand this threat and get recommendations for protecting your organization.
Posted: 06 Mar 2025 | Published: 06 Mar 2025

Outpost24

The State Of Cyber Security 2025
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT: The State of Cyber Security 2025 report highlights a 58% rise in infostealer attacks, increased ransomware targeting of healthcare, and evolving nation-state cyber tactics. Cloud vulnerabilities and edge devices remain key threats. Read this report to grasp today's threat landscape and apply recommended defense strategies.
Posted: 16 Apr 2025 | Published: 16 Apr 2025

Checkpoint Software Technologies

Specops Breached Password Report 2025
sponsored by SpecOps and Outpost24
RESEARCH CONTENT: This report analyzes over 1 billion malware-stolen passwords, revealing alarming trends. Despite security awareness, users still create weak passwords like "123456" and "admin." Read on to examine how malware like Redline, Vidar, and Raccoon Stealer could impact organizations like yours and the current password security trends therein.
Posted: 06 Mar 2025 | Published: 06 Mar 2025

SpecOps and Outpost24

Threat Report H2 2024
sponsored by ESET
ANALYST REPORT: This threat report examines key cybersecurity trends in H2 2024, including the rise of RansomHub as the leading ransomware-as-a-service, a surge in cryptostealers, and new mobile phishing tactics using PWAs. It also covers infostealer landscape shifts and emerging scams targeting online bookings. Read the full report for comprehensive insights.
Posted: 27 Feb 2025 | Published: 27 Feb 2025

ESET

Computer Weekly - 8 February 2022: Exploring the metaverse
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.
Posted: 04 Feb 2022 | Published: 08 Feb 2022

TechTarget ComputerWeekly.com