You've requested...

Download this next:

Top MITRE ATT&CK techniques from criminal/APT groups

McAfee’s latest report incorporates not only the malware zoo, but new analysis for what’s being detected in the wild.

It also covers:

  • Threats to sectors and vectors
  • Sunburst malware and the SolarWinds supply chain compromise
  • Top MITRE ATT&CK techniques in Q4 2020 from criminal/APT groups
  • And much more

Download the full report to uncover it all.

These are also closely related to: "Getting Ahead of Malware"

  • Malware Exploitation of Machine Identities

    Business have seen an 8X increase in malware attacks weaponizing machine identities over the last decade.

    Read this infographic to explore more trends in machine identity exploitation and learn why a robust machine identity program is in order.

  • Detecting anomalies in your network: 13-minute demo

    With malware attacks advancing and proliferating, organizations must enhance their defenses.

    Enter ExeonTrace, a network detection and response (NDR) platform.

    Along with exploring how the platform can detect anomalies in your network, this demo:

    • Depicts the platform in action
    • Shows how ExeonTrace’s dashboard works
    • And more

    Check out the demo to learn more about boosting your security posture.

Find more content like what you just read:

  • Fast facts from 2024 SonicWall Cyber Threat Report

    SonicWall Capture Labs recorded 6.06 billion malware attacks in 2023, representing a year-over-year increase of 11%. So, what else should you know about that prevalent threat? Browse this infographic to find out.


  • Spotlight on Emerging Ransomware Threats

    Giving into ransom demands may not only lead to more ransomware attacks, but also more sophisticated ones. Paying those demands has the potential to create a false sense of security, unintended consequences and future liabilities. Tap into this e-guide to learn about current & emerging threats, best practices, and the negation process.


  • Endpoint and antimalware protection for small to large businesses

    Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.


  • New privacy laws are coming, first stop California

    The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.


  • How great is your risk of ransomware? An assessment

    Ransomware has become a booming business, complete with its own ecosystem of suppliers, specializations, and affiliate programs. Similarly, detecting and stopping a ransomware attack requires a coordinated effort — one that is risk-informed. In this eBook, learn how to evaluate your organization’s risk in the face of rising ransomware threats.


  • Sandnet++ – A framework for analysing and visualising network traffic from malware

    This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware


  • Royal Holloway: A novel approach to clustering malware behaviour to improve malware detection

    Clustering malware behaviour can be very useful, but it is unknown how accurate clustering algorithms are when dealing with malware


  • The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques

    This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.


  • Bolster signature-based malware detection with machine learning

    Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.


  • How to Evaluate Threat Intelligence Feeds

    Know When Software Is Malware. With this guide, you will learn how to evaluate open source and commercial threat intelligence feeds to ensure you have relevant and useful information about malware, ransomware, Indicators of Compromise (IoC) and threat actors, so that your team can identify malicious events and reduce noisy, time-consuming alerts.


  • Understanding behavioural detection of antivirus

    This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.


  • Extracting actionable data from banking malware

    This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.


  • Royal Holloway: Testing antivirus efficacy in Linux

    Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.


  • Infographic: SIEM vs. SOAR vs. XDR

    IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.


  • Royal Holloway: An enhanced approach for USB security management

    USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.


  • RSA Conference 2020 guide: Highlighting security's human element

    The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.


  • Panda Adaptive Defense 360 Technologies

    In an era of sophisticated ransomware and increasingly frequent cyberattacks, MSPs need to make sure they have comprehensive security capabilities. Access this white paper to learn how Panda Adaptive Defense 360 offers a full protection stack including endpoint protection technology, zero-trust defense, and contextualized behavior detection.


  • 12 essential features of advanced endpoint security tools

    Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing security policies. IT administrators can use endpoint security for a number of operation monitoring functions and data backup strategies. Here are 12 key features endpoint security products should include.


  • SIEM, SOAR or both? Our security experts weigh in

    In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).


  • Analysis of the Linux Audit System

    This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.


  • 2024 security report: Predictions from 3 CISOs

    In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.


  • U.S. FTC Safeguards Rule: What you need to know

    The Safeguards Rule requires mitigation of “reasonably foreseeable internal and external risks” - in other words, protection against data breaches, data leakage, phishing, and ransomware. Learn how Cisco Umbrella supports compliance in this white paper.


  • Mobile security moving to a unified approach

    This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.


  • What Is The Next Step For Next-Gen Antivirus?

    Enterprises need new strategies and more intelligent investments to holistically protect their valuable data from adversaries today and in the future. Get the paper today and protect your organization against tomorrow's attacks.


  • Recap: Splunk.conf 18

    Download this e-guide for coverage of Splunk.conf 2018, looking into subjects such as security automation, data-driven pre-emptive maintenance and why diversity is so important when developing the technologies of the future.


  • Powerful DDoS attacks leveraging IoT

    A series of potent, record-setting DDoS attacks hit several targets in 2016 using IoT malware to infect and leverage a large number of internet connect devices. Inside this guide, experts reveal 11 key takeaways for this type of attack and real-world examples of companies suffering from the aftermath including Dyn.


  • The rise of the MSSP

    In this e-guide we focus on managed security service providers. We look at how the channel is increasingly aware of the need for MSSPs to meet the demands of customers and the need to adapt and modernise former approaches.


  • Shields up! Why Russia's war on Ukraine should matter to security pros

    The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.


  • Focus: Securing for the future

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.


  • 7 risk mitigation strategies to protect business operations

    Risk mitigation strategies must not only identify risks and threats, but also stress the importance of identifying vulnerabilities that could open the door to risk events. In this infographic, we put together the seven most widely used risk mitigation strategies with to help business keep their data safe.


  • Computer Weekly – 4 July 2023: How data is beating heart disease

    In this week's Computer Weekly, we find out how a new data strategy is helping the British Heart Foundation to raise money and support medical research. We examine the benefits of using AI in advanced malware detection. And we reveal why the Information Commissioner is under fire for weak responses to serious data breaches. Read the issue now.


  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated

    This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.


  • Focus: IT Security in the Middle East

    In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.


  • MicroScope – February 2020: The power to transform

    In this issue, MicroScope asks experts what to expect in 2020, and the channel shares why change is necessary to thrive in different business environments


  • How to plan virtual events

    Have you been tasked with launching a virtual event, but don’t know where to start? Join us for Flip the Switch: Virtual events 101 and let the BrightTALK team guide you step-by-step through creating and launching your virtual event.


  • Case study: How AWS and AllCloud helped build a hybrid event platform

    VOK DAMS, an international communications agency for events and live marketing, needed a way to create a platform for hosting hybrid events with both digital and in-person participants. Check out this brief case study to explore the benefits of working with AWS and AllCloud to build a foundation for your business innovation needs.


  • How intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks

    This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks


  • The state of artificial intelligence (AI) in cybersecurity

    While security teams strive to combat new threats as fast as they can, as long as their approach is reactionary, hackers will always have the upper hand. This white paper examines how the adoption of AI and ML presents an opportunity to overcome reactionary approaches and achieve proactive anti-malware security. Read on to learn more.


  • Royal Holloway: Information security of the 2016 Philippine automated elections

    We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.


  • Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk

    Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.


  • What will make the IT buying team come to your organization's event?

    In this TechTarget infographic, take a deep dive into buyers’ attitudes towards attending in-person events, including their motivations why they would be inclined to attend, and the secrets to attracting them to your event.


  • MicroScope – June 2020: The surge in home working

    The shift by many to home working has created opportunities and challenges for the channel as it looks to help customers through the changes. Also discover the importance of diversity in your workforce, and how Covid-19 is affecting IT events


  • Computer Weekly – 30 August 2016: Get protected

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.


  • Event recap: VMworld 2018 Europe

    It is the 20th anniversary year for VMware and at the VMware European conference in Barcelona, the company famous for its hypervisor, showcased how it had changed the face of IT, and where it was heading next.


  • Structured logs vs. events: Demystifying observability

    Structured logs and events: How are they different? Access an answer in this blog on observability penned by Staff Engineer at Honeycomb, Ben Hartshorne.


  • Computer Weekly – 3 October 2023: Where next for quantum computing?

    In this week's Computer Weekly, we talk to the head of Amazon's Braket quantum computing services about how the technology is progressing. We go behind the scenes at an ethical hacker event to find out how bug bounty programmes work. And we analyse the offerings of the major players in software-defined storage. Read the issue now.


  • How Analysts Can Confidently Remediate Security Incidents

    In this video, Endace’s Michael Morris demonstrates an integration and workflow between Endace, Cisco Firepower and Splunk Enterprise. View now to understand how the workflow can enable analysts to more confidently remediate security incidents.


  • March ezine: Making tracks to SD-WAN growth

    SD-WAN is a technology on the rise and there are clearly plenty of channel opportunities out there for those that get a firm grip on deployment and installation


  • Podcast: The Computer Weekly Downtime Upload – Episode 32

    In this week's episode of the Computer Weekly Downtime Upload podcast, Brian McKenna, Caroline Donnelly and Clare McDonald talk about Computer Weekly's diversity and inclusion event, Oracle Open World 2019, and government technology.


  • 2022 UKI Media Consumption Study: Transform your face-to-face event thinking

    In this infographic, we look at buyers' attitudes towards attending in-person events, includingtheir motivations why they would be inclined to attend.


  • New 2024 vulnerability: Are you at risk?

    Today’s organizations don’t have a malware problem, they have an adversary problem. CleanINTERNET from Centripetal Networks offers dynamic threat intelligence-based protection against known indicators of compromise, limiting threat actors’ ability to attack. Read this blog to learn if you are the bearer of a known vulnerability in 2024.


  • Designing your Kubernetes security strategy

    Download this e-book to learn how to design a security strategy that reinforces, rather than hinders, the rest of your Kubernetes-based processes.


  • Computer Weekly - 9 February 2021: Audi fine-tunes its digital performance to boost online car sales

    In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.