You've requested...

Share this with your colleagues:

Download this next:

BlackBerry 2021 Threat Report

The BlackBerry 2021 Threat Report examines and analyzes the biggest cybersecurity events of the current and past year. This edition covers COVID-19 exploitation, election vulnerabilities, top malware attacks, and many other contemporary issues. Download it now.

These are also closely related to: "Getting Ahead of Malware"

  • Preventing Malware Attacks

    As new technologies emerge, so do new, and often defenseless avenues for malware attacks. In this expert guide, uncover proactive security measures for malware defense as well as gain best social networking practices for preventing social network malware.

  • Best Practices for Preventing Malware

    Preventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.

Find more content like what you just read:

  • Technical Guide on Malware Trends

    TechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.

    Download

  • Malware in 2021: Infographic

    In 2020, organizations experienced malware attacks on a whole new scale – an increased volume of sophisticated attacks plagued nearly every business. This infographic provides a comprehensive look at malware trends, observations, insights and adversary techniques over the past year. Read on to get started.

    Download

  • Malware Attacks Demand a New Malware Defense Approach

    Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!

    Download

  • Overcoming APT and Today’s Sophisticated Malware

    In this e-guide from SearchSecurity.com, hear from experts as they discuss the dangers behind malware and APT attacks and offer effective virus detection techniques to help you address them.

    Download

  • Proactive security measures: How to prevent malware attacks

    Read this expert E-guide to find out what new malware threats can mean for your business. Learn how to stop the malware inside your network and other key tips to evolving your security in order to combat dangerous new forms of malware by consulting this resource.

    Download

  • Research Paper Best Practice Makes Perfect: Malware Response In The New Normal

    Over the past few years, malware attacks have grown in both frequency as well as severity – a change made more dramatic by the spread of COVID-19. But as we enter the new normal, what will malware threats and prevention efforts look like? Read this whitepaper to find out.

    Download

  • Defeat malware and protect against future zero-day attacks

    In 2019, the Mahnomen County Sheriff’s Office was hit by a malware attack. It moved quickly, immobilizing activities and rapidly jumping from computer to computer. Take a quick survey to access more about the Mahnomen County Sheriff’s Office attack and cybersecurity solutions that defends against new, emerging, and unique attacks.

    Download

  • Threat hunter intelligence report: Malware

    Download this Threat Hunter Intelligence Report to take a look at some of the most prevalent types of malware to watch out for. This report also covers tips for protecting your data and highlights a few other threats (and threat actors) you should know about.

    Download

  • Evolve your Endpoint Security Strategy Past Antivirus and into the Cloud

    In this expert e-guide, you will gain insight into an endpoint security strategy that looks beyond antivirus and the key functions that are missing in many cloud-based endpoint security services. Read the e-guide and discover how to evolve your endpoint strategy.

    Download

  • Malware activity breakdown from June-July 2021

    eSentire's TI team discuss the latest incidents by breaking down notable malware activity by its history, detection, and their assessment of the incident. Watch the webinar to dive into topics such as REvil ransomware campaign against Kaseya VSA Servers, PrintNightmare Windows vulnerability, and the ongoing FIN7 campaign.

    Download

  • eSentire Video 1

    As our work environments change, so too do the threats targeting them. Today’s malware threats are more focused on your people rather than your perimeter. Watch this exclusive webinar to learn how to identify, mitigate and hunt for malware.

    Download

  • Top 5 malware campaigns from 2020

    Did you know that malware attacks jumped 358% last year? It’s 2021 now, but malware – and ransomware and trojans, for that matter – aren’t going anywhere any time soon. Stay ahead – Download this infographic to learn about the top 5 most dangerous malware campaigns from 2020 as well as the biggest threats to Android, Office and Mac-OS.

    Download

  • 2020 cyber threat landscape report

    Cyber threats assumed the spotlight in 2020, but which ones shined the brightest? Download Deep Instinct’s 2020 Cyber Threat Landscape report to examine the top 5 malware, ransomware and banking trojan families, malware trends by OS and campaign and some of the most serious past and future cyber risks.

    Download

  • Malware Threat Report 2021

    Threat actors are shifting to Malware-as-a-Service (MaaS) models with specialists emerging in different areas as enterprises simultaneously adopt SaaS. As a means of combating today’s threat landscape, BeyondTrust offers its 2021 malware threat report including key findings & insights. Download the comprehensive report to get started.

    Download

  • Conflicker Working Group - Lessons learned from Conflicker

    In November 2008, Conficker A, the first of five variants of the malware, rapidly began infecting computers which had failed to install a Microsoft patch released just weeks earlier. In late December 2008, Conficker B added new mechanisms for distribution including USB storage devices.

    Download

  • E-Guide: New Malware Threats Require New Antimalware Protection Strategy

    This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.

    Download

  • ISM Essentials Guide – Threat Management

    In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.

    Download

  • Protecting ICS from malware without installing security software

    Complying with Industrial Control Systems (ICS) security standards requires effective endpoint security solutions to be installed across production machines; but, manufacturer warranties and patching challenges often get in the way. Access this whitepaper to learn how to protect systems from malware without having to install software.

    Download

  • AI-driven malware protection for mobile devices

    Mobile malware is more prevalent than ever, with attacks rising 50% in the last year alone. So, it is time to become protected with the AI-based security in BlackBerry Protect. Read on to learn how to monitor mobile malware attacks at the device and application levels to extend protection with no need for additional manpower.

    Download

  • Key research findings: The value of threat intelligence

    With over 80% of organizations reporting 1 or more security incidents over the past year, it’s safe to say that security issues are common. This study shows that while most organizations can defend against malware attacks, they fail against most other threats. Read on to view the results of Osterman’s study into the value of threat intelligence.

    Download

  • How COVID-19 has changed ransomware attacks

    In Australia, organizations across every sector have been on the receiving end of increasingly frequent and complex malware and ransomware attacks. This article highlights one of the most prominent ransomware attacks, discusses cybersecurity in the COVID-19 era, and more. Read on to get started.

    Download

  • Attackers adopt exotic programming languages

    Download this report to examine a growing trend by threat actors and security researchers alike of leveraging new and uncommon programming languages to evade detection and hinder analysis. It focuses on 4 of the most popular of these exotic languages and their use in the malware space.

    Download

  • Top MITRE ATT&CK techniques from criminal/APT groups

    Download McAfee’s latest threat report to uncover their findings on Sunburst malware and the SolarWinds supply chain compromise, top MITRE ATT&CK techniques from criminal/APT groups, and much more.

    Download

  • Mid-Year Threat Landscape Report 2020

    Uncover the research found in the Mid-Year 2020 Threat Landscape report, which looks back at the windows, MacOS, and Android threat landscapes, as well as the evolution of ransomware families and spam.

    Download

  • How cybercrime and cybersecurity changed in 2020

    2020 was a year of tragedy, upheaval, and adaptation. People and organizations adapted, but so did the cybercriminals who preyed upon them.Download this report to learn more about the state of malware as we enter the new year.

    Download

  • CISSP Study Guide: 4 Steps to Success

    The total cost of a successful attack is over $5 million, according to Ponemon Institute's 2017 State of Endpoint Security Risk Report. Simply complete our Endpoint Security Survey to access our complimentary expert guide, Endpoint Defense: Security Controls to Consider Now.

    Download

  • Hunting Sodinokibi: Insights from tracking the king of ransomware

    In this podcast, experts from IBM draw on their original research and collective insights to share how Sodinokibi operates, its malware uniqueness, and the damage it has inflicted. Tune in to learn more.

    Download

  • Your CISSP Guide Awaits

    The total cost of a successful attack is over $5 million, according to Ponemon Institute's 2017 State of Endpoint Security Risk Report. Simply complete our Endpoint Security Survey to access our complimentary expert guide, Endpoint Defense: Security Controls to Consider Now.

    Download

  • A 2021 cyberthreat report

    This Infoblox report provides detailed analysis on the most pressing risks and cyber threats facing business organizations today. It delivers important news on the evolving methodologies and technologies attackers are using to breach defenses. Open the report to learn more.

    Download

  • 2021 mid-year threat landscape

    Which tactics did bad actors leverage most in the first half of 2021? What do the results say about what they’ll do in the second half? Download Deep Instinct’s 2021 Mid-Year Threat Landscape Report to uncover the biggest trends in malware, ransomware and banking trojans from H1 2021.

    Download

  • Conti ransomware vs. BlackBerry defenses

    Access this video demo to observe an in-depth examination of 2 recent versions of Conti Ransomware attacks and how BlackBerry was able to defend against these attacks by preventing the malware from running.

    Download

  • Why traditional data protection solutions fall short

    This IDC white paper outlines what CISOs should understand about the modern threats of continual cyberattacks and why traditional data protection solutions don’t fully address modern threats. Read on to get started.

    Download

  • 2021 Endpoints threats trends – Cybersecurity threat trends: phishing, crypto top the list

    In this report, discover how using Cisco Umbrella captured billions of queries, identifying the top cyber threats in 2020, and how to stop them in the future.

    Download

  • Fight threats in financial services

    Accenture and the Ponemon Institute say that the cost of cybercrime for financial services (FS) is 40% higher than other industries. Attacks such as credential and identity theft and malware plague this industry – and the risk of brand damage is high. Download this brief to explore how Analyst1 aims to deliver FS a better way to fight threats.

    Download

  • How hackers persist in your environment

    Persistence has quickly become a staple in the modern attacker’s playbook. And while it gives attackers an ability to maintain access to compromised systems, it’s also an opportunity for detection. Put on your hacker hats and watch this webinar to learn common techniques that adversaries and malware use to persist.

    Download

  • Hunting threats in harm's way and dissecting it the Holmes way!

    This talk will cover the rise of RATS, the rise of XLS attachment exploits, and new obfuscation techniques to conceal core code and configuration files by malware authors. The talk also touches on the theme of how techniques in exfiltration are changing and how rapidly other threat actors are adopting or improvising on these trends.

    Download

  • Fireside Chat: Cybersecurity Trends in Manufacturing

    Regardless of the type of product you produce, malware attacks and venomous traffic sources are major threats to your manufacturing operations. Watch the webinar to learn about: common misconceptions, how sophisticated cyberattacks have become over the last few years, why ransomware has become the biggest concern, and more.

    Download

  • 6 Essential Features of a Modern Firewall

    Without decryption, you will have no view into data type, application, policy adherence, file type, or data exfiltration attempts via HTTPS. Become informed and prepared by checking out this multifaceted e-book. It informs you about various attacks, provides tips, and goes over the essential features of a modern firewall and more.

    Download

  • Replacing your antivirus? Here's what you need to know

    As cyberattacks evolve into most sophisticated and directed attacks, traditional detection methods, like antivirus (AV) tools, grow increasingly insufficient. Download this guide to better understand the critical information needed to make an informed decision about replacing your AV or endpoint security tools.

    Download

  • Ransomware: A rapidly evolving trend

    In 2020, 54% of cyber insurance claims were malware/ransomware, according to a University of Cambridge report. The rapid digital transformation has given cyber criminals new opportunity. Download BitSight’s e-book to learn about the latest tactics, trends, victims of ransomware attacks & more.

    Download

  • Endpoint and antimalware protection for small to large businesses

    Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.

    Download

  • Surviving a cyberattack 101

    According to Accenture, a cyberattack now occurs every 39 seconds, and the average cost of an attack to organizations is up to $13 million. Organizations that don’t know how to respond in the event of an attack risk not only capital but credibility as well. Watch this webinar to learn how security transformation helps you survive cyberattacks.

    Download

  • Incident response checklist

    Many organizations do not have clear, step-by-step guidelines on what to do in the event of a security incident, and it ends up costing them more than it should. Download this incident response checklist, provided by Huntress, to examine the executive and technical measures to take when you’re under fire from a bad actor.

    Download

  • Buyer's Guide to Antimalware

    Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.

    Download

  • After Antimalware: Moving Toward Endpoint Antivirus Alternatives

    This E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.

    Download

  • Ransomware’s new trend: Exfiltration and extortion

    Recent data shows that threats are developing in two key areas: data exfiltration and extortion. Bad actors are using ransomware as a means to these ends. Organizations must be aptly prepared by knowing what these processes look like. View this white paper to get an in-depth look at an exfiltration-focused attack as well as the extortion phase.

    Download

  • The Evolution of Threat Detection and Management

    This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.

    Download