Software  >  

Malware

RSS Feed   
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Malware White Papers (View All Report Types)
1 - 25 of 213 Matches Previous Page  |  Next Page
SIMPLIFY CUSTOMER ONBOARDING WITH MALWAREBYTES ONEVIEW
sponsored by Malwarebytes
WHITE PAPER: As an MSP, you need to make sure your endpoint security vendor is efficient as to not hemorrhage MRR due to complex onboarding or time-consuming client management. Access this white paper to learn how Malwarebytes’ OneView console simplifies the onboarding process, eases management, and improves customer support.
Posted: 19 Nov 2021 | Published: 19 Nov 2021

Malwarebytes

Framework for a Comprehensive Ransomware Recovery Plan
sponsored by Mannai and Rubrik
WHITE PAPER: This white paper lays out a framework for a comprehensive ransomware recovery plan. Access it here to learn best practices in areas including preparation, staffing, stakeholder notification, containing the attack, data recovery, remediation, and more.
Posted: 11 Nov 2021 | Published: 11 Nov 2021

TOPICS:  Malware
Mannai and Rubrik

Protect, detect, and recover data from ransomware – quickly and fully
sponsored by Commvault
WHITE PAPER: Access this white paper to discover how you can protect, detect, and recover data successfully to mitigate the risk of ransomware for your business using Commvault.
Posted: 21 Oct 2021 | Published: 21 Oct 2021

TOPICS:  Malware
Commvault

Secure Your Data, Your Recovery, and Your Mission
sponsored by Commvault
WHITE PAPER: Data security is a strategic goal for Commvault and is addressed through theirmulti-layered protection, advanced detection, and rapid recovery from security threats, including ransomware and data breaches. Explore this discussion guide to evaluate key security best practices employed across their global customer base.
Posted: 20 Sep 2021 | Published: 20 Sep 2021

TOPICS:  Malware
Commvault

Ransomware Protection: Last Line of Defense, First Step in Data Recovery
sponsored by Commvault
WHITE PAPER: Access this white paper to examine ransomware as one of the many threats to recovery readiness facing today’s organizations; drill deeper into the nature, impact, and direction of this insidious form of attack; explore risk management elements, including planning, protection, monitoring, fast restores, and testing; and more.
Posted: 17 Sep 2021 | Published: 17 Sep 2021

TOPICS:  Malware
Commvault

Your Hybrid Infrastructure Is Under Attack
sponsored by Palo Alto Networks
WHITE PAPER: In a recent survey, 85% of IT pros selected hybrid cloud as their ideal operating model. However, these clouds come with their share of complexity. Namely, they require a high level of interconnectivity, which increases the risk of malware attacks, or worse. Don’t delay – Leverage this white paper to learn how to secure your hybrid environment.
Posted: 15 Mar 2021 | Published: 10 Nov 2020

Palo Alto Networks

Stay Ahead of New Ransomware Threats: Protect against data exfiltration and extortion
sponsored by Palo Alto Networks
WHITE PAPER: Recent data shows that threats are developing in two key areas: data exfiltration and extortion. Bad actors are using ransomware as a means to these ends. Organizations must be aptly prepared by knowing what these processes look like. View this white paper to get an in-depth look at an exfiltration-focused attack as well as the extortion phase.
Posted: 22 Jan 2021 | Published: 16 Dec 2020

Palo Alto Networks

Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.
sponsored by Barracuda
WHITE PAPER: Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

Barracuda

Data Security Predictions 2021
sponsored by Splunk
WHITE PAPER: The pandemic of 2020 created unprecedented challenges for IT security teams and initiatives. This 23-page report provides a closer look at how the Coronavirus has shaped cybersecurity and explores key data security predictions for 2021. Read on to get started.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Splunk

DDoS Response Guide
sponsored by Radware
WHITE PAPER: DDoS attacks can flood your network with malicious traffic, bringing applications down and preventing legitimate users from accessing your services. The good news, however, is that there is plenty to be done about it. In this white paper, explore 3 steps that will allow you to minimize the impact of a DDoS attack.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Radware

Are your remote workers sitting ducks?
sponsored by Mimecast
WHITE PAPER: COVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organisations suggests that many are just that. Download this white paper to learn more.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Mimecast

All together now
sponsored by ServiceNow
WHITE PAPER: 2020 has been a disastrous and disruptive year for organizations and their security programs. Upticks in cyberattacks – like malware – have led to significant and costly breaches. Read this white paper to learn more about the effects of 2020 and how IT and security teams can collaborate to drive operational resilience against today’s threats.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

ServiceNow

Invisible Characters
sponsored by Inky Technology
WHITE PAPER: Similar to hidden text and zero font, invisible characters is a phishing tactic designed to obscure text in order to bypass secure email gateways (SEGs). Read this edition of Understanding Phishing for a full breakdown of invisible text – including real-world examples and best practices for stopping it.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

Inky Technology

CEO Impersonation
sponsored by Inky Technology
WHITE PAPER: Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Inky Technology

Ransomware Decoded
sponsored by Cybereason
WHITE PAPER: Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cybereason

Danger within: email and security awareness training strategies for effective account takeover protection
sponsored by Mimecast
WHITE PAPER: It’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Mimecast

Insights into attacker activity in compromised email accounts
sponsored by Barracuda
WHITE PAPER: Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.
Posted: 12 Aug 2020 | Published: 31 Jul 2020

Barracuda

SIG - Cisco Umbrella
sponsored by Cisco Umbrella
WHITE PAPER: Cisco Umbrella is a Secure Internet Gateway (SIG) that provides the first line of defense against threats on the internet, wherever users go. With integrated cloud security, users are kept secure, and retention of all internet activity reduces incident response time. Learn about the benefits and key features of Umbrella in this white paper.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Cisco Umbrella

Prevent Ransomware Attacks from Disrupting Your Business with Thales Data Security
sponsored by Thales
WHITE PAPER: Cybersecurity Ventures predicts that a business will fall victim to a ransomware attack every 11 seconds, and the estimated cost to businesses globally will be around $20 billion by 2021. In this white paper, learn how to defend against ransomware by taking a look at the anatomy of ransomware attacks.
Posted: 16 Jul 2020 | Published: 30 Jun 2020

Thales

The Definitive Email Security Strategy Guide: A People-Centric Approach to Stopping Malware, Phishing, and Email Fraud
sponsored by Proofpoint
WHITE PAPER: With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).
Posted: 05 Jun 2020 | Published: 05 Jun 2020

Proofpoint

BLUEPRINT: MODERN LAYERED SECURITY
sponsored by SonicWall
WHITE PAPER: The concept of a layered security strategy is nothing new. However, as threats evolve, each layer needs to be revised to ensure it addresses modern security demands. This white paper provides an overview of a comprehensive 11-layer security approach, designed to strengthen your security posture without sacrificing business objectives.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

RANSOMWARE REALITIES FOR SMALL AND MEDIUM-SIZED BUSINESSES
sponsored by Crowdstrike
WHITE PAPER: Contrary to the belief that ransomware only targets large organizations, small and medium-sized businesses (SMBs) are on the receiving end of a breach nearly 43% of the time. But without the resources of a large business, what can SMBs do to protect themselves? Read on to find out.
Posted: 20 May 2020 | Published: 20 May 2020

Crowdstrike

THE EVOLUTION OF RANSOMWARE: HOW TO PROTECT ORGANIZATIONS FROM NEW TRENDS AND METHODS
sponsored by Crowdstrike
WHITE PAPER: Each year, ransomware attacks grow increasingly frequent and successful – leading to more dollars lost. In fact, by 2021 global damages from ransomware is expected to reach $20 billion. In this white paper, you’ll discover a comprehensive overview of the evolution of ransomware, common trends and how to protect against it.
Posted: 19 May 2020 | Published: 19 May 2020

Crowdstrike

Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

The Malicious Bot Playbook: Early Warning Signs, and What to Do About Them
sponsored by Cloudflare
WHITE PAPER: Similar to social engineering attacks, bot attacks are highly targeted to expose the vulnerabilities of a specific organization. Understanding the telltale bot warning signs has proven to be an effective measure at predicting and preventing attacks. This playbook outlines the common warning signs and tactics for addressing them.
Posted: 01 May 2020 | Published: 01 May 2020

Cloudflare
1 - 25 of 213 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences