Software  >  

Blended Threats

RSS Feed   
Blended Threats Reports
 
Threat Report: Maze Ransomware
sponsored by Cysiv
WHITE PAPER: Since 2019, the Maze threat actor group has been conducting ransomware campaigns where they both block access to data on victims’ machines and threaten to publish sensitive data for ransom – known as Maze ransomware. In this report, discover a comprehensive analysis of Maze ransomware, how it works and how to prevent it.
Posted: 20 Aug 2020 | Published: 07 Jul 2020

Cysiv

Pwning Admin Rights To Spread Ransomware: Stories From The Battlefield
sponsored by Remediant
WEBCAST: Stopping a ransomware attack is a challenge for many organizations, particularly during this era of remote work. Professionals are asking, "What does a ransomware attack look like? Why is it so easy for hackers use credentials to move laterally within a network?" View this webcast to learn how to assess your environment for admin credential risk.
Posted: 28 Aug 2020 | Premiered: Apr 9, 2020

Remediant

2021 Threat Report
sponsored by BlackBerry
RESEARCH CONTENT: The BlackBerry 2021 Threat Report examines and analyzes the biggest cybersecurity events of the current and past year. This edition covers COVID-19 exploitation, election vulnerabilities, top malware attacks, and many other contemporary issues. Download it now.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Malware
BlackBerry

Stay Ahead of New Ransomware Threats: Protect against data exfiltration and extortion
sponsored by Palo Alto Networks
WHITE PAPER: Recent data shows that threats are developing in two key areas: data exfiltration and extortion. Bad actors are using ransomware as a means to these ends. Organizations must be aptly prepared by knowing what these processes look like. View this white paper to get an in-depth look at an exfiltration-focused attack as well as the extortion phase.
Posted: 22 Jan 2021 | Published: 16 Dec 2020

Palo Alto Networks

Computer Weekly - 9 February 2021: Audi fine-tunes its digital performance to boost online car sales
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Feb 2021

ComputerWeekly.com

Get The Green Light For Ransomware Protection
sponsored by arcserve
RESOURCE: For security pros hoping to convince business decision-makers to invest in ransomware protection, it’s critical to ‘speak their language’ by highlighting the most impactful data (revenue, consumer behavior, actual costs, etc.). Read this infographic for 7 tips to help convey the seriousness of ransomware.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

arcserve

The Rise of Credential Stuffing Attacks: How to Keep Employee Accounts Secure
sponsored by TechTarget
RESOURCE: As long as employees are responsible for like passwords and accounts, there will be threats targeting those credentials. This e-guide offers expert insight into protecting your employees against credential stuffing attacks, highlighting key challenges, hacker methods, best practices, and more.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

2020 Threat Hunting Survey Results
sponsored by DomainTools
RESEARCH CONTENT: Each year, SANS conducts a Threat Hunting Survey to better understand the threat hunting landscape and how security professionals are conducting threat hunting in their organizations – read on to unlock the results from this year’s survey.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

DomainTools

Splunk Security: Detecting Unknown Malware And Ransomware
sponsored by Splunk
WHITE PAPER: The traditional way of detecting an advanced malware or threat compromise in a Windows environment relies on using a signature-based anti-virus or malware product – but these won’t catch everything. Download this white paper to learn – step by step – how to detect unknown malware activity and early signs of compromise in a Windows environment.
Posted: 19 Apr 2021 | Published: 05 Jan 2021

TOPICS:  Malware
Splunk

Understanding & Preventing Ransomware Attacks
sponsored by Keeper Security Inc
WHITE PAPER: Ransomware attacks are particularly devastating in that they can be done with little technical expertise – they can even be purchased as a cloud service! A new attack happens about every 14 seconds, and their global damages are expected to reach $20B by 2021. So how can you prevent them? Read this white paper to find out.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

Keeper Security Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences