Software  >  

Blended Threats

RSS Feed   
Blended Threats Reports
 
Six Ransomware Gangs Claim 290+ New Victims in 2021, Potentially Reaping $45M for the Hackers
sponsored by eSentire
RESOURCE: Rampant crime almost always leads to organized crime, and cybercrime is no exception to this rule. Read this threat report to examine the nefarious work of 6 ransomware gangs who recently claimed 290+ new victims in 2021, reaping an estimated $45 million.
Posted: 29 Jul 2021 | Published: 29 Jul 2021

TOPICS:  Malware
eSentire

The future of storage
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

ComputerWeekly.com

Protect, detect, and recover data from ransomware – quickly and fully
sponsored by Commvault
WHITE PAPER: Access this white paper to discover how you can protect, detect, and recover data successfully to mitigate the risk of ransomware for your business using Commvault.
Posted: 21 Oct 2021 | Published: 21 Oct 2021

TOPICS:  Malware
Commvault

2021 SONICWALL CYBER THREAT REPORT
sponsored by SonicWall
ANALYST REPORT: Last year, we saw an unprecedented increase in cyberattacks as well as threat vectors for attacks. To help security teams keep up, SonicWall has constructed their 2021 Cyber Threat Report, covering every attack from malware to intrusion to cryptojacking. Download the full report to learn everything about the cyber threat landscape.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

SonicWall

Royal Holloway: Man proposes, fraud disposes
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
Posted: 07 Jul 2020 | Published: 14 Jul 2020

ComputerWeekly.com

Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.
sponsored by Barracuda
WHITE PAPER: Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

Barracuda

Integrated Cybersecurity Delivers Efficiency and Effectiveness in a Challenging Environment
sponsored by Kaspersky
ANALYST REPORT: According to IDC research, the majority (75%) of organizations worldwide recognize that security team's time is wasted due to a lack of integration in their security environments. These teams would be wise to consider a multi-level, integrated approach with endpoint protection in mind. See this IDC white paper to examine such an approach.
Posted: 17 Feb 2021 | Published: 31 Jul 2020

Kaspersky

The Australian Museum Takes on Cybersecurity
sponsored by BlackBerry
CASE STUDY: In this case study, follow the Australian Museum, keepers of a vast collection of sensitive historic and cultural information, as they partner with CylancePROTECT to implement a multi-layer approach to security that enables them to prevent malware attacks and secure their invaluable research data.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

BlackBerry

Beyond the Perimeter
sponsored by Mimecast
ANALYST REPORT: Organizations are having a hard time protecting against modern email threats, especially since the move to cloud-delivered email systems. In this ESG Showcase, learn about Mimecast’s Email Security 3.0 Strategy that protects at the perimeter, inside the network and the organization, and beyond the perimeter.
Posted: 21 Oct 2020 | Published: 29 Feb 2020

Mimecast

Navigating Ransomware Recovery
sponsored by Cisco Umbrella
EGUIDE: The decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.
Posted: 20 Apr 2020 | Published: 11 Feb 2020

Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences