IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed   
DEFINITION: Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message  … 

Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Hackers Reports
1 - 25 of 226 Matches Previous Page  |  Next Page
Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne
sponsored by HackerOne
WEBCAST: Today, companies, enterprises, & governments are embracing collaboration with hackers to find vulnerabilities before criminals have a chance to exploit them. In this webcast, Miju Han from HackerOne discusses the most common vulnerabilities not found on the OWASP top 10.
Posted: 17 Oct 2019 | Premiered: Oct 17, 2019

HackerOne

GandCrab Ransomware Analysis Report
sponsored by Versa Networks
WHITE PAPER: A recent ransomware which has become viral since January 2018 is named GandCrab. The developers have been continuously updating and releasing improved versions, with approximately 6 variants observed to date. This white paper will take a quick look into these variants and provide insightful into how they are impacting users.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

Versa Networks

Observations From the Front Lines of Threat Hunting
sponsored by Crowdstrike
WHITE PAPER: This mid-year report provides a summary of OverWatch’s threat hunting findings from the first half of 2019. Download now to review intrusion trends during that time frame, insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified.
Posted: 11 Oct 2019 | Published: 11 Oct 2019


Sharpen your Focus on Spear Phishing Attacks in 2019
sponsored by PortSys
RESOURCE: How can you ensure you don’t end up being skewered by a spear phishing attack? Stronger identity management with multiple factors of authentication? Biometrics? How about Context of Access? Find out the facts in this revealing overview from security pundit Michael Oldham, CEO of PortSys.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

PortSys

The Practical Security Guide to Prevent Cyber Extortion
sponsored by Panda Security
WHITE PAPER: What do you do if you are a victim of cyber extortion? Download The Practical Security Guide to Prevent Cyber Extortion for 5 recommendations on how to keep your company safe.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Panda Security

2019 Hacker Survey Report
sponsored by Thycotic
ANALYST REPORT: In this 2019 Black Hat hacker survey report, the questions mainly focused on cybersecurity issues associated with privileged account access and credential governance, particularly for service accounts. Dive in to learn more.
Posted: 08 Oct 2019 | Published: 08 Oct 2019

Thycotic

GreyEnergy: Dissecting the Malware from Maldoc to Backdoor
sponsored by Nozomi Networks
WHITE PAPER: GreyEnergy uses a common infection method, phishing emails with infected documents. However, the malware's code is anything but common – it is well written, smartly put together and designed to defeat detection by cybersecurity products. In this white paper, dive into an analysis of how the malware works.
Posted: 26 Sep 2019 | Published: 28 Feb 2019

Nozomi Networks

Threat Intelligence: Far-Fetched Idea or Must-Have Security Tactic? How Every Ciso Can Make It a Priority
sponsored by Mimecast
WHITE PAPER: If threat intelligence isn't part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. In this white paper, learn how CISOs can make threat intelligence a priority in their cyber resilience planning.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Mimecast

CenturyLink 2019 Threat Report
sponsored by CenturyLink
ANALYST REPORT: Organizations will continue to accelerate the deployment of new technologies and capabilities that drive network traffic and security complexity. In the CenturyLink 2019 Threat Report, explore the role of deep network-based threat intelligence and discover the latest risks and attacks including botnets, DNS attacks, and more.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

CenturyLink

Detecting and Preventing Cybercrime and Fraud
sponsored by Concur Technologies
WHITE PAPER: In this white paper, explore what CFOs from some of Australia's leading businesses have to say about their cybercrime and fraud experiences and the risks facing their businesses today. Also, explore advice for businesses looking to tackle fraud.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Concur Technologies

The New Age of Fraud
sponsored by Concur Technologies
WHITE PAPER: Today, there is a realization that fraud is an enterprise risk that falls in the same realm as supply chain, disaster and regulatory risks. But how can companies prevent, detect and mitigate this risk? In this white paper, examine how companies are putting a microscope on employee spend to better prevent and detect fraud across their business.
Posted: 18 Sep 2019 | Published: 31 Aug 2019

Concur Technologies

The Hacker Powered Security Report 2019
sponsored by HackerOne
ANALYST REPORT: Security vulnerabilities are a fact of life. For this reason, organizations are competing to attract hackers who have 1 key advantage over traditional methods: they can think like an attacker. In this 2019 research report, learn about the state of hacker-powered security.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

HackerOne

2019 Cyberthreat Defense Report
sponsored by Gigamon
ANALYST REPORT: CyberEdge Group's 6th annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Download this report to uncover countless insights you can use to better understand how your priorities and security postures stack up against those of your peers.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Gigamon

The Human Factor 2019 Report
sponsored by Proofpoint
ANALYST REPORT: Malware-free attacks like business email compromise (BEC) and credential phishing continue to rapidly gain momentum as threat actors consistently attack individuals and business processes rather than specific systems and software. In The Human Factor 2019 Report, examine 4 key components of the attacks businesses and individuals face every day.
Posted: 12 Sep 2019 | Published: 31 Aug 2019

Proofpoint

Threat Report: Defending Against Today's Critical Threats
sponsored by Cisco Umbrella
ANALYST REPORT: When it comes to the threat landscape, it's important to take a look in the rearview mirror once in a while. Not only do you get a good look at what's behind you, but you can often spot what's coming up quick. In Cisco's 2019 Threat Report, discover 5 key threats from the last year that are predicted to appear again in the near future.
Posted: 10 Sep 2019 | Published: 28 Feb 2019

Cisco Umbrella

2019 Cyberthreat Defense Report
sponsored by Gigamon
RESOURCE: Download this infographic to uncover some key findings from CyberEdge Group's 6th annual Cyberthreat Defense Report.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Gigamon

Privileged Access Management in the Modern Threatscape
sponsored by Centrify Corporation
WHITE PAPER: Privileged access remains the preferred vector for attackers, and most organizations aren't taking the very basic steps to secure it. Dive into this 2019 Centrify Privileged Access Management Survey to learn about their findings for securing the modern threatscape with zero trust privilege.
Posted: 04 Sep 2019 | Published: 19 Feb 2019

Centrify Corporation

Cisco Cybersecurity Series 2019: Threat Report
sponsored by Cisco Umbrella
WHITE PAPER: In this 2019 Threat Report, Cisco researchers looked at notable 2018 cybersecurity incidents with a fresh perspective: What do they reveal about future adversary tactics? Read on for an in-depth analysis, best practices, and trends to watch.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Cisco Umbrella

Top 3 Telecom Provider Secures Mobile Accounts
sponsored by Shape Security
CASE STUDY: A Top 3 US Telecom Provider needed to secure its mobile accounts from credential stuffing attackers targeting them to commit various fraud schemes. In this case study, learn how the company was able to stop upgrade theft, 2FA bypass, and virtual calling with Shape Enterprise Defense.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Shape Security

Cyber Deception Systems
sponsored by Acalvio
ANALYST REPORT: This Market Segment Report covers Cyber Deception Systems (CDS) and the market position of 18 vendors delivering products and services for CDS. Read on to learn about CDS capabilities (e.g. lures, breadcrumbs, honeypots, decoys, and traps) as well as the different vendors in the market.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

Acalvio

2019 Mobile Threat Landscape Report
sponsored by CrowdStrike
ANALYST REPORT: Malicious actors have increasingly sought to diversify the way they attempt to compromise their targets and achieve their objectives. In this research report, discover key types of mobile malware observed so far in 2019, along with their typical deployment mechanism. Also, explore how and why certain criminal actors are targeting mobile devices.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

CrowdStrike

The Most Common Types of Invoice Fraud and How to Prevent Them
sponsored by AppZen
WHITE PAPER: How can your business prevent falling prey to invoice fraud schemes? Knowing exactly what to look out for is an important first step. Download this e-book to learn about the most common types of invoice fraud and how to prevent them.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

AppZen

How Midsize Enterprises are Tackling Cyberthreat Challenges
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: The small to midsize enterprise (SME) segment may not make the top headlines when it comes to cyberattacks, but that doesn't mean these organizations have it any easier than their large enterprise counterparts. Read on for actionable insights into how peer organizations in this segment are tackling cyberthreat challenges.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

Arctic Wolf Networks, Inc.

Keeping Fraud Detection Software Aligned With the Latest Threats
sponsored by SAS
WHITE PAPER: Fraud and financial crimes weren't considered serious issues until the 1980s. Since then, they have become commonplace. As fraud changes and evolves, organizations must keep anti-fraud software current to detect new and emerging threats. In this white paper, learn how SAS Visual Investigator can help organizations do this.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

SAS

Cryptojacking, The Sequel: Life After Coinhive
sponsored by Webroot
PODCAST: The popular cryptomining tool Coinhive has closed its doors. So the cryptojacking threat should decline, right? 'Not so fast' Webroot threat analysts Tyler Moffitt tells host Joe Panettieri. Tune into this podcast to find out who's filling in where Coinhive left off.
Posted: 05 Aug 2019 | Premiered: Aug 5, 2019

Webroot
1 - 25 of 226 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement