IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed   
DEFINITION: Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message  … 

Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Hackers Reports
1 - 25 of 261 Matches Previous Page  |  Next Page
2019 Crowdstrike Global Security Attitude Survey
sponsored by CrowdStrike
WHITE PAPER: In today’s threat landscape, cyberattacks are unavoidable. The best way to address threats is to establish an incident response plan. This report takes a closer look at the 1:10:60 rule for measuring the effectiveness of your response plan and explores the results of a recent study into the current state of cybersecurity capabilities.
Posted: 21 Feb 2020 | Published: 15 Nov 2019

CrowdStrike

Observations from The Front Lines of Threat Hunting
sponsored by CrowdStrike
WHITE PAPER: Falcon OverWatch is a CrowdStrike managed threat hunting service, comprised of a team of specialists who analyze networks to identify, isolate and hunt cyberattackers. Download this report to view the key trends and recommendations from OverWatch’s threat hunting findings.
Posted: 21 Feb 2020 | Published: 21 Feb 2020

CrowdStrike

Best Practices for Enterprise Phishing Protection
sponsored by PhishLabs
WHITE PAPER: According to the SANS Institute, 95% of data breaches start with phishing attacks. As these attacks become increasingly frequent and difficult to detect, organization’s need to rethink how they reduce the risk of these attacks. Download this white paper to uncover 15 best practices to boost your phishing detection and security.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

PhishLabs

Product Overview
sponsored by Armorblox
PRODUCT OVERVIEW: In this product overview, take a closer look at the capabilities and features of Armorblox: A cloud-native email security platform that addresses the inbound and outbound security threats plaguing today’s email platforms. Read on to learn more.
Posted: 20 Feb 2020 | Published: 05 Feb 2020

Armorblox

Webinar: BEC Attacks Are the Costliest Form of Phishing
sponsored by PhishLabs
WEBCAST: Business Email Compromise (BEC) attacks are quickly becoming the costliest and least detectible form of phishing attacks. They occur when a scammer impersonates a trusted individual to exploit relationships via email. So, what can your organization do to prevent these attacks? Watch this webinar to find out.
Posted: 19 Feb 2020 | Premiered: Feb 19, 2020

PhishLabs

Open and Dark Web Research: Tips and Techniques
sponsored by Authentic8, Inc.
WHITE PAPER: In this white paper, get an insider look into the Silo Researcher Toolbox, which provides investigators with the necessary capabilities to conduct secure research on the open and dark web without risking the exposure of your resources or your identity. Read on to learn more.
Posted: 18 Feb 2020 | Published: 29 Oct 2019

Authentic8, Inc.

Webinar: Inside the World of Social Media Phishing: Financial Scams
sponsored by PhishLabs
WEBCAST: Security teams looking to protect their organization and its users against phishing attacks should be aware of the increase in scammers targeting social media accounts. In this webinar, discover how social media is being used to conduct financial scams and explore several real-world examples of campaign tactics.
Posted: 18 Feb 2020 | Premiered: Feb 18, 2020

PhishLabs

The Email Incident Response Playbook
sponsored by PhishLabs
WHITE PAPER: Just as technology advances, so too do the tactics used in cyberattacks. Phishing tactics have grown in their complexity, and traditional detection methods are incapable of adequate security. Download this playbook to discover how to build an incident response program that can detect, isolate and respond to phishing attack.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

PhishLabs

How to Handle Phishing Threats That Bypass Email Security Technology
sponsored by PhishLabs
WHITE PAPER: The scope of phishing attacks has evolved beyond email over recent years to malicious attempts within any digital medium. In this white paper, take a closer look at modern phishing tactics, where they’re likely to strike and best practices for mitigating these threats.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

PhishLabs

Malwarebytes Cut Potential Downtime to a Matter of Hours Rather than Weeks
sponsored by Malwarebytes
CASE STUDY: In this case study, discover how Neoperl, a global IT company operating in Europe, partnered with Malwarebytes to address challenges related to system downtime, that resulted in cost savings, complete remediation of threats, and minimized downtime and disruptions.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Malwarebytes

Hackers are Always a Step Ahead
sponsored by Asigra
DATA SHEET: Download the following paper to learn how Asigra can work with your MSP to thwart cyber-attacks and to view 5 ways they can “convince” hackers not to target your organization.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Asigra

Cryptomining - How Cryptocurrency is Changing Cyber Security
sponsored by Cisco Umbrella
WEBCAST: The introduction of cryptocurrencies has changed the cyber threat landscape. New varieties of ransomware in the form of cryptojacking, mining, and exchange phishing are plaguing today’s businesses. In this episode of ‘A Cybersecurity Technical Mini Series’, learn how you can stay protected.
Posted: 13 Feb 2020 | Premiered: Dec 16, 2019

Cisco Umbrella

Ransomware - NEW for 2020: Ransomware Defense for Dummies - 2nd Edition
sponsored by Cisco Umbrella
WHITE PAPER: Many organizations that are targeted by ransomware attacks assume that paying the ransom is the fastest and most cost-effective way to get their data back, but this isn’t always the case. Download your copy of ‘Ransomware Defense for Dummies’ to learn how ransomware attacks work and how to defend against them.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cisco Umbrella

Fayolle Preempts Cyberattacks and Persistent Threats
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the story of Fayolle, a French engineering and construction company, as they partner with Malwarebytes to address the rise in cyberattacks as a result of a cloud environment transition. Download the study now to uncover Fayolle’s results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

Chart Industries Vaporizes Ransomware and Malware
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the journey of Chart Industries, a global manufacturer and distributer, as they partner with Malwarebytes to address the growing risk of malware and phishing attacks targeted at mobile workers and endpoints. Download the report to see the results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

The Impact of Unsecured Digital Identities
sponsored by Keyfactor
WHITE PAPER: In this report, uncover key research findings from a recent study conducted by the Ponemon Institute into the impact of unsecured digital identities. Download the full study to unlock the key insights from the research.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Keyfactor

Who is GOSSIPGIRL?
sponsored by Chronicle
WHITE PAPER: Flame (aka Flamer or sKyWIper) was the object of extensive research and fascination by the security community circa 2011. Flame proved to be one of the most daring threat actors ever discovered. This whitepaper investigates the connection between Flame and the O.G. threat actor super group, GOSSIPGIRL. Read on to learn more.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Chronicle

Core - DNS - Abracadabra of Malware: Obfuscation
sponsored by Cisco Umbrella
WEBCAST: In this episode of ‘A Cybersecurity Technical Mini Series’, take an in-depth look at obfuscation malware techniques; how they work, types of attacks, and how to mitigate these threats. Watch now to learn more.
Posted: 12 Feb 2020 | Premiered: Nov 30, 2019

Cisco Umbrella

How to Create a Successful Cybersecurity Plan
sponsored by Malwarebytes
WHITE PAPER: According to a Ponemon Institute study, the average cost of a breach is $3.86 million. Aside from monetary costs, organizations also face potential legal and reputational ramifications. Download this paper to better understand the key areas for consideration to help get you started building a cybersecurity plan.
Posted: 12 Feb 2020 | Published: 31 Jul 2019

Malwarebytes

Ransomware Can’t Stop the Presses at La Sentinelle
sponsored by Malwarebytes
CASE STUDY: In this case study, La Sentinelle, a media group in Mauritius, sought to eliminate downtime associated with ransomware in the wake of a disruptive malware attack. Download this white paper to learn how they developed a program that would enable them to identify, mitigate, and prevent malware attacks.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Malwarebytes

Abusing Code Signing for Profit
sponsored by Chronicle
WHITE PAPER: Code signing was originally developed as way of guaranteeing the authenticity of a published file. However, given that this process is based on trust, it can be easily manipulated by skilled hackers. Download this white paper to unlock the results of a recent study into this issue and discover where the key concerns lie.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Chronicle

Rise in Ransomware Attacks Prompts New Prevention Priorities
sponsored by Cisco Umbrella
EGUIDE: Officials predict that already widespread ransomware attacks will only grow in scale and influence, while urging organizations to act now to guard against them. In this e-guide, learn what officials are saying about the upcoming storm of ransomware attacks and what your company can do in terms of prevention.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Cisco Umbrella

Core - DNS - Threat Spotlight: Emotet
sponsored by Cisco Umbrella
WEBCAST: In this edition of ‘A Cybersecurity Technical Mini Series’, take a closer look at the history and evolution of Emotet malware. This webinar highlights Emotet’s infection chain and modules, how this malware can affect your organizations & best practices for avoiding an infection.
Posted: 11 Feb 2020 | Premiered: Oct 31, 2019

Cisco Umbrella

5 Reasons Why Virus Protection Software Isn't Enough
sponsored by Inky Technology
RESOURCE: Cyberattacks are troubling more and more business each year, and while most organizations opt for some sort of virus protection software, these platforms are unable to provide the security necessary to detect and thwart attacks. In this article, uncover the 5 reasons why virus protection software isn’t enough.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Inky Technology

Chronicle Cybersecurity Predictions Crimeware, Cloud and Beyond
sponsored by Chronicle
WHITE PAPER: Cyberattacks are inevitable, affecting business of any size across all industries. While tactics used by cybercriminals always changes, it remains certain that security teams will always be on the lookout for threats to their networks. In this white paper, explore cybersecurity predictions for 2020 to ensure your organization is prepared.
Posted: 10 Feb 2020 | Published: 31 Dec 2019

Chronicle
1 - 25 of 261 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info