Software >
|
Joke Programs
|
|
Joke Programs Reports
|
|
Zoom & Doom: How INKY Unraveled a Credential Harvesting Phishing Scam
sponsored by Inky Technology
RESOURCE:
Zoom jumped from 10 million daily meeting participants in December 2019 to 300 million this past April. This boom in Zoom use spawned a flurry of fake meeting invitations from cybercriminals attempting to harvest credentials from users. Luckily, INKY was on the case. Read this article to view these fake Zoom meeting invites and more.
Posted: 02 Oct 2020 | Published: 02 Oct 2020
|
|
|
Case Study: Protecting Trusted Insiders
sponsored by Dtex
CASE STUDY:
Recently, a slew of invoice-themed malicious phishing emails were found to have penetrated a customer’s network at a large energy company. What was worse? They had very limited visibility into the attack. Read this case study to learn how this organization was able to identify, understand and mitigate future targeted phishing attacks.
Posted: 23 Nov 2020 | Published: 23 Nov 2020
|
|
|
Credential Harvesting: Virtually Hijacking Your Employee’s Credentials
sponsored by Inky Technology
RESOURCE:
Credential harvesting is an approach often used by hackers to virtually hijack your employee’s accounts simply by using their password(s). In this INKY blog post, take a closer look at how credential harvesting works and what practices your organization can implement to minimize the risk.
Posted: 08 Oct 2020 | Published: 08 Oct 2020
|
|
|
Global Threat Report
sponsored by VMware International Unlimited Company
ANALYST REPORT:
94% of organizations worldwide have suffered a data breach as a result of a cyberattack in the past 12 months, and the average organization has experienced 2.17 breaches. If this statistic surprises you, then you may want to read the full global threat report by VMware and Carbon Black to get a sense of where threat actors are developing most.
Posted: 27 Oct 2020 | Published: 30 Jun 2020
|
|
|
Ransomware Decoded
sponsored by Cybereason
WHITE PAPER:
Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.
Posted: 11 Sep 2020 | Published: 11 Sep 2020
|
|
|
Spear Phishing: Top 3 Impersonation Attacks
sponsored by Barracuda
WHITE PAPER:
Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
Posted: 23 Dec 2020 | Published: 23 Dec 2020
|
|
|
Farsight DNSDB Overview
sponsored by Farsight Security
VIDEO:
The internet is powered by the domain name system, also known as DNS. In this short video, learn about DNS and how Farsight Security’s DNSDB can help security professionals gain global DNS visibility.
Posted: 24 Nov 2020 | Premiered: 13 Mar 2018
|
|
|
AT&T Content Delivery Network (ACDN) Cloud Security Solutions -- Prolexic Services
sponsored by AT&T Cybersecurity
DATA SHEET:
In this brief, learn how Prolexic services from AT&T Content Delivery Network can help provide comprehensive protection against a broad range of DDoS attack types and help to defend against today’s high-bandwidth, sustained attacks.
Posted: 04 Nov 2020 | Published: 04 Nov 2020
|
|
|
Driving Real Behavior Change
sponsored by Proofpoint
EBOOK:
Because today’s cyberattacks often target an organization’s users, a people-centric approach gives your security team the best chance at identifying and preventing potential threats. Read this e-book to discover how to build an effective security awareness training program.
Posted: 14 Dec 2020 | Published: 14 Dec 2020
|
|
|
All Together Now: IT & Security Collaboration
sponsored by ServiceNow
WHITE PAPER:
2020 has been a disastrous and disruptive year for organizations and their security programs. Upticks in cyberattacks – like malware – have led to significant and costly breaches. Read this white paper to learn more about the effects of 2020 and how IT and security teams can collaborate to drive operational resilience against today’s threats.
Posted: 07 Oct 2020 | Published: 07 Oct 2020
|
|
|
|
|