Software  >  

Joke Programs

RSS Feed   
Joke Programs Reports
 
Zoom & Doom: How INKY Unraveled a Credential Harvesting Phishing Scam
sponsored by Inky Technology
RESOURCE: Zoom jumped from 10 million daily meeting participants in December 2019 to 300 million this past April. This boom in Zoom use spawned a flurry of fake meeting invitations from cybercriminals attempting to harvest credentials from users. Luckily, INKY was on the case. Read this article to view these fake Zoom meeting invites and more.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Inky Technology

Case Study: Protecting Trusted Insiders
sponsored by Dtex
CASE STUDY: Recently, a slew of invoice-themed malicious phishing emails were found to have penetrated a customer’s network at a large energy company. What was worse? They had very limited visibility into the attack. Read this case study to learn how this organization was able to identify, understand and mitigate future targeted phishing attacks.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Dtex

Credential Harvesting: Virtually Hijacking Your Employee’s Credentials
sponsored by Inky Technology
RESOURCE: Credential harvesting is an approach often used by hackers to virtually hijack your employee’s accounts simply by using their password(s). In this INKY blog post, take a closer look at how credential harvesting works and what practices your organization can implement to minimize the risk.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Inky Technology

Global Threat Report
sponsored by VMware International Unlimited Company
ANALYST REPORT: 94% of organizations worldwide have suffered a data breach as a result of a cyberattack in the past 12 months, and the average organization has experienced 2.17 breaches. If this statistic surprises you, then you may want to read the full global threat report by VMware and Carbon Black to get a sense of where threat actors are developing most.
Posted: 27 Oct 2020 | Published: 30 Jun 2020

VMware International Unlimited Company

Ransomware Decoded
sponsored by Cybereason
WHITE PAPER: Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cybereason

Spear Phishing: Top 3 Impersonation Attacks
sponsored by Barracuda
WHITE PAPER: Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

Barracuda

Farsight DNSDB Overview
sponsored by Farsight Security
VIDEO: The internet is powered by the domain name system, also known as DNS. In this short video, learn about DNS and how Farsight Security’s DNSDB can help security professionals gain global DNS visibility.
Posted: 24 Nov 2020 | Premiered: 13 Mar 2018

Farsight Security

AT&T Content Delivery Network (ACDN) Cloud Security Solutions -- Prolexic Services
sponsored by AT&T Cybersecurity
DATA SHEET: In this brief, learn how Prolexic services from AT&T Content Delivery Network can help provide comprehensive protection against a broad range of DDoS attack types and help to defend against today’s high-bandwidth, sustained attacks.
Posted: 04 Nov 2020 | Published: 04 Nov 2020

AT&T Cybersecurity

Driving Real Behavior Change
sponsored by Proofpoint
EBOOK: Because today’s cyberattacks often target an organization’s users, a people-centric approach gives your security team the best chance at identifying and preventing potential threats. Read this e-book to discover how to build an effective security awareness training program.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

Proofpoint

All Together Now: IT & Security Collaboration
sponsored by ServiceNow
WHITE PAPER: 2020 has been a disastrous and disruptive year for organizations and their security programs. Upticks in cyberattacks – like malware – have led to significant and costly breaches. Read this white paper to learn more about the effects of 2020 and how IT and security teams can collaborate to drive operational resilience against today’s threats.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

ServiceNow
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info