Software  >  

Malicious Code

RSS Feed   
Malicious Code Reports
 
BlackBerry Cylance Cybersecurity Maturity Evaluation Guide
sponsored by Blackberry Cylance
EGUIDE: In this guide, discover a methodology and roadmap for organizations of all sizes to use in assessing and advancing the maturity of their cyber risk management programs.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Blackberry Cylance

Insurer Prevents Losses from Fake Quotes
sponsored by Shape Security
CASE STUDY: A top 10 insurance company noticed higher than anticipated traffic on its quote generation application and was concerned that the unexpected volume was caused by a surge of automated traffic creating fake insurance quotes. In this case study, learn why the insurance company choose to implement Shape's Enterprise Defense to stop these attacks.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Shape Security

Dutch DIY Giant Shelves Email Attacks
sponsored by Barracuda
CASE STUDY: As email impersonation attacks and CEO fraud pick up momentum worldwide, Intergamma IT Manager Ruud Bronswijk knew there was an urgent need to improve the DIY company’s defenses. To discover how Intergamma ultimately bolstered their Office 365 security to thwart a variety of email-based attacks, download the case study here.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Barracuda

Web Browser-Based Attacks
sponsored by Morphisec, Inc.
RESOURCE: Browsers are integral to an effective working environment but they also serve as the perfect cyberattack vector. Web-based attacks are one of the top methods of system compromise and they are on the rise. In this brief, explore common types of web threats.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

Morphisec, Inc.

Efficient Threat Remediation with Check Point and ServiceNow
sponsored by ServiceNow
RESOURCE: Discover how security administrators can create, orchestrate, and efficiently process block list requests for malicious sites using ServiceNow Security Operations and Check Point Next Generation Threat Prevention Gateways.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

Top 10 North American Bank Eliminates Credential Stuffing
sponsored by Shape Security
CASE STUDY: A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. In this case study, learn how Shape's Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Shape Security

Automation’s Rising Tide: How to Manage Bots in Today’s World
sponsored by F5 Networks
EBOOK: As bot technology, machine learning, and AI continue to evolve, it is more critical than ever for your organization to be prepared to deal with the impact of bots – both good and malicious. This e-book will guide you as you develop a comprehensive, flexible strategy to address the impact of bots. Read on to get started.
Posted: 03 Dec 2019 | Published: 03 Dec 2019

F5 Networks

2019 IT Guide: Securing Email
sponsored by Inky Technology
WHITE PAPER: Email, given its external, internal, and collaborative application is uniquely susceptible to cyberattacks in the form of phishing. One way to protect your organization from a phishing attack is to implement a 2-pronged email security approach. In this white paper, learn how to implement this technique and see how INKY's Phish Fence can help.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology

Optimizing the Security Stack
sponsored by Morphisec, Inc.
DATA SHEET: In this white paper, examine the optimal way to protect endpoints from both known and unknown attacks and review the Windows Defender Antivirus offering.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Morphisec, Inc.

Understanding Phishing Attacks: Confusable Domains
sponsored by Inky Technology
WHITE PAPER: Phishing scammers are nothing if not clever. There has been a constant stream of devious innovation from attackers. One technique that attackers commonly use is confusable domains. In this white paper, learn how confusable domains work and how INKY Phish Fence can prevent confusable domain attacks at your organization.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement