Software  >  

Malicious Code

RSS Feed   
Malicious Code Reports
 
Privileged Access Management to Prevent a Ransomware Attack
sponsored by Hitachi ID
RESOURCE: The victims of 2020’s 11 most devastating ransomware attacks have paid a massive sum of $144.2 million in their recovery efforts. In this article, discover how privileged access management (PAM) can be implemented to proactively reduce the threat of ransomware.
Posted: 17 Sep 2020 | Published: 10 Sep 2020

Hitachi ID

2020 CROWDSTRIKE GLOBAL SECURITY ATTITUDE SURVEY
sponsored by CrowdStrike
ANALYST REPORT: Supporting a remote workforce has made life even harder for IT security teams in organizations around the world. Cybercriminals have been capitalizing on the chaos, and this has been changing not only mindsets but processes in security. Access CrowdStrike’s 2020 Global Security Attitude Survey to see what’s necessitating security transformation.
Posted: 03 Feb 2021 | Published: 30 Sep 2020

CrowdStrike

Understanding Phishing: Invisible Characters
sponsored by Inky Technology
WHITE PAPER: Similar to hidden text and zero font, invisible characters is a phishing tactic designed to obscure text in order to bypass secure email gateways (SEGs). Read this edition of Understanding Phishing for a full breakdown of invisible text – including real-world examples and best practices for stopping it.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

Inky Technology

Ransomware Prevention Special Report: How to Address a Pervasive and Unrelenting Threat
sponsored by Gigamon
WHITE PAPER: Ransomware is a fast-growing threat affecting organizations of all sizes and industries. But a combination of security hygiene, prevention techniques and detection and response capabilities can combat ransomware successfully. Download this SANS white paper to identify what ransomware is, the threats it might pose and how to defend against it.
Posted: 18 Mar 2021 | Published: 30 Nov 2020

Gigamon

Is Your Company’s Online Security Strategy Enough?
sponsored by Inky Technology
RESOURCE: Cyberattacks are costly - $10.2 billion in the U.S. alone to be exact. It’s proven that businesses are underprepared for cyberattacks, and what’s more is that every person at an organization who has an email account is vulnerable to threats. Read this article on how you can improve email security and get access to a free demo download.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Inky Technology

Protecting APIs and Securing Applications So Business Can Thrive
sponsored by Radware
RESEARCH CONTENT: Nearly every organization relies on applications to connect with customers, business partners, suppliers and staff. As a result, the application and API threat landscape has evolved dramatically. Read this research report for a closer look at the state of application and API security, including top threats, best practices and more.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

Security in the Fast Lane
sponsored by WhiteHat Security
WEBCAST: Today’s organizations rely on a collection of applications in order to maintain internal operations and interact with end-users. However, dangerous threats targeting data in these critical apps have emerged. Watch this webinar to learn more about the application security threat landscape, notable breaches and how to protect your apps.
Posted: 04 Dec 2020 | Premiered: Dec 4, 2020

WhiteHat Security

The New Normal: Working from Home and Phishing Threats
sponsored by Inky Technology
RESOURCE: It’s estimated that during the COVID-19 pandemic, close to 50% of the US workforce is remote – this massive and sudden transition towards remote work is known as the “new normal”. With this change in workplace comes a change in cyberthreats – with phishing being the most prominent. Read this blog post to learn more.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

Inky Technology

The 2021 Crypto Crime Report
sponsored by Chainanalysis
ANALYST REPORT: Cryptocurrency remains appealing for criminals, primarily due to its pseudonymous nature and the ease with which it allows users to send funds anywhere in the world. If you’re involved in blockchain, it’s important to know which threats do the most damage. Access The 2021 Crypto Crime Report, covering the threats most used by crypto criminals.
Posted: 11 Mar 2021 | Published: 16 Feb 2021

Chainanalysis

Dually Deceptive: Two New Phishing Scams Swimming by Your SEG
sponsored by Inky Technology
RESOURCE: Phishing scams have been more than pervasive in 2020, with the APWG counting 139,685 unique phishing threats in Q1 alone. As these attacks are quickly becoming more sophisticated, targeted and illusive, it’s a good idea to understand their complexity as they evolve. Jump into this short article to learn about two of these new scams.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Inky Technology
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences