Software  >  

Malicious Computer Code

RSS Feed   
Malicious Computer Code Reports
 
The State of Ransomware 2020
sponsored by Sophos
WHITE PAPER: Ransomware regularly dominates headlines as one of the most notorious threats facing organizations – but do the successful attacks tell the full story? In this research report, discover what happens when ransomware hits, the impacts of paying the ransom, the emergence of cybersecurity insurance, and more.
Posted: 11 Sep 2020 | Published: 31 May 2020

Sophos

Cyberattack Trends: 2020 Mid-Year Report
sponsored by Checkpoint Software Technologies
ANALYST REPORT: If your organization has come under attack since the outbreak of COVID-19, you are not alone. Cyberthreats are becoming more prominent than ever as a result of the spike in remote work, and if you’re not aware of which threats are lurking, another attack may be on the horizon. Read this report to get an understanding of what to look out for.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

Checkpoint Software Technologies

2020 Data Breach Investigations Report
sponsored by Verizon
WHITE PAPER: Each year, Verizon conducts a Data Breach Investigations Report (DBIR) to observe and analyze data breaches and provide industry professionals with key takeaways, industry highlights, relevant best practices, and more. Read on to unlock the complete 119-page report overviewing this year’s findings.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Verizon

Covid-19 & the New Normal for E-commerce
sponsored by Tala Security
WHITE PAPER: While online shopping has increased dramatically since the beginning of the pandemic, so too have threats targeting shoppers and other users. In fact, Magecart attacks have increased by 20%. Read on to explore how COVID-19 is shifting the e-commerce landscape and discover the long-term implications of these changes.
Posted: 20 Aug 2020 | Published: 20 Aug 2020

Tala Security

BitterAPT Revisited: The Untold Evolution of an Android Espionage Tool
sponsored by Bitdefender
WHITE PAPER: A malware threat group targeting Pakistani nationals, known as Bitter, became infamous in 2016. In 2019, their campaigns had expanded to other countries in South Asia, East Asia and the Middle East. So, how have their espionage and malware tactics changed over the years? Download this in-depth report to find out.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Bitdefender

Securing the Data Center in Just Four Steps
sponsored by VMware
WHITE PAPER: Security perimeters of yesterday are falling out of fashion due to their permeability, but securing east-west traffic can be expensive in a world of increasingly dynamic workloads. Enter a distributed, scale-out internal firewall, designed to monitor and protect east-west traffic to keep your data center secure. Read this white paper to learn more.
Posted: 28 Aug 2020 | Published: 30 Jun 2020

VMware

Twitter Phone Spear Phishing Attack
sponsored by Lookout
WHITE PAPER: On July 15th, 2020, Twitter experienced a security incident where a malicious actor gained access to the back-end account management console through a phone spear phishing campaign. 130 accounts, including those of Barack Obama, Bill Gates and Elon Musk, were affected. Read this white paper to learn specifics and recommendations.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

Lookout

Boys & Girls Clubs of Puerto Rico Protects Microsoft 365 Users from Targeted Attacks While Improving Performance
sponsored by Vade Secure
CASE STUDY: The Boys & Girls Clubs of Puerto Rico needed a way to secure their Microsoft 365 platforms while receiving quicker responses from their helpdesk. Confronted with a rise in phishing, spear phishing and malware attacks, they needed to act fast. Jump into the case study to look up-close at how they solved their problem.
Posted: 21 Sep 2020 | Published: 21 Sep 2020


Learn How to Detect a Phishing Email
sponsored by Vade Secure
RESOURCE: We’ve all come across a poor phishing attempt that was immediately obvious, but cybercriminals are crafty – some phishing emails are nearly indistinguishable from an authentic email. So, where should you look to spot a phishing attack? The following resource provides 7 key areas to look at – check it out.
Posted: 17 Sep 2020 | Published: 17 Sep 2020


Protect Your Network: Best Practices, Incidents & Other Security Considerations
sponsored by Zones, Inc.
EGUIDE: Machine learning and automation have advanced security response methods. However, hackers are equally adept at bypassing even the most sophisticated security measures. So, how can organizations address these challenges? Download this e-guide to discover network security best practices, incidents and other security considerations.
Posted: 10 Jul 2020 | Published: 07 Jul 2020

Zones, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info