Software  >  

Malicious Computer Code

RSS Feed   
Malicious Computer Code Reports
 
Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

13 Email Threat Types to Know about Right Now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

Offensive vs Defensive Security: Finding Vulnerabilities Before Your Attackers Do
sponsored by ProAct
WHITE PAPER: In chess, building your strategy around defensive, reactive moves may work for a time – but will ultimately be unsuccessful against creative opponents. Cybersecurity strategies operate similarly. The ability to proactively move against cyberthreats in an offensive way is critical. Read on to learn more about offensive cybersecurity.
Posted: 17 Apr 2020 | Published: 17 Apr 2020

ProAct

WEBINAR: Protecting Against Coronavirus Email Fraud
sponsored by Armorblox
VIDEO: Socially engineered attacks are always aligned with what people are talking (or worried) about. So, it should come as no surprise that record amounts of cyberattacks have been using the current Coronavirus pandemic as a lure to cause disruptions. Watch this webinar to learn more about their tactics and how to spot them.
Posted: 14 Apr 2020 | Premiered: 08 Apr 2020

Armorblox

Advanced Threat Protection and Vulnerability Management
sponsored by Cloud4C
BROCHURE: Ransomware has grown into one of the costliest disruptions both in terms of attack frequency and breach cost. To stop these constant threats, IT security teams are turning to SIEM approaches. In this brochure, take a closer look at some of the flaws in SIEM, and discover an approach that may be better suited to prevent ransomware attacks.
Posted: 05 May 2020 | Published: 05 May 2020

Cloud4C

2020 Cybersecurity Outlook Report
sponsored by VMware International Unlimited Company
WHITE PAPER: The fight between organizations trying to secure their data and cyberattackers looking for ways to steal it is a constant struggle that seems to constantly evolve. As organizations employ stronger defenses, hackers find more creative ways to bypass them. In this research report, uncover the findings from a study into the evolution of this pattern.
Posted: 01 May 2020 | Published: 01 May 2020

VMware International Unlimited Company

Augmenting Native Office 365 Email Security to Stop Targeted Email Attacks
sponsored by Armorblox
WHITE PAPER: Email remains the top communication method within and among businesses. In order to take advantage of this, cyberattackers develop targeted campaigns that focus on tricking users into clicking on malware. In this white paper, learn how to complement your existing Office 365 security features with third-party services to stop email attacks.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Armorblox

Splunk Security: Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: Ransomware is, unfortunately, an increasingly frequent and costly attack method. It’s a subset of malware that steals data and holds it ‘hostage’ until a ransom is paid. In this white paper, learn about detecting the early signs of compromise or malicious activity by following this step-by-step journey. Read on to get started.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Splunk

Cloud App Security Report Infographic
sponsored by Trend Micro
RESOURCE: Although less than 400,000 business email compromise (BEC) attacks were recorded in 2019, they accounted for half of all cybercrime losses in 2019 ($1.7 billion). Download this email security threats infographic to learn more about the prevalence of BEC attacks in 2019, as well as phishing and other malware attacks.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

Trend Micro

The Art of Zero Day Threat Coverage
sponsored by Trend Micro
EBOOK: When it comes to network security, what you don’t know can hurt you in the form of unknown and undisclosed threats. Download this e-book to learn about the 3 different types of zero-day threats and how to protect your network from them.
Posted: 11 Mar 2020 | Published: 11 Mar 2020

Trend Micro
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info