Software  >  

Malicious Logic

RSS Feed   
Malicious Logic Reports
 
Global Threat Report
sponsored by VMware International Unlimited Company
ANALYST REPORT: 94% of organizations worldwide have suffered a data breach as a result of a cyberattack in the past 12 months, and the average organization has experienced 2.17 breaches. If this statistic surprises you, then you may want to read the full global threat report by VMware and Carbon Black to get a sense of where threat actors are developing most.
Posted: 27 Oct 2020 | Published: 30 Jun 2020

VMware International Unlimited Company

Understanding Phishing: Invisible Characters
sponsored by Inky Technology
WHITE PAPER: Similar to hidden text and zero font, invisible characters is a phishing tactic designed to obscure text in order to bypass secure email gateways (SEGs). Read this edition of Understanding Phishing for a full breakdown of invisible text – including real-world examples and best practices for stopping it.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

Inky Technology

e-book: Securing Microsoft 365 Email Against Advanced Threats
sponsored by Cisco
EBOOK: Businesses are migrating to cloud email platforms for improved productivity, mobility, and continual access to the latest tools and features. But there’s a catch. Cloud-based email has left users and devices open to new threats and vulnerabilities. Read this e-book to explore these risks, particularly in the context of Microsoft 365.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Cisco

2021 SONICWALL CYBER THREAT REPORT
sponsored by SonicWall
ANALYST REPORT: Last year, we saw an unprecedented increase in cyberattacks as well as threat vectors for attacks. To help security teams keep up, SonicWall has constructed their 2021 Cyber Threat Report, covering every attack from malware to intrusion to cryptojacking. Download the full report to learn everything about the cyber threat landscape.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

SonicWall

Stay Ahead of New Ransomware Threats: Protect against data exfiltration and extortion
sponsored by Palo Alto Networks
WHITE PAPER: Recent data shows that threats are developing in two key areas: data exfiltration and extortion. Bad actors are using ransomware as a means to these ends. Organizations must be aptly prepared by knowing what these processes look like. View this white paper to get an in-depth look at an exfiltration-focused attack as well as the extortion phase.
Posted: 22 Jan 2021 | Published: 16 Dec 2020

Palo Alto Networks

Omdia Market Radar: Outbound Email Security
sponsored by Zivver
WHITE PAPER: When it comes to email security, organizations put their primary focus on potential threats coming in. And that’s fine, but outbound email security is arguably just as important. Browse this white paper to get a closer look at outbound email data protection, which focuses on building controls to offset risks from the insider threat.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

Zivver

Are You Ready For The Next Data Explosion?
sponsored by arcserve
RESOURCE: By 2021, it’s expected than any given organization will fall victim to a ransomware attack every 11 seconds – with global costs predicted to reach $20 billion. Why such a stark rise? Data generation is skyrocketing, and with more data comes more cybercrime. Read this infographic to learn more about the next data explosion.
Posted: 01 Dec 2020 | Published: 01 Dec 2020

arcserve

Exploiting a Pandemic: Coronavirus Stimulus Package Economic Impact Payments
sponsored by Inky Technology
WHITE PAPER: COVID-19 has introduced a flurry of phishing scams related to the virus, and millions of people have become victims as a result. But perhaps the most convincing of these attacks are the ones purporting to be from the US Federal Reserve offering to provide financial assistance. Read this white paper to see examples of these convincing emails.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Inky Technology

Introduction to DNSDB Part 1: Crawl
sponsored by Farsight Security
WEBCAST: Cheap, easy-to-obtain domain names, IP addresses and other DNS assets are helping to fuel today’s cybercrime, from spam and phishing to more sophisticated nation-state attacks. What can you do to stay protected? Jump into this webinar to learn how you can advance your threat intelligence and navigate roadblocks when using DNS in investigations.
Posted: 01 Dec 2020 | Premiered: Dec 1, 2020

Farsight Security

The Fidelis Threat Intelligence Toolkit is Here
sponsored by Fidelis
RESOURCE: Organizations are struggling to keep up with threat actors as they engage different vectors and develop their toolkit of attacks. It seems only fair, then, that you have a toolkit of your own. Click here to access your Fidelis Threat Intelligence Toolkit. Leverage the latest cybersecurity news and know what’s on the prowl and how to defend.
Posted: 21 Jan 2021 | Published: 21 Jan 2021

Fidelis
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences