Malware Reports

Cisco Secure Endpoint Stops Zero-Day Ransomware with Malicious Activity Protection
sponsored by Cisco Secure
VIDEO: This demo video shows how Cisco Secure Endpoint defeats zero-day ransomware attacks with its Malicious Activity Protection technology.
Posted: 09 Aug 2022 | Premiered: 09 Aug 2022

TOPICS:  Malware
Cisco Secure

Ransomware Protection: Last Line of Defense, First Step in Data Recovery
sponsored by Commvault
WHITE PAPER: Access this white paper to examine ransomware as one of the many threats to recovery readiness facing today’s organizations, drill deeper into the nature, impact, and direction of this insidious form of attack, explore risk management elements, including planning, protection, monitoring, fast restores, and testing, and more.
Posted: 19 Jul 2022 | Published: 19 Jul 2022

TOPICS:  Malware
Commvault

Ransomware Report - Summer 2021 - Volume 1
sponsored by Dell SecureWorks
RESEARCH CONTENT: Recent headlines have brought new attention to an old problem: ransomware. This research report compiles key resources and exclusive industry insight to help you stay protected, including a closer look at common attack vectors, prevention tips, use cases and more. Read on to unlock the full report.
Posted: 20 Jan 2022 | Published: 27 Sep 2021

TOPICS:  Malware
Dell SecureWorks

The Definitive Email Security Strategy Guide: A People-Centric Approach to Stopping Malware, Phishing, and Email Fraud
sponsored by Proofpoint
WHITE PAPER: With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).
Posted: 18 Nov 2021 | Published: 05 Jun 2020

Proofpoint

Protect, detect, and recover data from ransomware – quickly and fully
sponsored by Commvault
WHITE PAPER: Access this white paper to discover how you can protect, detect, and recover data successfully to mitigate the risk of ransomware for your business using Commvault.
Posted: 21 Oct 2021 | Published: 21 Oct 2021

TOPICS:  Malware
Commvault

Webinar -Hunting threats in harm’s way and dissecting it the Holmes way!
sponsored by Cisco Secure
WEBCAST: This talk will cover the rise of RATS, the rise of XLS attachment exploits, and new obfuscation techniques to conceal core code and configuration files by malware authors. The talk also touches on the theme of how techniques in exfiltration are changing and how rapidly other threat actors are adopting or improvising on these trends.
Posted: 21 May 2021 | Premiered: May 21, 2021

TOPICS:  Malware
Cisco Secure

Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.
Posted: 17 May 2021 | Published: 18 May 2021

ComputerWeekly.com

Why are Acronis Cyber Protection Solutions Threatagnostic?
sponsored by Acronis
WHITE PAPER: Security professionals must both account for the many types of cyberattacks and apply security controls to different vectors through which these attacks can make their way in. In this white paper, read up on threat vectors, cyberattack techniques, types of malware and fileless attacks, and see how Acronis can help you fight them all.
Posted: 14 Apr 2021 | Published: 31 Dec 2020

Acronis

The future of storage
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

ComputerWeekly.com

Your Hybrid Infrastructure Is Under Attack
sponsored by Palo Alto Networks
WHITE PAPER: In a recent survey, 85% of IT pros selected hybrid cloud as their ideal operating model. However, these clouds come with their share of complexity. Namely, they require a high level of interconnectivity, which increases the risk of malware attacks, or worse. Don’t delay – Leverage this white paper to learn how to secure your hybrid environment.
Posted: 15 Mar 2021 | Published: 10 Nov 2020

Palo Alto Networks

Audi fine-tunes its digital performance to boost online car sales
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Feb 2021

ComputerWeekly.com

Ransomware Threat Spotlight
sponsored by Barracuda
VIDEO: Another unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.
Posted: 08 Feb 2021 | Premiered: 23 Dec 2020

Barracuda

Leading private hospital consolidates email protection to secure VIP guests’ data “Crown Jewels”
sponsored by Barracuda
CASE STUDY: Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.
Posted: 08 Feb 2021 | Published: 21 Dec 2020

Barracuda

Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.
sponsored by Barracuda
WHITE PAPER: Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
Posted: 08 Feb 2021 | Published: 23 Dec 2020

Barracuda

The future of storage
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
Posted: 08 Feb 2021 | Published: 13 Oct 2020

ComputerWeekly.com

Are your remote workers sitting ducks?
sponsored by Mimecast
WHITE PAPER: COVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organisations suggests that many are just that. Download this white paper to learn more.
Posted: 08 Feb 2021 | Published: 07 Oct 2020

Mimecast

Insights into attacker activity in compromised email accounts
sponsored by Barracuda
WHITE PAPER: Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.
Posted: 08 Feb 2021 | Published: 31 Jul 2020

Barracuda

Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 08 Feb 2021 | Published: 30 Nov 2019

Barracuda

13 email threat types to know about right now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 08 Feb 2021 | Published: 01 May 2020

Barracuda

CASE STUDY: Tricentis slams the door on C-level email attacks using Barracuda Sentinel
sponsored by Barracuda
VIDEO: Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.
Posted: 08 Feb 2021 | Premiered: 31 May 2019

Barracuda

Agile software testing pioneer slams the door on C-level email attacks
sponsored by Barracuda
WHITE PAPER: Learn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.
Posted: 08 Feb 2021 | Published: 07 Jun 2019

Barracuda

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by Barracuda
WHITE PAPER: Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
Posted: 08 Feb 2021 | Published: 30 Apr 2018

Barracuda

Spear Phishing: Top Threats and Trends Vol. 1
sponsored by Barracuda
RESOURCE: This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
Posted: 08 Feb 2021 | Published: 31 Mar 2019

Barracuda

Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
Posted: 19 Jul 2021 | Published: 20 Jul 2021

ComputerWeekly.com

5 IAM Trends Shaping the Future of Security
sponsored by Beta Systems
EGUIDE: Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
Posted: 02 Nov 2020 | Published: 28 Oct 2020

Beta Systems