Software  >  

Malware

RSS Feed   
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Malware Reports
1 - 25 of 566 Matches Previous Page  |  Next Page
Ransomware Report - Summer 2021 - Volume 1
sponsored by Dell SecureWorks
RESEARCH CONTENT: Recent headlines have brought new attention to an old problem: ransomware. This research report compiles key resources and exclusive industry insight to help you stay protected, including a closer look at common attack vectors, prevention tips, use cases and more. Read on to unlock the full report.
Posted: 27 Sep 2021 | Published: 27 Sep 2021

TOPICS:  Malware
Dell SecureWorks

Cyber Resilience: 5 Core Elements Of A Mature Cyber Recovery Program
sponsored by Dell Technologies
BLOG: Cyber resilience is the result of business, security, and IT coming together to develop an integrated strategy and roadmap that aligns cyber security and business continuity. Explore this blog post to learn 5 elements involved in cyber recovery maturity and achieving incremental outcomes.
Posted: 27 Sep 2021 | Published: 22 Feb 2021

TOPICS:  Malware
Dell Technologies

Three Secrets to Stopping Ransomware Cold
sponsored by Zscaler
WHITE PAPER: Check out this white paper to learn 3 secrets to stopping ransomware which are based on building the cloud from the ground-up to protect users, applications, and sensitive data from potentially devastating ransomware attacks.
Posted: 24 Sep 2021 | Published: 24 Sep 2021

TOPICS:  Malware
Zscaler

5 Essential Components of a Ransomeware Protection Plan
sponsored by Infrascale
QSO INCENTIVE: Simply answer a few quick questions about your current ransomware prevention strategy to discover 5 essential components that your ransomware protection plan should cover.
Posted: 22 Sep 2021 | Published: 22 Sep 2021

TOPICS:  Malware | Security
Infrascale

State of Encrypted Attacks
sponsored by Zscaler
EBOOK: ThreatLabZ researchers recently uncovered, analyzed, and reported on threats leveraging encrypted channels prompting them to release an e-book on the state of encrypted attacks. Access it here to learn key insights on how attackers are accelerating their use of SSL/TLS encryption to bypass traditional defenses.
Posted: 22 Sep 2021 | Published: 22 Sep 2021

TOPICS:  Malware
Zscaler

THE ULTIMATE GUIDE TO REMOTE WORKFORCE SECURITY
sponsored by Check Point
EBOOK: Access this e-book to learn the different cyber threats that arise from the new distributed workspace, and the five must-have protections to keep remote users safe across all threat vectors.
Posted: 14 Sep 2021 | Published: 14 Sep 2021

TOPICS:  Malware
Check Point

CYBER ATTACK TRENDS Mid Year Report 2021
sponsored by Check Point
EBOOK: Explore this Cyber Attack Trends Mid Year Report for 2021 to evaluate the current threat landscape, learn about the impact of triple extortion, and more, all while using examples and stats from the real world.
Posted: 14 Sep 2021 | Published: 14 Sep 2021

TOPICS:  Malware
Check Point

Intelligent Ransomware Recovery with Wipro Enterprise VaultPowered by Cohesit
sponsored by Cohesity and Wipro
ESG: Implementing a good cyber recovery solution is becoming more important as cyber-criminals become increasingly sophisticated—targeting not only production data and applications, but also the backup data that organizations rely on to recover their environments from exactly such an event. Explore this ESG report to learn about one such solution.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TOPICS:  Malware
Cohesity and Wipro

Six Ransomware Gangs Claim 290+ New Victims in 2021, Potentially Reaping $45M for the Hackers
sponsored by eSentire
RESOURCE: Rampant crime almost always leads to organized crime, and cybercrime is no exception to this rule. Read this threat report to examine the nefarious work of 6 ransomware gangs who recently claimed 290+ new victims in 2021, reaping an estimated $45 million.
Posted: 29 Jul 2021 | Published: 29 Jul 2021

TOPICS:  Malware
eSentire

BLACKBERRY VS. CONTI RANSOMWARE
sponsored by BlackBerry
SOFTWARE DEMO: Access this video demo to observe an in-depth examination of 2 recent versions of Conti Ransomware attacks and how BlackBerry was able to defend against these attacks by preventing the malware from running.
Posted: 23 Jun 2021 | Premiered: 23 Jun 2021

TOPICS:  Malware
BlackBerry

Ransom Mafia. Analysis of The World’s First Ransomware Cartel
sponsored by Analyst1
RESEARCH CONTENT: Analyst1 produced a report to better understand and defend against advanced ransomware attackers, like Twisted Spider, Viking Spider, Lockbit Gang, etc. Download the report to uncover their findings.
Posted: 03 Jun 2021 | Published: 03 Jun 2021

TOPICS:  Malware
Analyst1

Spotlight on Current & Emerging Ransomware Threats
sponsored by TechTarget
RESOURCE: Check out our e-guide Spotlight on Current & Emerging Ransomware Threats to evaluate the current ransomware threat landscape. Highlights include a spotlight on how 3 ransomware strains could impact your company, 4 best practices for reporting attacks, and ransomware negotiations: An inside look at the process.
Posted: 29 May 2021 | Published: 28 Aug 2021

TechTarget

Exploring the State of Malware in 2021
sponsored by Malwarebytes
INFOGRAPHIC: In 2020, organizations experienced malware attacks on a whole new scale – an increased volume of sophisticated attacks plagued nearly every business. This infographic provides a comprehensive look at malware trends, observations, insights and adversary techniques over the past year. Read on to get started.
Posted: 27 May 2021 | Published: 27 May 2021

TOPICS:  Malware
Malwarebytes

Webinar -Hunting threats in harm’s way and dissecting it the Holmes way!
sponsored by Cisco Umbrella
WEBCAST: This talk will cover the rise of RATS, the rise of XLS attachment exploits, and new obfuscation techniques to conceal core code and configuration files by malware authors. The talk also touches on the theme of how techniques in exfiltration are changing and how rapidly other threat actors are adopting or improvising on these trends.
Posted: 21 May 2021 | Premiered: May 21, 2021

TOPICS:  Malware
Cisco Umbrella

Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.
Posted: 17 May 2021 | Published: 18 May 2021

ComputerWeekly.com

2021 Global Threat Report
sponsored by CrowdStrike
RESEARCH CONTENT: Download CrowdStrike’s annual threat report for important lessons from 2020 and recommendations for security teams operating in today’s environment.
Posted: 20 Apr 2021 | Published: 20 Apr 2021

TOPICS:  Malware
CrowdStrike

Splunk Security: Detecting Unknown Malware And Ransomware
sponsored by Splunk
WHITE PAPER: The traditional way of detecting an advanced malware or threat compromise in a Windows environment relies on using a signature-based anti-virus or malware product – but these won’t catch everything. Download this white paper to learn – step by step – how to detect unknown malware activity and early signs of compromise in a Windows environment.
Posted: 19 Apr 2021 | Published: 05 Jan 2021

TOPICS:  Malware
Splunk

2021 Threat Report
sponsored by BlackBerry
RESEARCH CONTENT: The BlackBerry 2021 Threat Report examines and analyzes the biggest cybersecurity events of the current and past year. This edition covers COVID-19 exploitation, election vulnerabilities, top malware attacks, and many other contemporary issues. Download it now.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Malware
BlackBerry

The future of storage
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

ComputerWeekly.com

Secureworks: Insights from SolarWinds and the Next Steps for Cybersecurity
sponsored by Dell SecureWorks
WEBCAST: The recent SolarWinds Orion software compromise gave the world a crash course in vulnerability. Leverage this webinar featuring incident response experts as they discuss the SolarWinds attacks and the lessons that can be drawn from them, including measures you can take to help keep your organization secure going forward.
Posted: 22 Mar 2021 | Premiered: Mar 22, 2021

Dell SecureWorks

2021 SONICWALL CYBER THREAT REPORT
sponsored by SonicWall
ANALYST REPORT: Last year, we saw an unprecedented increase in cyberattacks as well as threat vectors for attacks. To help security teams keep up, SonicWall has constructed their 2021 Cyber Threat Report, covering every attack from malware to intrusion to cryptojacking. Download the full report to learn everything about the cyber threat landscape.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

SonicWall

Mid-Year Threat Landscape Report 2020
sponsored by Bitdefender
RESEARCH CONTENT: Uncover the research found in the Mid-Year 2020 Threat Landscape report, which looks back at the windows, MacOS, and Android threat landscapes, as well as the evolution of ransomware families and spam.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

TOPICS:  Malware
Bitdefender

10 in 10 2020
sponsored by Bitdefender
RESEARCH CONTENT: Bitdefender's latest research report shows what factors will most impact security success in the next decade. Download the PDF to uncover the results on communication, cyberwarfare, skills diversity, ransomware, and IoT devices.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

TOPICS:  Malware
Bitdefender

Your Hybrid Infrastructure Is Under Attack
sponsored by Palo Alto Networks
WHITE PAPER: In a recent survey, 85% of IT pros selected hybrid cloud as their ideal operating model. However, these clouds come with their share of complexity. Namely, they require a high level of interconnectivity, which increases the risk of malware attacks, or worse. Don’t delay – Leverage this white paper to learn how to secure your hybrid environment.
Posted: 15 Mar 2021 | Published: 10 Nov 2020

Palo Alto Networks

Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
Posted: 19 Jul 2021 | Published: 20 Jul 2021

ComputerWeekly.com
1 - 25 of 566 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences