Software  >  

Malware

RSS Feed   
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Malware Reports
1 - 25 of 507 Matches Previous Page  |  Next Page
How to Create a Ransomware Incident Response Plan
sponsored by DigitalXRAID
EGUIDE: Ransomware is rapidly becoming one of today’s most persistent (and potentially devastating) cyberthreats. In fact, according to Forbes, the average amount of reported ransomware transactions per month in 2021 was $102.3 million. Read this e-guide to unlock 9-steps designed to help you build an effective ransomware mitigation strategy.
Posted: 28 Dec 2021 | Published: 28 Dec 2021

TOPICS:  Malware
DigitalXRAID

SIMPLIFY CUSTOMER ONBOARDING WITH MALWAREBYTES ONEVIEW
sponsored by Malwarebytes
WHITE PAPER: As an MSP, you need to make sure your endpoint security vendor is efficient as to not hemorrhage MRR due to complex onboarding or time-consuming client management. Access this white paper to learn how Malwarebytes’ OneView console simplifies the onboarding process, eases management, and improves customer support.
Posted: 19 Nov 2021 | Published: 19 Nov 2021

Malwarebytes

Email Security in Healthcare
sponsored by Mimecast
EBOOK: While businesses across the U.S. have faced extreme pressures since the start of the pandemic, by many measures it has been the healthcare sector that has been under the most duress. Explore this e-book to learn 6 recommendations for healthcare providers looking to fortify their defense against the disease of ransomware.
Posted: 21 Oct 2021 | Published: 21 Oct 2021

TOPICS:  Malware
Mimecast

Protect, detect, and recover data from ransomware – quickly and fully
sponsored by Commvault
WHITE PAPER: Access this white paper to discover how you can protect, detect, and recover data successfully to mitigate the risk of ransomware for your business using Commvault.
Posted: 21 Oct 2021 | Published: 21 Oct 2021

TOPICS:  Malware
Commvault

Six Steps to Ransomware Recovery in a Commvault Environment
sponsored by Commvault
WEBCAST: Unfortunately, it can be hard to understand the aftermath of ransomware unless you or your organization has experienced it. Luckily, that’s where Commvault’s vast experience can come in handy. Watch the webinar, Six-Steps to Ransomware Recovery in a Commvault Environment to learn about Commvault’s ransomware recovery best practices.
Posted: 20 Sep 2021 | Premiered: Sep 20, 2021

TOPICS:  Malware
Commvault

Ransomware Protection: Last Line of Defense, First Step in Data Recovery
sponsored by Commvault
WHITE PAPER: Access this white paper to examine ransomware as one of the many threats to recovery readiness facing today’s organizations; drill deeper into the nature, impact, and direction of this insidious form of attack; explore risk management elements, including planning, protection, monitoring, fast restores, and testing; and more.
Posted: 17 Sep 2021 | Published: 17 Sep 2021

TOPICS:  Malware
Commvault

THE ULTIMATE GUIDE TO REMOTE WORKFORCE SECURITY
sponsored by Check Point
EBOOK: Access this e-book to learn the different cyber threats that arise from the new distributed workspace, and the five must-have protections to keep remote users safe across all threat vectors.
Posted: 14 Sep 2021 | Published: 14 Sep 2021

TOPICS:  Malware
Check Point

CYBER ATTACK TRENDS Mid Year Report 2021
sponsored by Check Point
EBOOK: Explore this Cyber Attack Trends Mid Year Report for 2021 to evaluate the current threat landscape, learn about the impact of triple extortion, and more, all while using examples and stats from the real world.
Posted: 14 Sep 2021 | Published: 14 Sep 2021

TOPICS:  Malware
Check Point

Six Ransomware Gangs Claim 290+ New Victims in 2021, Potentially Reaping $45M for the Hackers
sponsored by eSentire
RESOURCE: Rampant crime almost always leads to organized crime, and cybercrime is no exception to this rule. Read this threat report to examine the nefarious work of 6 ransomware gangs who recently claimed 290+ new victims in 2021, reaping an estimated $45 million.
Posted: 29 Jul 2021 | Published: 29 Jul 2021

TOPICS:  Malware
eSentire

Ransom Mafia. Analysis of The World’s First Ransomware Cartel
sponsored by Analyst1
RESEARCH CONTENT: Analyst1 produced a report to better understand and defend against advanced ransomware attackers, like Twisted Spider, Viking Spider, Lockbit Gang, etc. Download the report to uncover their findings.
Posted: 03 Jun 2021 | Published: 03 Jun 2021

TOPICS:  Malware
Analyst1

Webinar -Hunting threats in harm’s way and dissecting it the Holmes way!
sponsored by Cisco Umbrella
WEBCAST: This talk will cover the rise of RATS, the rise of XLS attachment exploits, and new obfuscation techniques to conceal core code and configuration files by malware authors. The talk also touches on the theme of how techniques in exfiltration are changing and how rapidly other threat actors are adopting or improvising on these trends.
Posted: 21 May 2021 | Premiered: May 21, 2021

TOPICS:  Malware
Cisco Umbrella

Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.
Posted: 17 May 2021 | Published: 18 May 2021

ComputerWeekly.com

2021 Global Threat Report
sponsored by CrowdStrike
RESEARCH CONTENT: Download CrowdStrike’s annual threat report for important lessons from 2020 and recommendations for security teams operating in today’s environment.
Posted: 20 Apr 2021 | Published: 20 Apr 2021

TOPICS:  Malware
CrowdStrike

2021 Threat Report
sponsored by BlackBerry
RESEARCH CONTENT: The BlackBerry 2021 Threat Report examines and analyzes the biggest cybersecurity events of the current and past year. This edition covers COVID-19 exploitation, election vulnerabilities, top malware attacks, and many other contemporary issues. Download it now.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Malware
BlackBerry

The future of storage
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

ComputerWeekly.com

2021 SONICWALL CYBER THREAT REPORT
sponsored by SonicWall
ANALYST REPORT: Last year, we saw an unprecedented increase in cyberattacks as well as threat vectors for attacks. To help security teams keep up, SonicWall has constructed their 2021 Cyber Threat Report, covering every attack from malware to intrusion to cryptojacking. Download the full report to learn everything about the cyber threat landscape.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

SonicWall

Your Hybrid Infrastructure Is Under Attack
sponsored by Palo Alto Networks
WHITE PAPER: In a recent survey, 85% of IT pros selected hybrid cloud as their ideal operating model. However, these clouds come with their share of complexity. Namely, they require a high level of interconnectivity, which increases the risk of malware attacks, or worse. Don’t delay – Leverage this white paper to learn how to secure your hybrid environment.
Posted: 15 Mar 2021 | Published: 10 Nov 2020

Palo Alto Networks

State Of Malware
sponsored by Malwarebytes
ANALYST REPORT: 2020 was a year of tragedy, upheaval, and adaptation. People and organizations adapted, but so did the cybercriminals who preyed upon them.Download this report to learn more about the state of malware as we enter the new year.
Posted: 10 Mar 2021 | Published: 10 Mar 2021

Malwarebytes

Simulating The Latest Threats And Techniques With The MITRE ATT&CK Matrix
sponsored by Cymulate
EBOOK: Organizations that don’t actively simulated advanced persistent threats (APTs) take a serious gamble each time they are faced with a serious cyberthreat. The MITRE ATT&CK Matrix aims to provide you with the knowledge and tactics needed to understand, simulate and prepare for today’s APTs – read this e-book to learn more.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

Audi fine-tunes its digital performance to boost online car sales
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Feb 2021

ComputerWeekly.com

Protecting APIs and Securing Applications So Business Can Thrive
sponsored by Radware
RESEARCH CONTENT: Nearly every organization relies on applications to connect with customers, business partners, suppliers and staff. As a result, the application and API threat landscape has evolved dramatically. Read this research report for a closer look at the state of application and API security, including top threats, best practices and more.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

Stay Ahead of New Ransomware Threats: Protect against data exfiltration and extortion
sponsored by Palo Alto Networks
WHITE PAPER: Recent data shows that threats are developing in two key areas: data exfiltration and extortion. Bad actors are using ransomware as a means to these ends. Organizations must be aptly prepared by knowing what these processes look like. View this white paper to get an in-depth look at an exfiltration-focused attack as well as the extortion phase.
Posted: 22 Jan 2021 | Published: 16 Dec 2020

Palo Alto Networks

Ransomware Threat Spotlight
sponsored by Barracuda
VIDEO: Another unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.
Posted: 23 Dec 2020 | Premiered: 23 Dec 2020

Barracuda

Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.
sponsored by Barracuda
WHITE PAPER: Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

Barracuda

Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
Posted: 19 Jul 2021 | Published: 20 Jul 2021

ComputerWeekly.com
1 - 25 of 507 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences