Software  >  

Malware

RSS Feed   
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Malware Reports
1 - 25 of 580 Matches Previous Page  |  Next Page
Four Ransomware Resiliency Challenges You Can Combat with Confidence
sponsored by Veritas
EBOOK: Ransomware is a growing threat to operational resiliency in all digital enterprises. Check out this e-book to learn four stories describing typical challenges administrators may encounter, how they can lead to ransomware mistakes and how organizations might prevent these attacks.
Posted: 07 Jul 2021 | Published: 07 Jul 2021

TOPICS:  Malware
Veritas

Ransomware Resiliency with the Veritas Enterprise Data Services Platform
sponsored by Veritas
EBOOK: This e-book explores the Veritas Enterprise Data Services Platform, a comprehensive, compliant, and secure ransomware resiliency solution. Access it here to learn how to protect your IT systems and maintain data integrity, determine which recover option is right for you, and more.
Posted: 07 Jul 2021 | Published: 07 Jul 2021

TOPICS:  Malware
Veritas

BLACKBERRY VS. CONTI RANSOMWARE
sponsored by BlackBerry
SOFTWARE DEMO: Access this video demo to observe an in-depth examination of 2 recent versions of Conti Ransomware attacks and how BlackBerry was able to defend against these attacks by preventing the malware from running.
Posted: 23 Jun 2021 | Premiered: 23 Jun 2021

TOPICS:  Malware
BlackBerry

Ransom Mafia. Analysis of The World’s First Ransomware Cartel
sponsored by Analyst1
RESEARCH CONTENT: Analyst1 produced a report to better understand and defend against advanced ransomware attackers, like Twisted Spider, Viking Spider, Lockbit Gang, etc. Download the report to uncover their findings.
Posted: 03 Jun 2021 | Published: 03 Jun 2021

TOPICS:  Malware
Analyst1

Spotlight on Current & Emerging Ransomware Threats
sponsored by TechTarget
RESOURCE: From DearCry to Black Kingdom, our editors dig into the current ransomware threat landscape in our new e-guide with a spotlight on 3 important ransomware strains, 4 best practices for reporting attacks, and more. Simply fill out a few questions for our Secondary Storage Research Program and the e-guide is yours!
Posted: 29 May 2021 | Published: 29 May 2021

TechTarget

Exploring the State of Malware in 2021
sponsored by Malwarebytes
INFOGRAPHIC: In 2020, organizations experienced malware attacks on a whole new scale – an increased volume of sophisticated attacks plagued nearly every business. This infographic provides a comprehensive look at malware trends, observations, insights and adversary techniques over the past year. Read on to get started.
Posted: 27 May 2021 | Published: 27 May 2021

TOPICS:  Malware
Malwarebytes

Webinar -Hunting threats in harm’s way and dissecting it the Holmes way!
sponsored by Cisco Umbrella
WEBCAST: This talk will cover the rise of RATS, the rise of XLS attachment exploits, and new obfuscation techniques to conceal core code and configuration files by malware authors. The talk also touches on the theme of how techniques in exfiltration are changing and how rapidly other threat actors are adopting or improvising on these trends.
Posted: 21 May 2021 | Premiered: May 21, 2021

TOPICS:  Malware
Cisco Umbrella

Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.
Posted: 17 May 2021 | Published: 18 May 2021

ComputerWeekly.com

2021 Global Threat Report
sponsored by CrowdStrike
RESEARCH CONTENT: Download CrowdStrike’s annual threat report for important lessons from 2020 and recommendations for security teams operating in today’s environment.
Posted: 20 Apr 2021 | Published: 20 Apr 2021

TOPICS:  Malware
CrowdStrike

Splunk Security: Detecting Unknown Malware And Ransomware
sponsored by Splunk
WHITE PAPER: The traditional way of detecting an advanced malware or threat compromise in a Windows environment relies on using a signature-based anti-virus or malware product – but these won’t catch everything. Download this white paper to learn – step by step – how to detect unknown malware activity and early signs of compromise in a Windows environment.
Posted: 19 Apr 2021 | Published: 05 Jan 2021

TOPICS:  Malware
Splunk

2021 Threat Report
sponsored by BlackBerry
RESEARCH CONTENT: The BlackBerry 2021 Threat Report examines and analyzes the biggest cybersecurity events of the current and past year. This edition covers COVID-19 exploitation, election vulnerabilities, top malware attacks, and many other contemporary issues. Download it now.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Malware
BlackBerry

BREAKING DOWN BOTS
sponsored by F5 Networks
RESOURCE: Take a look at this infographic to understand the difference between benign bots and malicious bots and tips for detecting them.
Posted: 06 Apr 2021 | Published: 06 Apr 2021

TOPICS:  Malware
F5 Networks

The Rise of Credential Stuffing Attacks: How to Keep Employee Accounts Secure
sponsored by TechTarget
RESOURCE: As long as employees are responsible for like passwords and accounts, there will be threats targeting those credentials. This e-guide offers expert insight into protecting your employees against credential stuffing attacks, highlighting key challenges, hacker methods, best practices, and more.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

The Rise of Credential Stuffing Attacks: How to Keep Employee Accounts Secure
sponsored by TechTarget
RESOURCE: As long as employees are responsible for like passwords and accounts, there will be threats targeting those credentials. This e-guide offers expert insight into protecting your employees against credential stuffing attacks, highlighting key challenges, hacker methods, best practices, and more.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

The future of storage
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

ComputerWeekly.com

Secureworks: Insights from SolarWinds and the Next Steps for Cybersecurity
sponsored by Dell SecureWorks
WEBCAST: The recent SolarWinds Orion software compromise gave the world a crash course in vulnerability. Leverage this webinar featuring incident response experts as they discuss the SolarWinds attacks and the lessons that can be drawn from them, including measures you can take to help keep your organization secure going forward.
Posted: 22 Mar 2021 | Premiered: Mar 22, 2021

Dell SecureWorks

2021 SONICWALL CYBER THREAT REPORT
sponsored by SonicWall
ANALYST REPORT: Last year, we saw an unprecedented increase in cyberattacks as well as threat vectors for attacks. To help security teams keep up, SonicWall has constructed their 2021 Cyber Threat Report, covering every attack from malware to intrusion to cryptojacking. Download the full report to learn everything about the cyber threat landscape.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

SonicWall

Mid-Year Threat Landscape Report 2020
sponsored by Bitdefender
RESEARCH CONTENT: Uncover the research found in the Mid-Year 2020 Threat Landscape report, which looks back at the windows, MacOS, and Android threat landscapes, as well as the evolution of ransomware families and spam.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

TOPICS:  Malware
Bitdefender

10 in 10 2020
sponsored by Bitdefender
RESEARCH CONTENT: Bitdefender's latest research report shows what factors will most impact security success in the next decade. Download the PDF to uncover the results on communication, cyberwarfare, skills diversity, ransomware, and IoT devices.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

TOPICS:  Malware
Bitdefender

Ransomware Prevention Special Report: How to Address a Pervasive and Unrelenting Threat
sponsored by Gigamon
WHITE PAPER: Ransomware is a fast-growing threat affecting organizations of all sizes and industries. But a combination of security hygiene, prevention techniques and detection and response capabilities can combat ransomware successfully. Download this SANS white paper to identify what ransomware is, the threats it might pose and how to defend against it.
Posted: 18 Mar 2021 | Published: 30 Nov 2020

Gigamon

Your Hybrid Infrastructure Is Under Attack
sponsored by Palo Alto Networks
WHITE PAPER: In a recent survey, 85% of IT pros selected hybrid cloud as their ideal operating model. However, these clouds come with their share of complexity. Namely, they require a high level of interconnectivity, which increases the risk of malware attacks, or worse. Don’t delay – Leverage this white paper to learn how to secure your hybrid environment.
Posted: 15 Mar 2021 | Published: 10 Nov 2020

Palo Alto Networks

The 2021 Ransomware Survival Guide
sponsored by Proofpoint
EBOOK: Ransomware is an old threat that persists as a modern-day problem, but most companies are ill-prepared for a ransomware attack. Download this guide to find out what you can do before, during, and after a ransomware attack to protect your organization.
Posted: 11 Mar 2021 | Published: 11 Mar 2021

TOPICS:  Malware | Security
Proofpoint

State Of Malware
sponsored by Malwarebytes
ANALYST REPORT: 2020 was a year of tragedy, upheaval, and adaptation. People and organizations adapted, but so did the cybercriminals who preyed upon them.Download this report to learn more about the state of malware as we enter the new year.
Posted: 10 Mar 2021 | Published: 10 Mar 2021

Malwarebytes

Turning Knowledge into Power
sponsored by Trend Micro
EBOOK: Organizations are working to defend against the volume of evolving cyberthreats plaguing them every day. One critical way to do so is through reading in-depth research that provides access to the methods and means of cybercriminals. Dive into this e-book learn about the 8 critical areas of cybersecurity and threat research.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

Trend Micro

Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
Posted: 19 Jul 2021 | Published: 20 Jul 2021

ComputerWeekly.com
1 - 25 of 580 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences