Software  >  

Malware

RSS Feed   
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Malware Reports
26 - 50 of 547 Matches Previous Page  |  Next Page
2021 SONICWALL CYBER THREAT REPORT
sponsored by SonicWall
ANALYST REPORT: Last year, we saw an unprecedented increase in cyberattacks as well as threat vectors for attacks. To help security teams keep up, SonicWall has constructed their 2021 Cyber Threat Report, covering every attack from malware to intrusion to cryptojacking. Download the full report to learn everything about the cyber threat landscape.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

SonicWall

Mid-Year Threat Landscape Report 2020
sponsored by Bitdefender
RESEARCH CONTENT: Uncover the research found in the Mid-Year 2020 Threat Landscape report, which looks back at the windows, MacOS, and Android threat landscapes, as well as the evolution of ransomware families and spam.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

TOPICS:  Malware
Bitdefender

10 in 10 2020
sponsored by Bitdefender
RESEARCH CONTENT: Bitdefender's latest research report shows what factors will most impact security success in the next decade. Download the PDF to uncover the results on communication, cyberwarfare, skills diversity, ransomware, and IoT devices.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

TOPICS:  Malware
Bitdefender

Your Hybrid Infrastructure Is Under Attack
sponsored by Palo Alto Networks
WHITE PAPER: In a recent survey, 85% of IT pros selected hybrid cloud as their ideal operating model. However, these clouds come with their share of complexity. Namely, they require a high level of interconnectivity, which increases the risk of malware attacks, or worse. Don’t delay – Leverage this white paper to learn how to secure your hybrid environment.
Posted: 15 Mar 2021 | Published: 10 Nov 2020

Palo Alto Networks

The 2021 Ransomware Survival Guide
sponsored by Proofpoint
EBOOK: Ransomware is an old threat that persists as a modern-day problem, but most companies are ill-prepared for a ransomware attack. Download this guide to find out what you can do before, during, and after a ransomware attack to protect your organization.
Posted: 11 Mar 2021 | Published: 11 Mar 2021

TOPICS:  Malware | Security
Proofpoint

State Of Malware
sponsored by Malwarebytes
ANALYST REPORT: 2020 was a year of tragedy, upheaval, and adaptation. People and organizations adapted, but so did the cybercriminals who preyed upon them.Download this report to learn more about the state of malware as we enter the new year.
Posted: 10 Mar 2021 | Published: 10 Mar 2021

Malwarebytes

Turning Knowledge into Power
sponsored by Trend Micro
EBOOK: Organizations are working to defend against the volume of evolving cyberthreats plaguing them every day. One critical way to do so is through reading in-depth research that provides access to the methods and means of cybercriminals. Dive into this e-book learn about the 8 critical areas of cybersecurity and threat research.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

Trend Micro

Integrated Cybersecurity Delivers Efficiency and Effectiveness in a Challenging Environment
sponsored by Kaspersky
ANALYST REPORT: According to IDC research, the majority (75%) of organizations worldwide recognize that security team's time is wasted due to a lack of integration in their security environments. These teams would be wise to consider a multi-level, integrated approach with endpoint protection in mind. See this IDC white paper to examine such an approach.
Posted: 17 Feb 2021 | Published: 31 Jul 2020

Kaspersky

Simulating The Latest Threats And Techniques With The MITRE ATT&CK Matrix
sponsored by Cymulate
EBOOK: Organizations that don’t actively simulated advanced persistent threats (APTs) take a serious gamble each time they are faced with a serious cyberthreat. The MITRE ATT&CK Matrix aims to provide you with the knowledge and tactics needed to understand, simulate and prepare for today’s APTs – read this e-book to learn more.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

Audi fine-tunes its digital performance to boost online car sales
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Feb 2021

ComputerWeekly.com

Protecting APIs and Securing Applications So Business Can Thrive
sponsored by Radware
RESEARCH CONTENT: Nearly every organization relies on applications to connect with customers, business partners, suppliers and staff. As a result, the application and API threat landscape has evolved dramatically. Read this research report for a closer look at the state of application and API security, including top threats, best practices and more.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

Stay Ahead of New Ransomware Threats: Protect against data exfiltration and extortion
sponsored by Palo Alto Networks
WHITE PAPER: Recent data shows that threats are developing in two key areas: data exfiltration and extortion. Bad actors are using ransomware as a means to these ends. Organizations must be aptly prepared by knowing what these processes look like. View this white paper to get an in-depth look at an exfiltration-focused attack as well as the extortion phase.
Posted: 22 Jan 2021 | Published: 16 Dec 2020

Palo Alto Networks

Ransomware Threat Spotlight
sponsored by Barracuda
VIDEO: Another unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.
Posted: 23 Dec 2020 | Premiered: 23 Dec 2020

Barracuda

Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.
sponsored by Barracuda
WHITE PAPER: Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

Barracuda

Leading private hospital consolidates email protection to secure VIP guests’ data “Crown Jewels”
sponsored by Barracuda
CASE STUDY: Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

Top 10 Capabilities that Organizations Need in a Secure Email Gateway: A buyer’s guide
sponsored by Mimecast
EBOOK: With the proliferation of advanced threat techniques in today’s ecosystem, organizations are adopting secure email gateways (SEGs) for a multi-layered approach against email-borne threats. How can you be sure you’re considering the right one? This buyer’s guide details the 10 most important capabilities organizations should seek in a SEG solution.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Mimecast

Data Security Predictions 2021
sponsored by Splunk
WHITE PAPER: The pandemic of 2020 created unprecedented challenges for IT security teams and initiatives. This 23-page report provides a closer look at how the Coronavirus has shaped cybersecurity and explores key data security predictions for 2021. Read on to get started.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Splunk

Security in the Fast Lane
sponsored by WhiteHat Security
WEBCAST: Today’s organizations rely on a collection of applications in order to maintain internal operations and interact with end-users. However, dangerous threats targeting data in these critical apps have emerged. Watch this webinar to learn more about the application security threat landscape, notable breaches and how to protect your apps.
Posted: 04 Dec 2020 | Premiered: Dec 4, 2020

WhiteHat Security

Are You Ready For The Next Data Explosion?
sponsored by arcserve
RESOURCE: By 2021, it’s expected than any given organization will fall victim to a ransomware attack every 11 seconds – with global costs predicted to reach $20 billion. Why such a stark rise? Data generation is skyrocketing, and with more data comes more cybercrime. Read this infographic to learn more about the next data explosion.
Posted: 01 Dec 2020 | Published: 01 Dec 2020

arcserve

If You Think You Can’t Afford To Protect Office 365, Think Again.
sponsored by arcserve
DATA SHEET: 56% of businesses use Office 365, yet most leave themselves wide open to cyberattacks and data loss without third-party protection. Why? Many assume Microsoft is backing up their data, but it’s actually up to you – the user – to protect from the unknown. So how can you start? Examine this data sheet to see a good first step.
Posted: 01 Dec 2020 | Published: 01 Dec 2020

arcserve

Get The Green Light For Ransomware Protection
sponsored by arcserve
RESOURCE: For security pros hoping to convince business decision-makers to invest in ransomware protection, it’s critical to ‘speak their language’ by highlighting the most impactful data (revenue, consumer behavior, actual costs, etc.). Read this infographic for 7 tips to help convey the seriousness of ransomware.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

arcserve

Lose My Trust Lose My Business.
sponsored by arcserve
RESOURCE: For consumers, trust is one of most important factors when making a purchase. So, it stands to reason that organizations that fall victim to ransomware attacks experience dramatic impacts on consumer behavior. Read this infographic, which provides statistics that further illustrate the impact of ransomware on trust.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

arcserve

DDoS Response Guide
sponsored by Radware
WHITE PAPER: DDoS attacks can flood your network with malicious traffic, bringing applications down and preventing legitimate users from accessing your services. The good news, however, is that there is plenty to be done about it. In this white paper, explore 3 steps that will allow you to minimize the impact of a DDoS attack.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Radware

Prevent Fraud And Phishing Attacks With DMARC
sponsored by Mimecast
PRODUCT OVERVIEW: The FBI estimates that between 2013 and 2018, cybercriminals stole more than $12 billion using business email compromise (BEC) attacks. To prevent BEC and phishing, organisations are turning to email authentication tools. Read this Forrester report, which analyzes the features and capabilities of the DMARC standard.
Posted: 21 Oct 2020 | Published: 31 Mar 2020

Mimecast

5 IAM Trends Shaping the Future of Security
sponsored by Beta Systems
EGUIDE: Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
Posted: 02 Nov 2020 | Published: 28 Oct 2020

Beta Systems
26 - 50 of 547 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences