ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Bitdefender

  • Is Threat Intelligence the Go-To Weapon for Fighting Advanced Threats?

    The threat intelligence platform (TIP) market is emerging as the go-to weapon against the onslaught of today’s advanced cyberthreats – but what is it about TIPs that make them so effective against these threats? Read this article to find out.

  • The Rise of APT as a Service

    Access the Bitdefender investigation to learn the intricate details revealed into an APT attack, which targeted a company that deals with high-profile billion-dollar contracts in the real-estate industry.

  • StrongPity APT - Revealing Trojanized Tools, Working Hours and Infrastructure

    This investigation report compiles Bitdefender’s key findings from the information they gathered on StrongPity, a threat group that renown for their government-sponsored population surveillance and intelligence attacks. Download the report to learn more about StrongPity’s motives, tactics and infrastructure.

  • Cyberthreat Hunting Guide

    Threat hunting is the proactive search for cyber threats within a network, including those that have already slipped past endpoint security defenses. In today’s security zeitgeist, it is more commonplace to use AI and machine learning to hunt threats as it can keep networks ahead of the curve. Read this guide to learn more.

  • Overcome Alert Fatigue with Actionable Threat Intelligence

    Organizations want to defend from threats, but because of the sensory overload caused by constant alerts, IT departments are suffering from alert fatigue. Fortunately, threat intelligence can use data to alleviate this issue. Watch this webcast to learn more.

  • BitterAPT Revisited: The Untold Evolution of an Android Espionage Tool

    A malware threat group targeting Pakistani nationals, known as Bitter, became infamous in 2016. In 2019, their campaigns had expanded to other countries in South Asia, East Asia and the Middle East. So, how have their espionage and malware tactics changed over the years? Download this in-depth report to find out.

  • Threat Intelligence: Shrinking the Cybersecurity Data Gap

    The average cost of a data breach reached $3.92B in 2019, and this figure continues to grow year-over-year. Simultaneously, security teams are struggling to keep up with evolving threats and false positives. As a result, more companies are adopting threat intelligence. Read this white paper to learn why it’s becoming more popular.

  • Kingminer –a Crypto-Jacking Botnet Under the Scope

    Kingminer is a piece of crypto-jacking malware that has been around since early 2018. It is an infection that begins from an SQL server process and exploits configuration flaws to obtain access to said server and schedules malicious commands for execution. Read this white paper for a technical analysis and how to know if you’ve been compromised.

  • Loading DLLs for Illicit Profit: A Story About a Metamorfo Distribution Campaign

    Dynamic-link libraries (DLLs) are on-ramps into a network that tend to be overlooked. Hackers can hijack an organization’s DLLs leaving valuable company data vulnerable to attack and theft. Read this white paper for a closer look at how cybercriminals hack DLLs for illicit profit and how you may be able to prevent these criminals.

  • Modernizing SOCs with Advanced Threat Intelligence

    This webinar provides a comprehensive look at the challenges, threats, and trends as they relate to today’s SOCs, and offers insight into embracing tactical, operational and strategic threat intelligence. Join Jarret Raim and Daniel Clayton, IT security leaders at Bitdefender, as they discuss the need to modernize your SOC.

  • Threat Intelligence Driven Detect and Response Operations

    Cyber threat intelligence (CTI) is both a product and a process designed to equip users with actionable information regarding a threat, enabling to mitigate the impact. In this SANS webcast, join distinguished security experts as they further discuss incorporating CTI into your organizations threat detection, hunting and response program.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.