Malware Research
-
How do cybercriminals steal credit card information?
Sponsored by: TechTarget ComputerWeekly.comCybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
-
How to Create a Ransomware Incident Response Plan
Sponsored by: DigitalXRAIDRansomware is rapidly becoming one of today’s most persistent (and potentially devastating) cyberthreats. In fact, according to Forbes, the average amount of reported ransomware transactions per month in 2021 was $102.3 million. Read this e-guide to unlock 9-steps designed to help you build an effective ransomware mitigation strategy.
-
Best Practices Guide: Prepare And Recover From A Ransomware Attack With Rubrik
Sponsored by: RubrikAccess this Rubrik Zero Trust Data Management white paper to learn about deployment best practices that make it even tougher for cyber criminals to attack, go through the recovery process in the event of an attack, and much more.
-
Rubrik For Ransomware Remediation
Sponsored by: RubrikAccess this data sheet to learn how Rubrik handles ransomware, including how it provides fast recovery to the most recent clean state, granular visibility into the scope of the attack, and alerts to unusual behavior leveraging machine learning.
-
Protect, detect, and recover data from ransomware – quickly and fully
Sponsored by: CommvaultAccess this white paper to discover how you can protect, detect, and recover data successfully to mitigate the risk of ransomware for your business using Commvault.
-
Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.
-
Your Hybrid Infrastructure Is Under Attack
Sponsored by: Palo Alto NetworksIn a recent survey, 85% of IT pros selected hybrid cloud as their ideal operating model. However, these clouds come with their share of complexity. Namely, they require a high level of interconnectivity, which increases the risk of malware attacks, or worse. Don’t delay – Leverage this white paper to learn how to secure your hybrid environment.
-
Audi fine-tunes its digital performance to boost online car sales
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
-
Leading private hospital consolidates email protection to secure VIP guests’ data “Crown Jewels”
Sponsored by: BarracudaHealthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.
-
Ransomware Threat Spotlight
Sponsored by: BarracudaAnother unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.
-
Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.
Sponsored by: BarracudaSpear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
-
The future of storage
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
-
Are your remote workers sitting ducks?
Sponsored by: MimecastCOVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organisations suggests that many are just that. Download this white paper to learn more.
-
Insights into attacker activity in compromised email accounts
Sponsored by: BarracudaSpear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.
-
Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks
Sponsored by: BarracudaBusiness email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
-
13 email threat types to know about right now
Sponsored by: BarracudaAs email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
-
CASE STUDY: Tricentis slams the door on C-level email attacks using Barracuda Sentinel
Sponsored by: BarracudaTune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.
-
Agile software testing pioneer slams the door on C-level email attacks
Sponsored by: BarracudaLearn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.
-
Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
Sponsored by: BarracudaDownload this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
-
Spear Phishing: Top Threats and Trends Vol. 1
Sponsored by: BarracudaThis report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
-
Royal Holloway: Man proposes, fraud disposes
Sponsored by: TechTarget ComputerWeekly.comIn May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
-
Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
-
The future of storage
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
-
5 IAM Trends Shaping the Future of Security
Sponsored by: Beta SystemsModern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
-
Incident Response Tools: How, When & Why to Use Them
Sponsored by: ClaranetIncident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.