ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • Stopping Zero Days at The Speed of Digital

    Sponsored by: Checkpoint Software Technologies

    Most organizations are ill-equipped to handle the threat of zero-day cyberattacks. This e-book, Stopping Zero Days at The Speed of Digital, highlights 3 best practices that can help organizations better identity and mitigate these threats without compromising productivity – read on to get started.

  • Cyberattack Trends: 2020 Mid-Year Report

    Sponsored by: Checkpoint Software Technologies

    If your organization has come under attack since the outbreak of COVID-19, you are not alone. Cyberthreats are becoming more prominent than ever as a result of the spike in remote work, and if you’re not aware of which threats are lurking, another attack may be on the horizon. Read this report to get an understanding of what to look out for.

  • Your Guide to COVID-19-Related Threats

    Sponsored by: TechTarget

    Amid the existing uncertainty of the current pandemic, it's unfortunate – but not surprising – to see an increase in cyberattack campaigns using the coronavirus as an entry point. This expert guide, The Cybersecurity Professional's Guide to Pandemic-Related Threats, explores the various threats to watch out for and highlights

  • Phishing Factories Exploit Trust to Attack Businesses

    Sponsored by: Akamai Technologies

    As if it wasn’t enough to worry about attacks from independent threat actors, there is now an emerging underground economy of phishing ‘factories’ using more sophisticated social engineering tactics to gain trust among victims. Is your organization prepared? Read this article to discover alarming trends about phishing and how to increase awareness.

  • Business Continuity: What Have We Learned So Far?

    Sponsored by: Akamai Technologies

    Organizations have asked their employees to work remote, and they’ve done their best to scale digital transformation as a result. These changes have supported workforce productivity requirements, but they’ve also created an expanded attack surface and unforeseen complexity. Watch this webcast to learn how organizations can adapt to the new normal.

  • Phishing Factories and Economies: The Real Persistent Threat

    Sponsored by: Akamai Technologies

    A study conducted by Akamai indicates a recent uptick in Coronavirus-related phishing attacks. Pandemic aside – phishing threats continue to grow despite increasing investment into prevention methods. Watch this webinar to learn more about the evolving phishing landscape, emerging techniques, and more.

  • Combating Threats with the DDoS Defenders at Tata

    Sponsored by: TATA Communications

    In August 2019, one of Tata Communications’ customers was targeted by a 2-wave DDoS attack campaign of unprecedented scale. This video provides an overview of the tactics and methods used by the attacker and highlights how Tata’s analysts were able to identity and isolate the threat.

  • SIG - Axcess Financial Customer Story

    Sponsored by: Cisco Umbrella

    In this case study, following the journey of Axcess Financial as they partner with Cisco to address issues they were facing related to incident detection, response and remediation. Read on to learn how they overcame these challenges and the benefits of their partnership.

  • Webinar - Defend Better and Respond Faster With Security That Works Together

    Sponsored by: Cisco Umbrella

    Most malware infections happen in one of only 3 ways, so why aren’t they easier to stop? As organizations embrace the cloud, it’s now imperative to find a new approach to securing users and devices. View this webinar to find out how to stop attacks before they start and how to safeguard your organization with a layered approach to cybersecurity.

  • Third Party Script Application Security: Intrusion vs Detection

    Sponsored by: Akamai Technologies

    Emerging tactics among credit card skimming attacks are underlying the need to fortify security to stay ahead of these increasingly devastating campaigns. This 20-minute video provides a brief history of Magecart attacks and the rise of third-party scripts. Watch now to learn more about these threats and better understand how to mitigate them.

  • Video: Understanding bots and their role in credential stuffing

    Sponsored by: Akamai Technologies

    In this talk, Akamai security strategist Siddharth Deshpande will walk you through the dark web economy for malicious bots used in Credential Stuffing attacks and discuss options for effective Bot Management.

  • SIG - Cisco Umbrella

    Sponsored by: Cisco Umbrella

    Cisco Umbrella is a Secure Internet Gateway (SIG) that provides the first line of defense against threats on the internet, wherever users go. With integrated cloud security, users are kept secure, and retention of all internet activity reduces incident response time. Learn about the benefits and key features of Umbrella in this white paper.

  • 2020 SonicWall Cyber Threat Report

    Sponsored by: SonicWall

    So far this year, intrusion attempts are up 19% to 2.3 trillion. IoT malware attacks are up 50%. And according to the FBI, daily cybercrimes have increased 75% since COVID-19 began. In reading this white paper, you will learn powerful statistics and trends, such as these, to make strong decisions in protecting your network and users.

  • Video: Latest Credential Stuffing Attack Campaigns in Asia Pacific

    Sponsored by: Akamai Technologies

    Businesses struggle to deal with the challenge of bot and botnet attacks on their networks. Because security networks are less agile, IT departments scramble when an unknown IP is detected, and by this time, it’s usually too late. Watch this webcast to learn more about credential stuffing, a type of botnet attack that is used to gain user access.

  • StrongPity APT - Revealing Trojanized Tools, Working Hours and Infrastructure

    Sponsored by: Bitdefender

    This investigation report compiles Bitdefender’s key findings from the information they gathered on StrongPity, a threat group that renown for their government-sponsored population surveillance and intelligence attacks. Download the report to learn more about StrongPity’s motives, tactics and infrastructure.

  • Lockdown Lessons: Closing Security Gaps

    Sponsored by: Webroot

    It’s known that keys to security include finding the best technology and putting protocols in place to keep intruders out and employees vigilant. But simple processes such as updating systems, installing patches and disabling unnecessary services can also go a long way. Read this white paper to learn more about gaps to close in your network.

  • Video: Decoding Magecart/Web Skimming Attacks

    Sponsored by: Akamai Technologies

    Cyberthreat actors have taken note of the increased reliance on the internet due to COVID-19. More specifically, they are eyeing the sharp growth in online transactions. They are using web skimming, a hacking technique that injects malware onto a payment page to steal the payment information. Watch this webcast to learn more.

  • Types of Phishing Attacks You Need to Know to Stay Safe

    Sponsored by: Webroot

    Phishing has evolved from a single technique into many highly specialized tactics, each adapted to specific types of targets and technologies. It is now carried out via text, phone, and email. Knowing about the diverse set of today’s tactics can help people be more prepared. Read this white paper for 11 common phishing tactics you should know.

  • BitterAPT Revisited: The Untold Evolution of an Android Espionage Tool

    Sponsored by: Bitdefender

    A malware threat group targeting Pakistani nationals, known as Bitter, became infamous in 2016. In 2019, their campaigns had expanded to other countries in South Asia, East Asia and the Middle East. So, how have their espionage and malware tactics changed over the years? Download this in-depth report to find out.

  • Modernizing SOCs with Advanced Threat Intelligence

    Sponsored by: Bitdefender

    This webinar provides a comprehensive look at the challenges, threats, and trends as they relate to today’s SOCs, and offers insight into embracing tactical, operational and strategic threat intelligence. Join Jarret Raim and Daniel Clayton, IT security leaders at Bitdefender, as they discuss the need to modernize your SOC.

  • Mobile Phishing: Myths & Facts Facing Every Modern Enterprise Today

    Sponsored by: Lookout

    It may surprise you that the rate at which people fall for mobile phishing attacks has increased 85% every year since 2011. Organizations are constantly working to defend against phishing, but methods of defense against email attacks may not likewise prevent mobile attacks. Read this white paper for 3 myths and 3 facts on mobile phishing.

  • Threat Intelligence Driven Detect and Response Operations

    Sponsored by: Bitdefender

    Cyber threat intelligence (CTI) is both a product and a process designed to equip users with actionable information regarding a threat, enabling to mitigate the impact. In this SANS webcast, join distinguished security experts as they further discuss incorporating CTI into your organizations threat detection, hunting and response program.

  • Enterprise Data Protection Solutions, Explained

    Sponsored by: Forcepoint

    Incomplete or sub-par data protection practices can have devastating impacts for an organization – and choosing the right data protection partner is no easy task. To help you get started, download this enterprise data protection buyer’s guide to key evaluation criteria, questions to consider, a comparison of top vendors, and more.

  • CIO Insight: Why Mobile Threat Defense

    Sponsored by: Lookout

    According to a study from Lookout Inc., there was in a 37.1% increase in mobile phishing from Q4 of 2019 to Q1 of 2020. Statistics like this one solidify the need for mobile device security today. Tap into this data sheet to reveal more mobile threat stats from 2020.

  • Threat Intelligence Report: RSA Conference Edition 2020

    Sponsored by: Mimecast

    The Mimecast Threat Intelligence Report: RSA Conference Edition provides a comprehensive analysis of the key findings, trends and recommendations observed by Mimecast’s Threat Center team from October to December 2019. Download the report to discover their results – such as the rise of significant cyberattack campaigns by 145% over last quarter.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.