ransomware attack

Results 26 - 50 of 66Sort Results By: Published Date | Title | Company Name
Published By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, ransomware, confidential, networks
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, learning
    
MobileIron
Published By: Comcast Business     Published Date: Apr 13, 2017
Of all the industries targeted by cyber-attackers, financial services is one of the most attractive. As noted bank robber Willie Sutton once said, “Go where the money is … and go there often.” That, it seems, is what cybercriminals are doing, launching malware, Trojans, spear phishing and ransomware attacks at banks and institutions to compromise networks and gain access to valuable data. Download now!
Tags : 
    
Comcast Business
Published By: CrowdStrike     Published Date: Aug 01, 2017
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShellattacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn:?Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more?The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model ?How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent attacks
Tags : 
    
CrowdStrike
Published By: Mimecast     Published Date: Dec 29, 2016
Cybercriminals constantly engage organizations in a game of leapfrog: system defenses improve, so malware searches for new holes. Recently, ransomware, which has been around since 1989, has been gaining momentum. Download this Mimecast sponsored report to learn about this growing threat, its impact to organizations and the ways to help thwart an attack.
Tags : 
mimecast, security, ransomware, cybersecurity
    
Mimecast
Published By: Proofpoint     Published Date: Dec 21, 2018
If you’re like most IT leaders, you’re invested heavily in the latest security tools. Yet you’re still inundated with ransomware and other advanced malware, credential phishing, email fraud and more. You’re spending more time dealing with a growing volume of threats. And you’re seeing a shrinking return from your security investments. That’s because most of today’s attacks play off human weaknesses. Download this whitepaper today to find out the top tips on how to choose tools and solutions to improve behaviours and outcomes.
Tags : 
    
Proofpoint
Published By: Mimecast     Published Date: Apr 18, 2017
"Cybercriminals constantly engage organizations in a game of leapfrog: system defenses improve, so malware searches for new holes. Recently, ransomware, which has been around since 1989, has been gaining momentum. Download this Mimecast sponsored report to learn about this growing threat, its impact to organizations and the ways to help thwart an attack."
Tags : 
ransomware, cyber security, mimecast, fraud protection
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"It’s no secret that organizations find themselves the target of increasingly sinister and highly sophisticated phishing, spear-phishing, whaling and ransomware attacks. While risks are clearly mounting, many organizations still aren’t keeping up with the challenge. Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of today’s cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : 
email security, ransomware, phishing, whaling, security strategy
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
Cybercriminals constantly engage organizations in a game of leapfrog: system defenses improve, so malware searches for new holes. Recently, ransomware, which has been around since 1989, has been gaining momentum. Download this Mimecast sponsored report to learn about this growing threat, its impact to organizations and the ways to help thwart an attack.
Tags : 
ransomware, mimecast, security, cyber attacks
    
Mimecast
Published By: LogRhythm     Published Date: Aug 08, 2016
Over the past three years, ransomware has jumped into the spotlight of the cyber threat landscape. Kaspersky Lab reports that in 2015, its solutions detected ransomware on more than 50,000 computers in corporate networks—double the figure for 2014. Even at this rate of detection, Kaspersky admits that the real number of incidents is several times higher than what has been detected and reported.1 In just the first quarter of 2016, $209 million was paid out to cyber criminals using ransomware. The FBI estimates that losses to be incurred in 2016 due to ransomware will top $1 billion.2 Once again, this is just the tip of the iceberg.
Tags : 
security, technology, best practices, information technology
    
LogRhythm
Published By: Veeam '18     Published Date: Dec 04, 2018
"Ransomware is top of mind for many organizations’ leaders as their organizations face the potentially disastrous aftermath of successful attacks. ESG has surveyed IT leaders and organizations to find out how big of a problem ransomware is, what are the business consequences of downtime caused by these attacks, and which are some of the best practices and capabilities organizations need to apply to be protected. According to the ESG research, nearly two-thirds of surveyed organizations across North America and Western Europe experienced a ransomware attack at some point last year, with 22% reporting weekly attacks. The attacks have helped make cybersecurity a target of IT investment, and spending is accelerating. What’s needed to fend off this epidemic are best practices and tools to: Prevent or at least mitigate attacks Protect data and backup data Recover reliably"
Tags : 
    
Veeam '18
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Ransomware is one of the biggest nightmares facing IT today. Hackers are targeting organizations of all kinds with malware designed to encrypt crucial data—and hold it hostage until payment is made. This white paper reveals four highly effective measures for reducing your exposure to ransomware and keeping your apps and data accessible to authorized users—not hackers and their clients. Download this white paper to learn how to: - Shield users of web apps from infection and keep sensitive data off the endpoint - Prevent email-born ransomware from compromising the endpoint - Protect mobile devices against attack - Ensure the rapid recovery of ransomware-encrypted data"
Tags : 
    
Citrix Systems
Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!
Tags : 
security, ransomware, spyware, malware, theft, it threat
    
Lenovo and Intel®
Published By: BitSight Technologies     Published Date: Sep 26, 2016
Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Read this BitSight Insights report to learn: - How the rate of ransomware infections has grown over the past year - Which industries have exhibited the most ransomware infections - How businesses can directly mitigate the threat of ransomware infections, as well as infections originating from third party vendors and suppliers
Tags : 
bitsight, cyber crime, cyber attacks, ransomware, cyber security, security
    
BitSight Technologies
Published By: LogRhythm     Published Date: Apr 04, 2017
Is your organization prepared for a ransomware attack? Successfully defending your organization against such an attack takes preparation and an understanding of what to look for if an attack begins. This guide shares the expert knowledge that researchers at LogRhythm have gathered about how ransomware attacks begin, how they progress through your endpoints and network, and what you can do to prevent them, or at least shut them down, to avoid serious repercussions.
Tags : 
    
LogRhythm
Published By: LogRhythm     Published Date: Apr 04, 2017
Download this infographic to learn about the 5 phases of a Ransomware Attack
Tags : 
    
LogRhythm
Published By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Damaging widespread attacks such as WannaCry provide grim reminders of how prevalent Ransomware attacks have become. Adversaries are not only launching Ransomware attacks against a wide range of industries, they are consistently evolving their tools, tactics and procedures (TTPs) to foil your organization’s best cybersecurity strategies. A white paper, “Ransomware, a Growing Enterprise Threat,” offers in-depth analysis of Ransomware and explains why organizations can’t afford to ignore this increasingly challenging cyber threat. Download this white paper to learn • The evolution of Ransomware and why businesses are being targeted more frequently • How perpetrators tactics and targets are evolving to maximize profits • Best practices for protecting your organization from becoming a victim of Ransomware
Tags : 
    
CrowdStrike
Published By: Carbonite     Published Date: Feb 22, 2017
Refuse to surrender to cybercriminals—learn the best ways to prevent a ransomware infection, and what you can do in the event of an attack.
Tags : 
backup and recovery, business backup, cloud backup, computer backup, hybrid backup, data backup, data protection, data recovery, disaster recovery, hacker, computer hacking, malware, ransomware, ransomware attack, ransomware defense, ransomware infection, ransomware preparedness, ransomware prevention, ransomware protection
    
Carbonite
Published By: Proofpoint     Published Date: May 17, 2017
In this complimentary guide you will learn why ransomware is surging and what to do before, during, and after an attack.
Tags : 
proofpoint, ransomware, intrusion prevention, cyberattack, data protection
    
Proofpoint
Published By: Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
Cylance
Published By: Druva     Published Date: Aug 03, 2016
Ransomware has quadrupled since last year and it is estimated to be reach $1B this year. Gartner Research has outlined best practices to better prepare you for an attack and uncovers how modern backup technologies can help.
Tags : 
druva, gartner, best practices, technology, backup
    
Druva
Start   Previous    1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: