Cybercrime tactics and techniques

Mwb ctnt 2019 state of malware final cover

Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance.
Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019.

View whitepaper
Malwarebytes logo
Date: 18 June 2019, 0:00 am   |   Provider: Malwarebytes USA   |   Size: 1.5 MB   |   Language: English
Keep Reading:
Thumb original idr infographic automation is essential for cyber resilience final july 2019  1

Why automation is essential for cyber resilience

Digital transformation makes today’s businesses more productive and more vulnerable to cyberattacks. Security professionals know that breaches are inevitable. To be successful, companies must establish cyber-resilient endpoints. Where do you turn when legacy approaches fail? In a word: Automation. ...

To the download
Thumb original malwarebytes cybercrime tactics and techniques

Cybercrime tactics and techniques: Q2 2018

A generally slow quarter reflects an overall lullin cybercrime, picking up where Q1 left off with cryptominers continuing to dominate, ransomware continuing to evolve through experimentation, and exploits making a small but significant comeback.

New developments in ransomware and cryptomining drove the market, as Q2 attacks generally showed more sophistication than their Q1 counterparts. The introduction of complex VPNFilter malware, which dropped multi-stage attacks on hundreds of thousands of unsuspecting small office and consumer users, ...

To the download
Thumb original replace your av ebook

Artificial Intelligence: The Smarter Approach To Information Security

The news headlines are replete with stories of devastating data breaches, compromising the personal and professional data of millions. Cyber attackers spare no industry, infiltrating the assets of even the most sophisticated technology adopters, in turn impacting their executives, employees, and perhaps worst of all — customers and users. All of which bag the question: What's going wrong?

The answer lies not in changing the motives of bad actors, but rather, in the advanced techniques that help them evade traditional methods of system protec ...

To the download
Thumb original bbcy forrester tei 2019   report

The Total Economic Impact™ Of CylancePROTECT® And CylanceOPTICS™

Employee endpoints are the interfaces between employees and the corporate data and applications they need to do their jobs. Attackers understand this — and actively target employee endpoints as well as the server endpoints hosting corporate data. More than 50% of companies experience a significant data breach each year, and endpoints, as a critical conduit for valuable corporate data, are the top targets for attack. Endpoint security solutions provide a critical line of defense, protecting PCs, laptops, and servers from malicious threats.

Cy ...

To the download
Thumb original ai driven edr   ebook

AI-Driven EDR - The Current and Future Path for More Intelligent Detection and Response

This e-book covers various topics related to artificial intelligence driven Endpoint Detection and Response (EDR).

Contents:

The State of Endpoint Insecurity
Smarter EDR
AI-Driven EDR Drives Better Business Outcomes
What's AI Got To Do With It Anyway?
Evaluating AI-Driven Security Solutions
Choose Prevention and Detection for Superior Protection ...

To the download