New report reveals cybercrime's growing threat to national security
By: Google View more from Google >>
Download this next:
103-page Report: Cybersecurity Takeaways and Tips
By: Checkpoint Software Technologies
Type: Research Content
Throughout 2024, forecasts Pete Nicoletti, Field CISO for Americas at Check Point Software Technologies, “AI-based tools will be used by cyber criminals to steal financial resources.”
Along with delving into that prediction, the Check Point 2024 Cyber Security Report provides insights from 2 other CISOs and breaks down:
- A timeline of cyber events from 2023
- 5 noteworthy security trends
- Descriptions of over 40 malware families
- And more
Keep reading to access the full report.
These are also closely related to: "New report reveals cybercrime's growing threat to national security"
-
Cyberthreat Predictions for 2025
By: Fortinet, Inc.
Type: Essential Guide
While threat actors continue to rely on many “classic” tactics that have existed for decades, Fortinet’s threat predictions for the coming year primarily focus on cybercriminals embracing bigger, bolder, and - from their perspectives - better attacks.
This year’s threat predictions report examines how long-term cyberattack trends evolve, shares emerging threats to watch for in 2025, and more. Here’s a look at how Fortinet expects the threat landscape to change in the coming year and beyond and how these shifts will impact organizations and their security teams.
-
2023 recommendations to combat ransomware & extortion
By: Palo Alto Networks Unit42
Type: eBook
While much attention has been paid to ransomware in recent years, modern threat actors increasingly use additional extortion techniques to coerce targets into paying—or dispense with ransomware altogether and practice extortion on its own.
And as bolder ransomware attacks target more than just vital infrastructure and corporate data, incident response plans today need to involve not only technical considerations but also safeguards for an organization’s reputation and considerations for how to protect employees or customers who may become targets for some of extortionists’ more aggressive tactics.
Download this e-book to access executive recommendations from Unit42 to address the concerns of rising extortion and prepare yourself for the worst.
Find more content like what you just read:
-
Cyber Security: 2021 Worst in Show
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
-
Navigating the Evolving Threat Landscape - Resilient Cybersecurity Tactics for CISOs
By: Palo Alto Networks
Type: eBook
In this e-book, discover the 3 essential resilient cybersecurity tactics the modern CISO needs to know, and find out how your organization stacks up against today’s most advanced threat actors.
-
UNIT 42 Managed Services Threat Report Summary
By: Palo Alto Networks
Type: Research Content
The MITRE Engenuity Unit 42 team identified a sophisticated attack involving APT10 and BlackCat groups. The report details the attack vectors, malware analysis, and recommendations to enhance your security posture. Read the full report to understand the impact and mitigate the risk of similar attacks.
-
Exploring the real-world misuse of generative AI by threat actors
By: Google
Type: White Paper
This white paper explores how government-backed threat actors misuse generative AI, like Google's Gemini. It shows AI boosts productivity but hasn't enabled new attack methods. The report examines usage patterns in various countries and offers insights into emerging AI threats. Read the full white paper for detailed findings and analysis.
-
Cyber security in the Nordics
By: TechTarget ComputerWeekly.com
Type: eGuide
With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.
-
Counter-strategy: How to conquer APT-style attacks
By: Dimension Data
Type: eGuide
In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.
-
In 2017, the insider threat epidemic begins
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.
-
Venafi Study: Machine Identities Drive Rapid Expansion of Enterprise Attack Surface
By: Venafi & Intel
Type: White Paper
Digital transformation strategies have led to an explosion of machines needing unique identities to connect securely. Read this study to learn why SSL/TLS, SSH and code signing machine identities so appeal to cybercriminals—and how an enterprise-wide machine identity management solution can stop them.
-
Demystifying Initial Access Brokers (IABS) and Their Links to Ransomware
By: Outpost24
Type: White Paper
This white paper examines the role of Initial Access Brokers in cybercrime, detailing how they obtain and sell corporate network access to ransomware groups. It analyzes access sales on forums, pricing trends, and the relationship between IABs and ransomware operators. Read the full white paper to understand this critical cybersecurity threat.
-
The Gig Economy Behind Ransomware
By: Bitdefender
Type: White Paper
This white paper explores the rise of ransomware-as-a-service and the gig economy behind it, examining the economic forces driving cybercrime, the specialized roles involved, and the challenges in combating these sophisticated attacks. Read on now to learn more about the ransomware ecosystem and how to protect your organization.
-
GRIT 2025 Ransomware & Cyber Threat Report
By: GuidePoint Security
Type: Research Content
This comprehensive report analyzes the evolving ransomware and cybercrime threat landscape in 2024. It covers key trends, industry impacts, vulnerability analysis, and case studies. Learn how to improve post-compromise detection and stay ahead of these persistent threats. Read the full report.
-
Latest cybersecurity trends: Rise of RansomHub and new attack vectors
By: ESET
Type: Analyst Report
This threat report examines key cybersecurity trends in H2 2024, including the rise of RansomHub as the leading ransomware-as-a-service, a surge in cryptostealers, and new mobile phishing tactics using PWAs. It also covers infostealer landscape shifts and emerging scams targeting online bookings. Read the full report for comprehensive insights.
-
Top five threat trends influencing the security strategies of software companies
By: Amazon Web Services
Type: Infographic
While all the usual attack vectors are in play, there are some big trends shaping the threat landscape that impact an organization's ability to protect their data and operations long term. To dive deep into the top five, download this infographic.
-
Top five threat trends influencing the security strategies of software companies
By: AWS
Type: eGuide
While all the usual attack vectors are in play, there are some big trends shaping the threat landscape that impact an organization's ability to protect their data and operations long term. To dive deep into the top five, download this infographic.
-
Computer Weekly 4 August 2020: The UK's $500m space technology gamble
By: TechTarget ComputerWeekly.com
Type: eGuide
In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.
-
Computer Weekly 4 August 2020: The UK's $500m space technology gamble
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.
-
Exploring the 2024 security landscape and emerging threats
By: Core BTS
Type: White Paper
This white paper examines the evolving cybersecurity landscape, including AI-powered attacks, supply chain vulnerabilities, and IoT security challenges. It outlines key trends, best practices, and industry-specific concerns. Read on to gain insights into the future of cybersecurity and learn how you can strengthen your security posture.
-
CW Nordics ezine February 2018
By: TechTarget ComputerWeekly.com
Type: Ezine
In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.
-
Inside 2024 threat trends & defense tactics for 5 ransomware variants
By: Arctic Wolf
Type: Research Content
Ransom demands are increasing 20% year-over-year, “Artic Wolf Labs Threat Report 2024” finds, rising to a staggering $600,000 USD. How can you defend your business against that dangerous trend? And what other threats should you watch out for in the cyber landscape? Dig into the report to unlock insights.
-
Hacking the Human Operating System
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
-
Zscaler ThreatLabz Phishing Report reveals evolving threats
By: Zscaler
Type: Research Content
Zscaler's Phishing Report analyzes the surge in AI-fueled phishing attacks, including vishing, deepfakes, and browser-in-the-browser tactics. Discover the latest phishing trends, targeted industries, and effective security measures to stay ahead of this evolving threat. Read the full report.
-
Cybersecurity predictions and forecasts for 2025
By: Google
Type: White Paper
The Cybersecurity Forecast 2025 report provides forward-looking insights on AI-powered threats, ransomware, cloud security, and more. Inside, you'll gain expert insights on how defenders must adapt to evolving challenges in the year ahead. Read on now to understand the critical cybersecurity trends that will shape 2025.
-
Cybersecurity forecast 2025
By: Google Cloud
Type: White Paper
The Cybersecurity Forecast 2025 report offers insights from Google Cloud security leaders on emerging threats and trends. Topics include AI's impact, state actors, ransomware, cloud security, and compliance challenges. This analysis helps organizations strengthen their cybersecurity posture. Read the full white paper to prepare for threats.
-
A Computer Weekly buyer's guide to artificial intelligence in IT security
By: TechTarget ComputerWeekly.com
Type: eGuide
Artificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.
-
A Computer Weekly buyer's guide to artificial intelligence in IT security
By: TechTarget ComputerWeekly.com
Type: eGuide
Artificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.
-
Shields up! Why Russia's war on Ukraine should matter to security pros
By: TechTarget ComputerWeekly.com
Type: eBook
The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.
-
Computer Weekly - 26 July 2022: Inside Russia's Ukraine information operations
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we get the inside track on Russia's disinformation operations attempting to spread propaganda and cyber threats about the invasion of Ukraine. Our new buyer's guide looks at customer and employee experience management. And we assess 10 top Kubernetes backup suppliers. Read the issue now.
-
Ransomware Weather Report - July 2021
By: TechTarget ComputerWeekly.com
Type: eGuide
In this infographic: We take a look at the worldwide Ransomware landscape from the past 12 months. We will be diving into which areas of the globe have been affected the most, which times of year attacks are most likely to happen and which hackers and groups have been causing most of the trouble.
-
Ransomware Weather Report - July 2021
By: TechTarget ComputerWeekly.com
Type: eGuide
In this infographic: We take a look at the worldwide Ransomware landscape in 2020 and 2021. We will be diving into which areas of the globe have been affected the most, which times of year attacks are most likely to happen and which hackers and groups have been causing most of the trouble.
-
Top MITRE ATT&CK techniques from criminal/APT groups
By: McAfee
Type: Research Content
Download McAfee’s latest threat report to uncover their findings on Sunburst malware and the SolarWinds supply chain compromise, top MITRE ATT&CK techniques from criminal/APT groups, and much more.
-
154-pg e-book: A guide to activating your cyber defense
By: Google
Type: eBook
By reading this e-book, you will understand how to activate your cyber defense with an intelligence-led approach. Read on now to learn how you can leverage threat intelligence, detection engineering, and coordinated incident response to maximize your Defender's Advantage and strengthen your cybersecurity posture.
-
Solving the 3 Most Impactful AD and Entra ID Group Management Challenges
By: One Identity
Type: White Paper
This white paper explores the top 3 challenges of managing Active Directory and Entra ID groups. Learn how to implement a group management lifecycle to improve security and mitigate these risks. Read the full white paper to learn more.
-
CW APAC: Buyer’s guide to SASE
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.
-
Computer Weekly - 31 January 2023: How the cost-of-living crisis is affecting IT
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we examine what the cost-of-living crisis means for IT leaders and tech professionals. We analyse what you need to consider when reversing systems out of the cloud and back on-premise. And Very Group's CIO talks about the post-pandemic challenges facing online retailers. Read the issue now.
-
Closing the Gaps in Your Ransomware Strategy
By: Intervision
Type: White Paper
As ransomware threats continue to surge, cybercriminals are using advanced tactics, which are crippling businesses. In fact, 66% of companies were hit in the past year, making it critical for organizations to have the right measures in place to combat them. Access this white paper to learn more.
-
Prevention first: Leveraging Cyber Threat Intelligence for Proactive Defense
By: ESET
Type: White Paper
This white paper explores the role of cyber threat intelligence in proactive defense strategies. It examines challenges, benefits of prevention-first approaches, and how ESET's Threat Intelligence solutions enhance security. Learn to leverage CTI for effective threat mitigation and risk reduction. Read the full white paper for insights.
-
Incident Response Report 2024: Insights to Strengthen Your Defenses
By: Palo Alto Networks
Type: Research Content
This Incident Response Report from Unit 42 by Palo Alto Networks provides insights into the latest threat actor tactics, techniques, and targets. Learn how to enhance your security posture, detect threats faster, and respond more effectively. Read the full report.
-
Incident Response Report 2024
By: Palo Alto Networks
Type: eBook
Download this e-book to learn how to empower your organization to proactively navigate cyber risks, strengthen security approaches, and respond to incidents with unmatched efficiency.
-
Targeted cyber attacks in the UK and Europe
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
-
CW Europe: December 2016 - February 2017
By: TechTarget ComputerWeekly.com
Type: Ezine
Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.
-
CW Benelux ezine February 2019
By: TechTarget ComputerWeekly.com
Type: Ezine
Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
-
Explore the latest insights on managing technology risks
By: Riskonnect
Type: eBook
As technology permeates every aspect of business, organizations face growing risks from cybercrime, compliance demands, and internal threats. This ebook explores a comprehensive technology risk management strategy to anticipate, manage, and respond to these risks and protect your digital assets. Read the full ebook to learn more.
-
CW APAC – July 2021: Trend Watch: Supply Chain Security
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, Computer Weekly looks at rise of supply chain attacks, the challenges that come with zero-trust security and attacks on the Covid-19 vaccine supply chain
-
CW Europe - September-November 2020: IT expertise in banks' boardrooms reduces risk, says European regulator
By: TechTarget ComputerWeekly.com
Type: Ezine
The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.
-
Bitdefender and Ferrari collaborate to enhance cybersecurity
By: Bitdefender
Type: Case Study
Bitdefender recently partnered with Ferrari to provide advanced threat intelligence, enabling faster detection and response to cyber threats. This case study highlights how Ferrari leverages Bitdefender's expertise to strengthen its cybersecurity posture and protect its iconic brand. Read the full case study now to learn more.
-
Explore the breadth and depth of modern data protection strategies
By: Hewlett Packard Enterprise
Type: White Paper
This white paper explores the evolving challenges of modern data protection against growing cyberthreats. Inside, you'll learn how to secure your data across edge, core, and cloud with comprehensive, consistent solutions. Download the white paper now to discover the benefits of modernizing your data protection strategy.
-
The public sector's guide to PAM
By: CyberFOX
Type: eBook
Cybercriminals target public institutions like schools and government agencies due to sensitive data and weak security. This e-book examines cybersecurity oversights, attack impacts, and how privileged access and password management solutions can reduce risks. Read the full e-book to learn how you can strengthen your organization's defenses.