Russian Underground 101

Russian Underground 101

This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.

Download Whitepaper
Related Whitepapers
Thanks for downloading Russian Underground 101. Here are some other white papers that we feel may be of interest to you given your recent download:
  • This online survey, conducted amongst 275 respondents in December 2015 and January 2016, found growing concern among both business executives and security practitioners about the overall security profile they face.Indeed, fully 65 percent of respondents said they were more, or much more, concerned about information-security threats than they were a year ago. Just 31 percent of respondents said they were about as concerned this year as last – and not one of the respondents said they were less concerned. Download whitepaper »

  • Gigamon commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Gigamon. The purpose of this study is to provide readers with a framework to evaluate the potential financial benefit of Gigamon on their organisations. Download whitepaper »

  • The Gigamon Visibility Fabric architecture can greatly assist in overcoming the security challenges faced when monitoring increasingly complex networks and the critical data dispersed across the infrastructure. With the ever-changing threat landscape, leveraging security tools to protect networks is not enough when the traffic they see is restricted by the lack of a unified visibility solution. The ability to monitor all traffic from across the network in real time is vital to identifying and mitigating present and future threats. Download whitepaper »

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place