Corporate Partners

Russian Underground 101

Russian Underground 101
This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.
Download Whitepaper
Related Whitepapers
Thanks for downloading Russian Underground 101. Here are some other white papers that we feel may be of interest to you given your recent download:
  • Malware is at such high levels that protecting an endpoint with traditional antivirus software has become a futile pursuit. Leveraging big data analytics and threat intelligence from users and technology partners worldwide, Webroot delivers real-time protection from our security cloud to recognize threats before the competition sees them coming. Download whitepaper »

  • Internet security challenges are asking some tough questions of organisations in APAC countries, finding that the region is facing a tough fight, which is in line with the situation in the rest of the world. Find out: •The wide variety of routes to respond to security threats used in APAC countries •The business technology trends seen across many organisations that have made security weaknesses more likely •Why and end-to-end, ‘always-on’ approach needs to be taken for the future Download whitepaper »

  • This white paper presents a best-practice case for creating a proactive security strategy against DDoS attacks – a more effective approach that does not involve a multiple layers. Find out: • Why going against the industry norm of multi-layer security may be the best choice • The most common of the more than 150 multi-dimensional DDoS attacks • How to find and address the weak links in your security Download whitepaper »

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place