Russian Underground 101

Russian Underground 101

This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.

Download Whitepaper
Related Whitepapers
Thanks for downloading Russian Underground 101. Here are some other white papers that we feel may be of interest to you given your recent download:
  • Adversaries have more tools at their disposal than ever before. They also have a keen sense of when to use each one for maximum effect. The explosive growth of mobile endpoints and online traffic works in their favor. They have more space in which to operate and more choices of targets and approaches. This report is divided into the following sections: Attacker Behavior Defender Behavior Industry Cisco 2017 Security Capabilities Benchmark Study Download whitepaper »

  • Cloud, mobility, Internet of Everything (IoE), and social media technologies, combined with digital business practices, have helped countless organisations transform how they operate. But they have also increased the attack surface. Old methods of cybersecurity that focus on perimeter defense are no longer enough to keep an organisation safe. Organisations recognise that cyber attacks will be launched against them. But by adopting cyber resilient architectures and business processes, they can shift from a reactive to proactive state and tackle cyber risks with confidence. This paper: • Defines cyber resilience • Outlines its major benefits • Describes the seven major system capabilities of a cyber resilient enterprise Download whitepaper »

  • Securing Your Network with the Cisco Stealthwatch Visibility Assessment As networks grow larger and more complex, organisations struggle to protect themselves from increasingly sophisticated threat actors. Attacks often go undetected or unreported for months. To detect and mitigate security risks, you need to be able to see what is taking place on your networks. Download whitepaper »

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release