Corporate Partners

Russian Underground 101

Russian Underground 101
This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.
Download Whitepaper
Related Whitepapers
Thanks for downloading Russian Underground 101. Here are some other white papers that we feel may be of interest to you given your recent download:
  • The explosion of file-based unstructured data is creating a number of new challenges for organizations in terms of both storage asset growth and efficient data management. This whitepaper examines these challenges and the solutions. •Rapid growth in file-based information within organizations is exposing the weaknesses of existing IT management practices for file-based storage •Main challenges are inefficient storage, time and expense for data migration and increased uncertainty •Asset consolidation and improved file availability/disaster recovery are the two overarching themes are shaping organizations' investment in file based storage Download whitepaper »

  • Akamai Technologies&#39; Security Intelligence Team monitors various news sources, data feeds, and the communications channels of various chaotic actors on the Internet to find issues that affect organisations, such as outages, data breaches, defacements, and Distributed Denial of Service attacks.</p> <p> Download the latest infographic from Akamai Technologies, which highlights the results of DDoS Web Security survey conducted by <a href="http://cso.com.au" target="_blank">CSO Custom Publishing group</a>.</p> For more information, please visit <a href="http://www.akamai.com" target="_blank">www.akamai.com&nbsp;</a></p> <script type='text/javascript'> var axel = Math.random() + ''; var a = axel * 10000000000000; document.write('<img src="http://pubads.g.doubleclick.net/activity;dc_iu=/1576/DFPAudiencePixel;ord=' + a + ';dc_seg=33542410?" width=1 height=1 border=0/>'); </script> <noscript> <img src="http://pubads.g.doubleclick.net/activity;dc_iu=/1576/DFPAudiencePixel;ord=1;dc_seg=33542410?" width=1 height=1 border=0/> </noscript> Download whitepaper »

  • F5 Networks commissioned Forrester Consulting to examine the total economic impact and potential return on investment enterprises may realise by deploying its BIG-IP security solutions. This whitepaper highlights the results of the study. •Interviews were conducted with four existing customers of the BIG-IP products from F5 •Consumer products manufacturing companies experienced a risk-adjusted ROI of 537% •Benefits are seen in eliminating standalone firewalls, securing the migration to BYOD, avoiding outages during DDOS attacks and reducing costs Download whitepaper »

Market Place