NOMINATIONS NOW OPEN

Russian Underground 101

Russian Underground 101

This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.

Download Whitepaper
Related Whitepapers
Thanks for downloading Russian Underground 101. Here are some other white papers that we feel may be of interest to you given your recent download:
  • Despite a plethora of network security and monitoring tools, detecting and responding to cyberthreats are increasingly challenging tasks. The very nature of corporate networks and the way in which security tools are deployed put IT teams at a clear disadvantage. The corporate network is no longer a static, well‐defined entity that can be adequately protected with an armory of perimeter‐based security tools. Instead, it’s an amorphous, dynamic entity that extends well beyond the four walls of the data center. Technologies such as cloud computing, virtualization, and mobile computing add to the complexity. Meanwhile, IT teams must shoehorn security tools into the network infrastructure and hope that their limited view of traffic will be enough to expose the low‐and‐slow activity that’s characteristic of advanced threats. But as long as there are blind spots on the network, there’s a chance that malicious activity is going undetected. IT organizations need a new approach that enables visibility across the entire IT infrastructure, including physical, virtual, and cloud environments. They need a security delivery platform. Download whitepaper »

  • The University of Glasgow needed to scale its IDS platform to secure its 30,000 users, who were generating tens of gigabits of internet traffic. Port mirroring was limited by a single interface on the router and load balancing was needed across multiple IDS servers. Download whitepaper »

  • With technology supply chains rapidly evolving to all corners of the globe, doors continually open for unsavoury elements to find new ways to take advantage. Whether for personal gain, monetary gain, criminal activity, espionage, or military threat, black hats keep unearthing opportunities to exploit supply chain vulnerabilities. Download whitepaper »

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place