NOMINATIONS NOW OPEN

Russian Underground 101

Russian Underground 101

This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.

Download Whitepaper
Related Whitepapers
Thanks for downloading Russian Underground 101. Here are some other white papers that we feel may be of interest to you given your recent download:
  • Organisations also now face exploding volumes of newer and more sophisticated threats because malware and ways to exploit it are now readily available in online marketplaces. There is a very real hacker-enablement supply chain in both the dark web and traditional outlets that readily shares basic hacking tools and code, allowing many more cyberthieves to execute successful attacks. In addition, hackers are now less often individual “geeks” and more likely to be well-funded technology experts supported by organized crime or even governments. This trend, combined with ever-increasing network speeds, means that stopping cyber attacks is now a big data problem that stands to overwhelm older network protection technologies. Download whitepaper »

  • Cyber security breaches are happening at an industrial scale. The unabated volume of cyber breaches along with the scale and magnitude of the breaches is forcing the entire industry to re-think how cyber security gets deployed, managed and addressed. At the heart of this change is a fundamental shift in the assumptions and the model under which cyber security has been operating. Download whitepaper »

  • The digital transformation of enterprises today is seeing IT organizations grapple with many disruptive transitions, initially brought on by cloud computing and mobility. Easy access to public cloud-hosted services has allowed line-of-business (LOB) managers and even end users to make decisions on how they procure IT, the mobile devices that they use to access services, and where they work. Download whitepaper »

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place