Report a Confirmed or Potential Breach? Call  +1 770-870-6343
0 Results Found
            Back To Results
              Login
              Reports

              Secureworks State of Cybercrime Report 2018

              The Deep, Dark Truth Behind the Underground Hacker Economy

              Sophisticated, organized criminal groups are quietly dealing most of cybercrime's damage each year, and they avoid the dark web where possible to evade detection by law enforcement and threat researchers.

              Ransomware is now more sophisticated than ever. Secureworks’ CTU researchers observed no less than 257 new and distinct ransomware families in 12 months.

              Secureworks Counter Threat Unit™ team uses sophisticated monitoring, surveillance and tracking to not only understand threat actors, but also their tactics and techniques. This deep knowledge drives the protections and advice Secureworks provides to clients. Over the past year, Secureworks has conducted original research to gain insight into threat activity and behavior across 4,400 companies. Their findings are captured in Secureworks State of Cybercrime Report 2018.

              In this report you’ll learn

              How the robust underground hackers marketplace drives a high volume of low-level criminal activity, making everyone a target.

              How cybercrime is constantly evolving with threats such as ransomware, banking malware and business email compromises taking on new forms and functions.

              Why we must pay closer attention to the increasingly blurred boundary between nation-state and cybercriminal actors using highly targeted techniques.


              You'll also learn more about:

              • Cryptocurrency mining, cryptocurrency applications and reasons for its continued use amongst criminals.
              • Advanced social engineering and network intrusion techniques with point-of-sale (POS) malware.
              • Common techniques used by both sophisticated and low-level cybercriminals to gain access to individuals and systems while staying under the radar.

              Like what you're reading?
              Just a few questions to get started

              Select Role:

              • Board of Directors
              • CEO / CFO / COO
              • CISO / CSO
              • CIO / CTO
              • IT / IS / Security VP/Director
              • IT / IS / Security Manager
              • IT / IS / Security Staff
              • IT / IS / Non-Security
              • Risk / Legal / Compliance / Finance
              • Sales / Marketing
              • Press / Industry Analyst
              • Student

              Select Country:

              • Select an item

              Select State:

              • Select an item

              Select Annual Revenue:

              • ≥ $500M
              • $100-$499M
              • ≤ $100M

              Select Industry:

              • Banking
              • Business Services
              • Credit Union
              • Education
              • Finance
              • Government
              • Health Care (Non-Hospital)
              • Heavy Industry
              • Hospitality
              • Hospitals
              • Insurance
              • Legal
              • Manufacturing
              • Media
              • Membership Organizations
              • Retail
              • Technology
              • Telecom
              • Transportation
              • Utilities
              • Other

              Current Security Environment?:

              • Managing In-House
              • Managing Externally (3rd Party)
              • Blended Model (In-house and 3rd Party)
              • Not sure

              Select Next Security Initiative Timeframe:

              • 0-3 months
              • 3-6 months
              • 6-12 months
              • 12-24 months

              Select Our Greatest Security Challenge:

              • Securing The Cloud
              • Assessing security posture
              • Optimizing Security Operations
              • Protecting critical assets
              • Meeting & maintaining compliance
              • Preventing a data breach
              • Access to actionable security intelligence
              • Access to security expertise
              • Preparing & responding to an incident

              Interested in learning more

              Currently Looking for Assistance With (Select all that Apply)

              Select Best time to call:

              • Early morning (8-10am EST)
              • Late morning (10am-12pm EST)
              • Early afternoon (12-3pm EST)
              • Late afternoon (3-5pm EST)

              Secureworks News :

              Related Content