Resources

JOIN THE HUNT

To support the release of F-Secure Rapid Detection & Response (RDR), we’ve launched an exciting new campaign called The Hunt. The campaign features stylized stories inspired by real cyber incidents encountered by our consultants and incident response experts.

A CYBER ATTACK IN THE PROCESS INDUSTRY.

In manufacturing, 86% of cyber attacks are targeted.
66% feature hacking, only 34% malware
Almost half (47%) of breaches involve the theft of intellectual property to gain competitive advantage
53% of the attacks are carried out by stateaffiliated actors, 35% by organized crime

HOW TO FIGHT AGAINST CYBER ESPIONAGE?

Cyber espionage is a growing concern for our businesses and societies alike. Some foreign states are pursuing offensive cyber capabilities to steal valuable intellectual property, among many other harmful actions. How can cyber espionage affect the global market in the long-term, and what can we do to stop it?

STAY ONE STEP AHEAD OF THE CRIMINAL MIND

Low Tech + High Tech always wins – Red Teaming by F-Secure

Tom Van de Wiele, a member of the Cyber Security Services team from F-Secure delivers detailed, yet simple to understand insights into the mindset of a hacker. “Knowing what the risk is, is extremely important in order to make the right business decisions… But we have no hope in protecting ourselves if we don’t know who we are up against…”

F-SECURE HACKING CHALLENGE

In this hacking challenge, an attacker tries to infiltrate a company network using real tools and data. In the first hacking attempt, the defender is using basic antivirus and monitoring tools. In the second attempt, the defender also has a team of cyber security experts from F-Secure Rapid Detection & Response Service (RDS) supporting him. Will the defending company be able to prevent the hacker from accessing their data?