<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1018517621595528&amp;ev=PageView&amp;noscript=1">

Resources

Helpful go-to security tools, tips, research, and guides.

Whitepapers

The Last Line of Prevention: Runtime Malware Defense  Block malware by recognizing behavior at runtime.

Data Sheets

Barkly vs. Next-Generation Antivirus  Why pre-execution defense isn’t enough.

Videos

Barkly blocks a fileless ransomware attack  Watch Barkly block an attempt to spread ransomware via PsExec.

Barkly blocks new Locky variant   See Barkly in action against Diablo6, the latest variant of Locky ransomware.

Barkly blocks Emotet trojan  See Barkly block a macro-based attack.

Barkly blocks WannaCry  See Barkly in action against WannaCry ransomware.

Barkly blocks clickless PowerPoint malware  Watch Barkly block malware that exploits PowerPoint's mouseover function.

Barkly blocks Cerber  See Barkly in action against Cerber ransomware.

Barkly blocks macro-based malware  See how Barkly blocks macro-based attacks.

Barkly blocks QakBot banking trojan  See Barkly block one of the most advanced banking trojans currently active .

Barkly blocks Defray ransomware  See Barkly in action against Defray ransomware.

Barkly blocks Dharma  See Barkly in action against Dharma ransomware.

Barkly blocks Fireball  See Barkly in action against Fireball adware.

Barkly blocks Amnesia  See Barkly in action against Amnesia ransomware.

Barkly blocks Dridex  See Barkly in action against the Dridex banking trojan.

Barkly blocks Spora  See Barkly in action against Spora ransomware.

Barkly blocks Ursnif (Gozi)  See Barkly in action against the Ursnif (aka Gozi) banking trojan.

Barkly blocks Satan  See Barkly in action against Satan ransomware.

Barkly blocks Revenge  See Barkly in action against Revenge ransomware.

Barkly blocks Zepto  See Barkly in action against Locky variant Zepto.

Barkly blocks AES-NI  See Barkly in action against AES-NI ransomware.

Barkly blocks Mimikatz  See Barkly block malware that antivirus doesn’t.

Guides

The Complete Guide to Ransomware  Everything you need to know about security's new #1 threat.

The Complete Guide to Runtime Malware Defense  Learn what it takes to stop attacks that antivirus can't see.

Phishing Emails: A Field Guide  Train your users to stop taking the bait.

The Open Source Cybersecurity Playbook  Build a solid game plan for preventing cyber attacks and data theft.

Ransomware Protection 101  A prescriptive guide for hospitals and healthcare providers.

IT Pro's Guide to Endpoint Protection  Understand your options and pick the best approach for you.

Research

How Fast Does Ransomware Encrypt Files?  See what happens when our researchers put ransomware on the clock.

Cyber Attack Statistics  71% of companies targeted with ransomware were infected.

Stopping PowerShell Attacks that Bypass Antivirus  Even the smallest changes to a script are enough to avoid detection.

2016 Cybersecurity Confidence Report  See how your priorities, needs, and concerns match up with 350 IT pros.

Barkly Malware Chat  Encrypting files was only the beginning. Ransomware is growing up.

Lessons from Ransomware Victims  “The thought of getting hit again freaks me out daily.”

New Malware Alert  A new strain of fileless Kovter malware is posing as a Firefox update.

Tools

stackhackr  Can your company be hacked? Test your security with our free malware simulation tool.

Ransomware Risk Assessment  How vulnerable are you to ransomware attacks? Find out now.

Ransomware Decryption Tool Finder  Unlock encrypted files without paying a cent.

Security Awareness Office Posters  Keep your users mindful of the horrors of careless clicking.

eBooks

2017 Malware Trends in Review  How attacks are evolving and what to expect next.

The True Cost of Ransomware  5 companies, 5 attacks, and the reality of recovery.

Endpoint Protection Buyer's Guide  The information you need to make evaluating and buying endpoint security easy.

The Ransomware Survival Handbook  Instructions for preventing, responding, and recovering from an attack.

The Amazing Security Awareness Playbook  Make user training engaging, practical, and actually effective.

Cybersecurity Made Simple: A Getting Started Guide  A clear, step-by-step process for you take control of your security.

The Realist's Guide to Cybersecurity Awareness  Tips from industry experts for engaging and empowering employees.