Blog Posts Tagged with "APT"


Security in Operational Technology: Five Top Trends in 2018

January 05, 2018 Added by:Jalal Bouhdada

Top five security trends to watch for in 2018

Comments  (0)


Advanced Threat Protection Technologies Beyond Marketing

September 07, 2016 Added by:Roy Samson

The right Advanced Threat Protection technology choices depend on your current and target IT architecture. It is also important not to be tempted to base your decision for a specific security product owing to a small unique ‘sales/marketing’ feature.

Comments  (0)


Back to Basics: How Simple Techniques Can Thwart Complex APT Attacks

August 11, 2016 Added by:Avishai Wool

Professor Avishai Wool, CTO and Co-Founder of AlgoSec, discusses how organizations’ basic network structure can help or hinder APT attacks.

Comments  (0)


How Can you Expose Targeted Attacks and Combat APTs?

October 10, 2013 Added by:Michelle Drolet

Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don’t have the protection they really need to safeguard their systems. The prevalence of targeted attacks and advanced persistent threats (APTs) is disturbing.

Comments  (0)


New Training Model for Advanced Persistent Threat Detection and Mitigation

June 28, 2013 Added by:Edwin Covert

Organizations face a new threat to their information systems and intellectual property: advanced persistent threats, or APT. In order to detect and mitigate these attacks, organizations must develop a cyber-security capability that allows them to defend themselves.

Comments  (0)


Three New Podcasts: Security Conversations - A Podcast With Ryan Naraine

March 04, 2013 Added by:Infosec Island

In these three new episodes of the Security Conversations Podcast, Ryan Naraine interviews Adobe's David Lenoe on Frustrations With "Partial Disclosure", Securosis CEO Rich Mogull on Mandiant's APT1 Report and Advanced Threat Actors, and Sourcefire's Yves Younan on Tracking 25 Years of Vulnerability Data.

Comments  (0)


So APT Is China *snicker* Now What?

February 28, 2013 Added by:Krypt3ia

As RSA comes to a close and the corridors of the hall stop ringing with the acronym APT, I find myself once again looking at the problem as opposed to the hype.

Comments  (0)


China's PLA Behind Massive Cyber Espionage Operation

February 19, 2013 Added by:Mike Lennon

In a fascinating, unprecedented, and statistics-packed report, security firm Mandiant made direct allegations and exposed a multi-year, massive cyber espionage campaign that they say with confidence is the work of China.

Comments  (0)


Opinion: Recent ISACA Study Adds Fuel to the APT Fire

February 18, 2013 Added by:Steve Ragan

Most of the time, attacks considered APTs use 0-Day exploits, or malware that slips past poorly updated AV software, or phishing to compromise a host or organization. There is nothing advanced about attacks like these...

Comments  (0)


New York Times Says It Was Infiltrated By Chinese Hackers

January 31, 2013 Added by:Infosec Island

The New York Times said it had fallen victim to hackers possibly connected to China's military, linking the sophisticated attacks to its expose of the vast wealth amassed by Premier Wen Jiabao's family.

Comments  (0)


Resource: Defeating Advanced Persistent Threat Malware

January 29, 2013 Added by:Infosec Island

Attacks can come from anywhere. Even more daunting is that not all malware is alike. Learn about battling advanced threats and the progressive strategies to battle malware from this new white paper.

Comments  (0)


Advanced Persistent Threats: Separating the Unicorns from Reality

July 14, 2012 Added by:Rafal Los

APT - Advanced Persistent Threat has been the nervous topic for a long time now in Information Security. While there is a metric ton of misinformation and confusion about what constitutes an Advanced Persistent Threat, the thrust seems to be that once you're a target, you're a victim...

Comments  (0)


APT Detection with IOCs: The New Maginot Line

March 18, 2012 Added by:Pascal Longpre

IOCs can also be easily circumvented by the attackers by using dormant backdoors created by different actors and using completely different techniques. Creating a simple backdoor that spawns a reverse shell to the attacker’s system requires limited skills, time and money...

Comments  (0)


How FUD Defends Against APT

March 08, 2012 Added by:J. Oquendo

We placed computers in the environment of our critical infrastructure that are responsible for the things like water, power, communications - but we never engineered security into the equation. We are looking at a magnificent attack in the next couple of months, even days or hours...

Comments  (1)


McAfee Report: No Immunity from Targeted Attacks

February 22, 2012 Added by:Headlines

“The threat landscape continued to evolve in 2011, and we saw a significant shift in motivation for cyber attacks. Increasingly, we’ve seen that no organization, platform or device is immune to the increasingly sophisticated and targeted threats..."

Comments  (0)


Why Data Leaks

February 13, 2012 Added by:Danny Lieberman

The main reason is people. People handle electronic data and make mistakes or do not follow policies. People are increasing conscious that information has value – all information has some value to someone and that someone may be willing to pay...

Comments  (0)

Page « < 1 - 2 > »
Most Liked