APT News, Articles and Updates

RSA 2013: Hackers will get in, so spend the money on pushing them out

By

With the rise of state-sponsored espionage and advanced persistent threats, security pros must divert their attention from deploying perimeter-focused security toward raising the cost for attackers once they're already inside.

IPS grows up

IPS grows up

By

The intrusion prevention system is a mainstay of any organization's perimeter-focused security infrastructure, but its days may be numbered as a standalone technology. Yet, its purpose lives on.

IPS grows up

IPS grows up

By

The intrusion prevention system is a mainstay of any organization's perimeter-focused security infrastructure, but its days may be numbered as a standalone technology. Yet, its purpose lives on.

The good, bad and ugly

The good, bad and ugly

While some instances of Stuxnet and Duqu found their way into seemingly unplanned locations, the majority of occurrences were localized to targeted systems.

Debate: Flame, Stuxnet and other APTs are hype, but still be wary

Debate: Flame, Stuxnet and other APTs are hype, but you should still be extremely worried.

Video: Targeted Attacks

By

It's one thing to be a victim of a phishing campaign, but it's an entirely different ball game when you're at the receiving end of a targeted attack.

Video: Targeted Attacks

By

It's one thing to be a victim of a phishing campaign, but it's an entirely different ball game when you're at the receiving end of a targeted attack.

Anatomy of an Attack

Anatomy of an Attack

Traditional approaches to security breaches on the Internet will no longer work. A multi-vector attack requires a multi-vector security strategy.

Security intelligence still requires protection

Security intelligence still requires protection

Considered to be one of the biggest weapons in the fight against cyber crime, security intelligence should also be backed by an arsenal of security layers.

APTs

APTs

Exposing and defeating cyber criminal campaigns out for financial gain or trade secrets is the challenge of the day, but there are strategies and tools available to help.

APTs

APTs

Exposing and defeating cyber criminal campaigns out for financial gain or trade secrets is the challenge of the day, but there are strategies and tools available to help.

Preparing for a post-Flame world

Preparing for a post-Flame world

By

The latest evidence of cyber espionage weaponry could be a harbinger of nation-state assaults to come.

Mac espionage trojan targets Uighur activists

By

The Uighur Muslim minority group is being targeted in a new APT campaign that targets Mac users and is difficult to detect.

Mac espionage trojan targets Uighur activists

By

The Uighur Muslim minority group is being targeted in a new APT campaign that targets Mac users and is difficult to detect.

Podcast: Never mind Flame, IXESHE is sophisticated

Podcast: Never mind Flame, IXESHE is sophisticated

By

Tom Kellermann, vice president of cyber security at Trend Micro, joined me on the SC Magazine podcast to discuss an APT campaign known as IXESHE, which is going after sensitive targets from Asia to Germany. But its command-and-control infrastructure really is what makes it special.

Podcast: Never mind Flame, IXESHE is sophisticated

Podcast: Never mind Flame, IXESHE is sophisticated

By

Tom Kellermann, vice president of cyber security at Trend Micro, joined me on the SC Magazine podcast to discuss an APT campaign known as IXESHE, which is going after sensitive targets from Asia to Germany. But its command-and-control infrastructure really is what makes it special.

Exploits greeting users at foreign policy, human rights sites

By

A host of websites, including the U.S.-based Center for Defense Information, have been compromised with malicious code in order to target and infect visitors.

Experts discover Mac OS X malware, "Sabpub," used as APT

By

A new trojan is targeting the same Java vulnerability that the Flashback malware took advantage of last week.

Experts discover Mac OS X malware, "Sabpub," used as APT

By

A new trojan is targeting the same Java vulnerability that the Flashback malware took advantage of last week.

Are security basics getting lost under the cover of cloud and mobile?

Are security basics getting lost under the cover of cloud and mobile?

Be wary of vendor messaging in light of today's threats, as it may be misguided. Organizations can cope with the latest concerns by applying tried-and-true security best practices.

Cyber Warfare: The next Cold War

Cyber Warfare: The next Cold War

By

Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.

Trojan targets Tibetan activist groups that use Macs

By

Researchers have uncovered a rare instance of so-called espionage malware for the Mac OS X platform.

Debate: The attack du jour, APTs, are real threats.

By

The attack du jour, APTs, or advanced persistent threats, are real threats.

Debate: The attack du jour, APTs, are real threats.

By

The attack du jour, APTs, or advanced persistent threats, are real threats.

Do you need to worry about the advanced persistent threat?

Do you need to worry about the advanced persistent threat?

Yes, advanced persistent threats are stealthy and difficult to stop, but organizations should remember that the most common attack type facing them is mass malware.

A closer look at two of today's top security threats

Hackers and computer criminals have shown an ongoing ability to stay one step ahead of the security professional, but there are strategies and tools to help thwart their efforts.

The not-so-advanced persistent threat

Hacker groups Anonymous and LulzSec have made a name for themselves by scanning large organizations until they find the one weak system ready to be exploited. You can prevent an attack.

The five new laws of anti-malware

The five new laws of anti-malware

Today, the best overall security solution includes technologies that can help you quickly respond to an inevitable attack.

Solving the hardest problems in enterprise data security

Companies targeted by APT will need to upgrade their defenses strategy to include multiple, integrated layers of extremely sensitive anomaly detection and mitigation.

Solving the hardest problems in enterprise data security

Companies targeted by APT will need to upgrade their defenses strategy to include multiple, integrated layers of extremely sensitive anomaly detection and mitigation.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US