Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Your search for advanced persistent threat returned 45 results.Sort results:
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
Advanced Persistent Threats (APTs) are being used to compromise organizations around the globe with increasing sophistication, persistence, and evasive attack methods.
Targeted attacks, or APTs, can be complex and affect organizations of all sizes, across all industries. But that doesn't mean their detection and prevention has to be complex too. With constant confusion around ATAs and APTs, a staggering 68% of IT Managers admit they don't know what an APT is.
Attackers no longer need specialized skills to carry out what is considered an Advanced Persistent Threat, according to researchers with Imperva.
Round one of the 2015 SC Awards U.S. finalists includes categories for best advanced persistent threat protection, mobile security solution, vulnerability management solution, and the Excellence Award for best SME security solution.
Great Britain, Germany, France and Switzerland accounted for more than 70 percent of unique infections in 2013.
FireEye researchers have observed ties between DDoS attacks against Hong Kong pro-democracy protesters and APT activity based in China.
A Lieberman Software survey highlights the issue or poor password management, even among security pros.
Hackers are finding new attack vectors to exploit and it is becoming harder for us "security professionals" to defend our organizations, says Zouhair Guelzim, CISO, L'Oréal Americas.
FireEye found that a majority of enterprises had their systems breached during the first half of 2014, and often times, advanced malware allowed for the intrusion.
The group seems to have changed up its tactics to target various enterprises this year.
An incident response firm found that 93 percent of phishing emails were sent out on weekdays, with the most popular day being Wednesday.
APTs give IT teams headaches, because they are extremely stealthy in nature and are almost always aimed at a very specific target. On the other hand, they are designed to remain in the network undetected for extended periods of time, all the while stealing sensitive company data.
Trend Micro has detected a variant of CryptoLocker in the wild that relies on the advanced encryption standard.
Cybercriminals often target those areas of a network that pose the least resistance to get what they're after - usually the personally identifiable information of customers and employees, trade secrets, intellectual property and still other critical data.
In an interesting twist, financial malware Citadel was used to infect firms outside of the finance sector via APT attacks, Trusteer found.
Ninety-six percent of security pros employed AV and anti-malware solutions to protect data from APT attacks, while protections for mobile entry points fell at the bottom of the list.
This Hallows Eve might be a good time to remind ourselves that zombies can be just as deadly, and I'm referring to recycled tools and techniques from years gone by.
Credentials, entered through password management software and a Nexus authentication tool, are the target of this new variant.
FireEye discovered that the zero-day exploit was already being used in targeted attacks, specifically aimed at IE 9 through IE 11.
Even the most sophisticated, well-intentioned perimeter-focused cybersecurity strategy cannot possibly be 100 percent effective, says Oliver Tavakoli, CTO, Vectra.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Android vulnerability leaves apps open to malicious overwriting
- One in three of the top million websites are 'risky,' researchers find
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Hanjuan Exploit Kit leveraged in malvertising campaign
- Report: 71 percent of orgs were successfully attacked in 2014
- Self-deleting malware targets home routers to gather information
- 'PoSeidon' point-of-sale malware targets payment card information
- Amedisys notifies nearly 7,000 individuals of potential breach
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- British Airways says rewards accounts hacked, locked down
- Documents on NSA's zero-day policy provide little insight, EFF says
- GitHub on DDoS alert, efforts to curb its largest attack continue
- Shadow data: The monster that isn't just under your bed
- Puush urges users to change passwords after cyber attack