Your search for advanced persistent threat returned 47 results.

Sort results:

Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.

Webcast

A pragmatic approach to Advanced Persistent Threat (APT) Protection

Targeted attacks, or APTs, can be complex and affect organizations of all sizes, across all industries. But that doesn't mean their detection and prevention has to be complex too. With constant confusion around ATAs and APTs, a staggering 68% of IT Managers admit they don't know what an APT is.

News

Study sheds light on uncertainty of SMBs defining APTs

In a new study, 33 percent of small to midsized organizations said they weren't sure how to best describe an advanced persistent threat (APT).

News 2014 SC Awards U.S. Finalists: Round One

2014 SC Awards U.S. Finalists: Round One

Round one of the 2014 SC Awards U.S. finalists includes categories for best advanced persistent threat protection, mobile security solution, vulnerability management solution, and the Excellence Award for best SME security solution.

News

Icefog APT returns, at least three victims identified in the U.S.

Although it was initially found to be targeting entities in South Korea and Japan, an advanced persistent threat known as Icefog recently struck at least three U.S. targets with a Java backdoor.

News Seven-year-long APT campaign identified, possibly state-sponsored

Seven-year-long APT campaign identified, possibly state-sponsored

An advanced persistent threat known as Careto, or "The Mask," has been identified by Kaspersky Lab researchers, who also believe that the cyber-espionage operation dating back to 2007 could be a state-sponsored campaign.

Webcast

APTs: The State of Server Side Risks in 2013 and Steps to Minimize Risk

In previous surveys this year, we've examined various aspects of one of the most pressing issues facing the IT security industry today: Advanced Persistent Threat (APTs). This webcast, sponsored by Lumension, presents findings from the newest research uncovered by our readers on server security. Find out what the...

News Spy malware buried on official Tibetan website

Spy malware buried on official Tibetan website

Researchers at Kaspersky Lab have identified a new "watering hole" advanced persistent threat attack that takes advantage of a previously patched Java vulnerability.

Video

Video: Analyzing a present threat

In this video, Danielle Walker, reporter at SC Magazine, sits with Alexander Watson, director of security research at Websense, to discuss the findings of a recent study.

Brief

UK looks to open security dialogue with China

On the third day of his visit to China, British prime minister David Cameron stated that he looks to open "a proper dialogue" with the country concerning cyber security.

News

Study: State-sponsored attacks worsen, but security pros unequipped to spot threat

A security firm polled nearly 200 senior security professionals at the Black Hat conference in Las Vegas to get their perspective on advanced attacks.

News Malicious program enhances APT campaign against South Korea

Malicious program enhances APT campaign against South Korea

Security firm Seculert has published details on "PinkStats," a trojan downloader that is believed to have been distributed by Chinese hackers.

News Phishers find most success midweek, masquerading as IT, report finds

Phishers find most success midweek, masquerading as IT, report finds

An incident response firm found that 93 percent of phishing emails were sent out on weekdays, with the most popular day being Wednesday.

Document The Game is On: Advanced Persistent Threats

The Game is On: Advanced Persistent Threats

APTs give IT teams headaches, because they are extremely stealthy in nature and are almost always aimed at a very specific target. On the other hand, they are designed to remain in the network undetected for extended periods of time, all the while stealing sensitive company data.

News Study: The cost of cyber crime continues to rise

Study: The cost of cyber crime continues to rise

A recent study reveals that the costs organizations incur as a result of cyber crime has gone up, and so has the time it takes to resolve those attacks.

Blog Post Nawaf Bitar, senior VP and GM, security business unit, Juniper Networks

Nawaf Bitar, senior VP and GM, security business unit, Juniper Networks

Nawaf Bitar, keynote speaker at this year's RSA Conference in San Francisco, gives us a brief preview of his presentation, as well as some topics he believes will be heavily covered this year.

News Adobe confirms PDF tracking issue, plans to ship fix soon

Adobe confirms PDF tracking issue, plans to ship fix soon

The software maker seemed to downplay the threat posed by issue, which McAfee is calling a security vulnerability that could be used in APT-style campaigns.

News APT groups use Malaysian flight-themed email attachments as bait

APT groups use Malaysian flight-themed email attachments as bait

Researchers at FireEye say firms were targeted with phishing emails mentioning the mysterious flight.

Blog Post Defending against APTs: Looking for the big picture

Defending against APTs: Looking for the big picture

The most significant reason that threats go undetected can be summarized in two words: insufficient data.

News Advanced Evasion Techniques still top of mind for pros, study says

Advanced Evasion Techniques still top of mind for pros, study says

Nearly 40 percent of IT decision-makers don't believe they have the ability to detect AETs, which fly under the radar of most firewalls.

News

Study: Uneasiness concerning insider threats grows for security professionals

Preventing insider threats has become increasingly more difficult since 2011, according to the new survey.

Page 1 of 3

Sign up to our newsletters

POLL