Your search for advanced persistent threat returned 43 results.

Sort results:

Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.

Webcast

Strategies that work for Advanced Persistent Threat Prevention

Advanced Persistent Threats (APTs) are being used to compromise organizations around the globe with increasing sophistication, persistence, and evasive attack methods.

Webcast

A pragmatic approach to Advanced Persistent Threat (APT) Protection

Targeted attacks, or APTs, can be complex and affect organizations of all sizes, across all industries. But that doesn't mean their detection and prevention has to be complex too. With constant confusion around ATAs and APTs, a staggering 68% of IT Managers admit they don't know what an APT is.

News Advanced Persistent Threats not so advanced anymore, researchers find

Advanced Persistent Threats not so advanced anymore, researchers find

Attackers no longer need specialized skills to carry out what is considered an Advanced Persistent Threat, according to researchers with Imperva.

News

Icefog APT returns, at least three victims identified in the U.S.

Although it was initially found to be targeting entities in South Korea and Japan, an advanced persistent threat known as Icefog recently struck at least three U.S. targets with a Java backdoor.

News Seven-year-long APT campaign identified, possibly state-sponsored

Seven-year-long APT campaign identified, possibly state-sponsored

An advanced persistent threat known as Careto, or "The Mask," has been identified by Kaspersky Lab researchers, who also believe that the cyber-espionage operation dating back to 2007 could be a state-sponsored campaign.

Brief

Advanced threat report names Great Britain, Switzerland as most targeted in Europe

Great Britain, Germany, France and Switzerland accounted for more than 70 percent of unique infections in 2013.

Video

Video: Analyzing a present threat

In this video, Danielle Walker, reporter at SC Magazine, sits with Alexander Watson, director of security research at Websense, to discuss the findings of a recent study.

Brief

DDoS attacks against Hong Kong protest sites, APT activity, linked

FireEye researchers have observed ties between DDoS attacks against Hong Kong pro-democracy protesters and APT activity based in China.

Brief

UK looks to open security dialogue with China

On the third day of his visit to China, British prime minister David Cameron stated that he looks to open "a proper dialogue" with the country concerning cyber security.

News

Survey: 53 percent change privileged logins quarterly

A Lieberman Software survey highlights the issue or poor password management, even among security pros.

News APT 'Nitro' group attacks again in 2014

APT 'Nitro' group attacks again in 2014

The group seems to have changed up its tactics to target various enterprises this year.

News Phishers find most success midweek, masquerading as IT, report finds

Phishers find most success midweek, masquerading as IT, report finds

An incident response firm found that 93 percent of phishing emails were sent out on weekdays, with the most popular day being Wednesday.

Brief

Cryptoblocker variant emerges, encryption differs from CryptoLocker

Trend Micro has detected a variant of CryptoLocker in the wild that relies on the advanced encryption standard.

Document The Game is On: Advanced Persistent Threats

The Game is On: Advanced Persistent Threats

APTs give IT teams headaches, because they are extremely stealthy in nature and are almost always aimed at a very specific target. On the other hand, they are designed to remain in the network undetected for extended periods of time, all the while stealing sensitive company data.

News Citadel used in APT attacks against petrochemical firms

Citadel used in APT attacks against petrochemical firms

In an interesting twist, financial malware Citadel was used to infect firms outside of the finance sector via APT attacks, Trusteer found.

News Study: AV, anti-malware most used controls for APT defense

Study: AV, anti-malware most used controls for APT defense

Ninety-six percent of security pros employed AV and anti-malware solutions to protect data from APT attacks, while protections for mobile entry points fell at the bottom of the list.

Opinion Beware of the malware walking dead

Beware of the malware walking dead

This Hallows Eve might be a good time to remind ourselves that zombies can be just as deadly, and I'm referring to recycled tools and techniques from years gone by.

News Citadel variant targets master passwords, authentication solutions

Citadel variant targets master passwords, authentication solutions

Credentials, entered through password management software and a Nexus authentication tool, are the target of this new variant.

Blog Post Nawaf Bitar, senior VP and GM, security business unit, Juniper Networks

Nawaf Bitar, senior VP and GM, security business unit, Juniper Networks

Nawaf Bitar, keynote speaker at this year's RSA Conference in San Francisco, gives us a brief preview of his presentation, as well as some topics he believes will be heavily covered this year.

News Attackers leverage new IE zero-day in 'Clandestine Fox' op

Attackers leverage new IE zero-day in 'Clandestine Fox' op

FireEye discovered that the zero-day exploit was already being used in targeted attacks, specifically aimed at IE 9 through IE 11.

Page 1 of 3

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US