Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Your search for advanced persistent threat returned 53 results.Sort results:
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
Advanced Persistent Threats (APTs) are being used to compromise organizations around the globe with increasing sophistication, persistence, and evasive attack methods.
Targeted attacks, or APTs, can be complex and affect organizations of all sizes, across all industries. But that doesn't mean their detection and prevention has to be complex too. With constant confusion around ATAs and APTs, a staggering 68% of IT Managers admit they don't know what an APT is.
Attackers no longer need specialized skills to carry out what is considered an Advanced Persistent Threat, according to researchers with Imperva.
In a new study, 33 percent of small to midsized organizations said they weren't sure how to best describe an advanced persistent threat (APT).
Round one of the 2014 SC Awards U.S. finalists includes categories for best advanced persistent threat protection, mobile security solution, vulnerability management solution, and the Excellence Award for best SME security solution.
Although it was initially found to be targeting entities in South Korea and Japan, an advanced persistent threat known as Icefog recently struck at least three U.S. targets with a Java backdoor.
An advanced persistent threat known as Careto, or "The Mask," has been identified by Kaspersky Lab researchers, who also believe that the cyber-espionage operation dating back to 2007 could be a state-sponsored campaign.
In previous surveys this year, we've examined various aspects of one of the most pressing issues facing the IT security industry today: Advanced Persistent Threat (APTs). This webcast, sponsored by Lumension, presents findings from the newest research uncovered by our readers on server security. Find out what the...
Researchers at Kaspersky Lab have identified a new "watering hole" advanced persistent threat attack that takes advantage of a previously patched Java vulnerability.
Great Britain, Germany, France and Switzerland accounted for more than 70 percent of unique infections in 2013.
In this video, Danielle Walker, reporter at SC Magazine, sits with Alexander Watson, director of security research at Websense, to discuss the findings of a recent study.
On the third day of his visit to China, British prime minister David Cameron stated that he looks to open "a proper dialogue" with the country concerning cyber security.
A security firm polled nearly 200 senior security professionals at the Black Hat conference in Las Vegas to get their perspective on advanced attacks.
A Lieberman Software survey highlights the issue or poor password management, even among security pros.
An incident response firm found that 93 percent of phishing emails were sent out on weekdays, with the most popular day being Wednesday.
APTs give IT teams headaches, because they are extremely stealthy in nature and are almost always aimed at a very specific target. On the other hand, they are designed to remain in the network undetected for extended periods of time, all the while stealing sensitive company data.
A recent study reveals that the costs organizations incur as a result of cyber crime has gone up, and so has the time it takes to resolve those attacks.
Ninety-six percent of security pros employed AV and anti-malware solutions to protect data from APT attacks, while protections for mobile entry points fell at the bottom of the list.
Nawaf Bitar, keynote speaker at this year's RSA Conference in San Francisco, gives us a brief preview of his presentation, as well as some topics he believes will be heavily covered this year.
FireEye discovered that the zero-day exploit was already being used in targeted attacks, specifically aimed at IE 9 through IE 11.