You searched for advanced persistent threat/ | SC Media

Your search for advanced persistent threat/ returned 363 results

Your search for advanced persistent threat/ returned 363 results

Sort Results:

Relevant Recent
The Game is On: Advanced Persistent Threats
Research

The Game is On: Advanced Persistent Threats

APTs give IT teams headaches, because they are extremely stealthy in nature and are almost always aimed at a very specific target. On the other hand, they are designed to remain in the network undetected for extended periods of time, all the while stealing sensitive company data.
WebCast

Uncovering advanced persistent threats

Join us for a step-by-step walk through of how the Operation Cloud Hopper attack unfolded and how security professionals can implement automated defenses to detect malicious behavior like APT10's attack before the breach occurs.
Advanced persistent threat
Research

Advanced persistent threat

In the old days, a cyberthief would play a numbers game, sending out millions of emails with a compromised link, for example, with the hope that one percent of recipients would respond. Nowadays, in an advanced persistent threat (APT) attack - such as recent, high-profile incursions Stuxnet and Operation Shady RAT - the perpetrator spends a considerable amount of time researching a specific target, often customizing malware so that its signature cannot be identified by any existing anti-virus or anti-malware software. Too, these attackers have significant resources, both financially and technologically, and motivation that might not have anything to do with pure financial gain. The good news: there are resources available for companies to combat APTs.
Next post in Opinions