You searched for advanced persistent threat/ | Page 2 of 39 | SC Media

Your search for advanced persistent threat/ returned 381 results

Your search for advanced persistent threat/ returned 381 results

Sort Results:

Relevant Recent
Advanced persistent threat
Research

Advanced persistent threat

In the old days, a cyberthief would play a numbers game, sending out millions of emails with a compromised link, for example, with the hope that one percent of recipients would respond. Nowadays, in an advanced persistent threat (APT) attack - such as recent, high-profile incursions Stuxnet and Operation Shady RAT - the perpetrator spends a considerable amount of time researching a specific target, often customizing malware so that its signature cannot be identified by any existing anti-virus or anti-malware software. Too, these attackers have significant resources, both financially and technologically, and motivation that might not have anything to do with pure financial gain. The good news: there are resources available for companies to combat APTs.
Research

2013 eBook on Advanced Persistent Threats

APTs - most often taking the form of cyber criminal campaigns out for financial gain or trade secrets - have impacted some of the largest organizations and government agencies in the world.
Vendor Webcasts

A pragmatic approach to Advanced Persistent Threat (APT) Protection

Targeted attacks, or APTs, can be complex and affect organizations of all sizes, across all industries. But that doesn't mean their detection and prevention has to be complex too. With constant confusion around ATAs and APTs, a staggering 68% of IT Managers admit they don't know what an APT is.
Next post in Features