Read more about APT
Bookmark and Share
  • Insider threats continue to dominate

    24.02.2015

    Ordinary employees, privileged users and the supply chain – such as contractors and third party service providers – are all conduits for a traditional insider threat, according to Vormetric.

  • Anthem breach dates back to December

    06.02.2015

    As more details about the Anthem data breach come to light, sources close to the investigation say that Chinese state-sponsored hackers might be behind the attack.

  • APT players lack deep skills of exploitation, fail at QA

    03.02.2015

    Advanced Persistent Threat (APT) actors are generally considered to be among the most sophisticated cyber exploiters out there.

  • APT gear: Custom Windows task hiding tool

    27.01.2015

    Cyber attackers, especially persistent ones, use a variety of tools to break into target systems, assure their continuing presence in them and hide their actions, and exfiltrate information from them.

  • APTs: Minimizing losses with early detection

    26.01.2015

    Attackers try hard to mask their activities – but try as they might, in order to accomplish their goals, their behaviors are likely to be anomalous at some point in time.




Spotlight

Black hole routing: Not a silver bullet for DDoS protection

As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?”


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Mar 2nd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //