Advanced Persistent Threats

Advanced Persistent Threats | News, how-tos, features, reviews, and videos

A group of anonymous hooded figures exist amid raining streams of binary code. [security threats]
vulnerable breach cyberattack hacker

Security threat   >   One endpoint on a network has been compromised.

APT-style mercenary groups challenge the threat models of many organizations

APT-for-hire services will broaden the scope of who is vulnerable to that type of attack. Small- and medium-sized companies in particular need to rethink their threat models.

A laptop with a virtual overlay of abstract code and a binary skull.

Protecting high-value research data from nation-state attackers

Recent nation-state campaigns to steal COVID-related research data underscores the threat to all research organizations. The best defense starts with knowing the enemy.

Global geopolitical vectors

How CISOs can best assess geopolitical risk factors

A recent report on Russian-affiliated advanced persistent threats provides a template to help CISOs evaluate risk from nation-state actors.

A binary map of china.

Chinese hacker group APT41 uses recent exploits to target companies worldwide

APT41 has compromised devices and applications from Cisco, Citrix and Zoho across many industries worldwide at a time when many companies are less able to respond.

target threat hunting program sitting duck duck shooting gallery by roz woodward getty 2400x1600

How Target evolved its threat hunting program: 3 key steps

Target decided to re-evaluate its successful threat hunting program and found it could do better. This is what they did.

cyber threat security compromised vulnerable men on the street

Cybersecurity in 2020: Vigilance and the human element

Todd Inskeep, of Booz Allen Hamilton and the RSA Conference Advisory Board, writes that individuals must remain vigilant to stay a step ahead of those wishing to inflict chaos. Here’s how humans and technology can work together in...

smart city - Industry 4.0 - industrial IoT internet of things - mobile wireless network

Hackers use free tools in new APT campaign against industrial sector firms

Attackers seek to make attribution harder and use sophisticated, realistic spear-phishing emails.

security threat / danger / attack / warfare / grenade-shaped flash drive with abstract connections

Global threat groups pose new political and economic dangers

Nation-state players in Iran, North Korea, Saudi Arabia and Russia are getting new objectives and changing strategies, say experts.

Cyber warfare  >  Russian missile launcher / Russian flag / binary code

Russia’s Sandworm hacking group heralds new era of cyber warfare

In-depth research on Sandworm shows broad capabilities and scope to disrupt anything from critical infrastructure to political campaigns in any part of the world.

neon skull sign / danger / caution / threat

The 24/7 insider threat – Managing risk in a changing environment

A new model for managing insider risk in the "always-on” and “on-demand” workplace.

detection radar computer bug threats identify breach  by the lightwriter kao studio getty

Examining and addressing threat detection and response challenges

Cybersecurity teams are fighting fires and still rely on manual processes. Meanwhile, the attack surface continues to grow. Process improvements are needed.

Mastery of technology skills + knowledge.

12 things every computer security pro should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

Telecom tower

Telcos around the world hit by long-term intelligence gathering cyberattack

Operation Soft Cell saw telcos around the world lose over 100GB of call record data, but it could have been much worse. Attackers could have shut down cell networks if they wanted.

binary code, magnifying lens, skull and crossbones

The growing demand for managed detection and response (MDR)

Threat detection/response is a high priority, but many organizations don’t have the staff or skills to perform these tasks alone. This translates into a growing managed detection and response (MDR) market.

artificial intelligence brain machine learning digital transformation world networking

Risk-based vulnerability management a better form of cyber defense

By consolidating vulnerability management tools and adding AI, risk-based vulnerability management protects the entire attack surface.

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

Load More
You Might Also Like