Advanced Persistent Threats

Advanced Persistent Threats | News, how-tos, features, reviews, and videos

A binary map of china.
target threat hunting program sitting duck duck shooting gallery by roz woodward getty 2400x1600

cyber threat security compromised vulnerable men on the street

Cybersecurity in 2020: Vigilance and the human element

Todd Inskeep, of Booz Allen Hamilton and the RSA Conference Advisory Board, writes that individuals must remain vigilant to stay a step ahead of those wishing to inflict chaos. Here’s how humans and technology can work together in...

smart city - Industry 4.0 - industrial IoT internet of things - mobile wireless network

Hackers use free tools in new APT campaign against industrial sector firms

Attackers seek to make attribution harder and use sophisticated, realistic spear-phishing emails.

security threat / danger / attack / warfare / grenade-shaped flash drive with abstract connections

Global threat groups pose new political and economic dangers

Nation-state players in Iran, North Korea, Saudi Arabia and Russia are getting new objectives and changing strategies, say experts.

Cyber warfare  >  Russian missile launcher / Russian flag / binary code

Russia’s Sandworm hacking group heralds new era of cyber warfare

In-depth research on Sandworm shows broad capabilities and scope to disrupt anything from critical infrastructure to political campaigns in any part of the world.

neon skull sign / danger / caution / threat

The 24/7 insider threat – Managing risk in a changing environment

A new model for managing insider risk in the "always-on” and “on-demand” workplace.

detection radar computer bug threats identify breach  by the lightwriter kao studio getty

Examining and addressing threat detection and response challenges

Cybersecurity teams are fighting fires and still rely on manual processes. Meanwhile, the attack surface continues to grow. Process improvements are needed.

Mastery of technology skills + knowledge.

12 things every computer security pro should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

Telecom tower

Telcos around the world hit by long-term intelligence gathering cyberattack

Operation Soft Cell saw telcos around the world lose over 100GB of call record data, but it could have been much worse. Attackers could have shut down cell networks if they wanted.

binary code, magnifying lens, skull and crossbones

The growing demand for managed detection and response (MDR)

Threat detection/response is a high priority, but many organizations don’t have the staff or skills to perform these tasks alone. This translates into a growing managed detection and response (MDR) market.

artificial intelligence brain machine learning digital transformation world networking

Risk-based vulnerability management a better form of cyber defense

By consolidating vulnerability management tools and adding AI, risk-based vulnerability management protects the entire attack surface.

quell cyber attacks primary

What is the cyber kill chain? Why it's not always the right approach to cyber attacks

The cyber kill chain breaks down each stage of a malware attack where you can identify and stop it, but be aware of how attack strategies are changing.

group of hackers in digital environment

Cylance researchers discover powerful new nation-state APT

A new APT, dubbed White Company, is flexing its muscle on the world stage, and it has security researchers worried.

intro where to look for threat intel binoculars binary code cybersecurity

7 places to find threat intel beyond vulnerability databases

National Vulnerability Databases (NVDs) can be slow and miss things. Use these sources to supplement your threat and vulnerability intelligence efforts.

intro cyber attack maps

Defense, security and the real enemies

The end of the Cold War meant that the countries that threatened American democracy and our way of life didn’t go away. They adapted to use technology to attack us instead. Now that the extent of these attacks is being made known, we...

sony pictures movie

The Sony hacker indictment: 5 lessons for IT security

The recent indictment of North Korean hacker Park Jin Hyok contains valuable information from the FBI’s investigation that will help you defend against similar attacks.

team of hackers / organized attack / group of threat actors

It’s time to get off the treadmill: Why you should understand adversary playbooks

Flipping the equation on known adversaries by developing and deploying controls at locations on the intrusion kill chain designed specifically for these known playbooks will increase a company’s ability to block an attack. The...

forensics threat hunter cyber security thumbprint

Cato Networks adds threat hunting to its SD-WAN services

Cato Threat Hunting System includes algorithms and procedures to alert on threats -- without adding endpoint or network monitoring tools to the customer network.

Will LaSala
video

Defending against mobile technology threats | Salted Hash Ep 24

What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, director of Security Solutions and...

Load More
You Might Also Like