Tag "APT"

Back to homepage

What is an advanced persistent threat (APT)? And 5 signs you’ve been hit with one

Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack. An advanced persistent threat (APT) is a cyberattack executed


APT28 Mounts Spy Campaign Using Hotel Networks – Infosecurity Magazine

As the last push of the summer travel season gets underway, an espionage campaign targeting the hospitality sector, likely by Russian actor APT28, is threatening high-value visitors to hotels throughout


600+ samples of Spring Dragon APT malware spotted

The Chinese speaking ATP group Spring Dragon, a.k.a., LotusBlossom, has increased attacks against high-profile organizations around the South China Sea. Kaspersky researchers managed to collect more than 600 samples of

Vendor News

Dell Introduces Security Suite with Advanced Threat Protection and Data EncryptionDATAQUEST

Dell has announced an air gap version of its Dell Endpoint Security Suite Enterprise solution to address the need for highly-secure industries to keep their endpoints isolated from the internet,


Review: Advanced Persistent Security – Help Net Security

Ira Winkler, CISSP is President of the Internet Security Advisors Group. He is considered one of the world’s most influential security professionals. Araceli Treu Gomes is an Intelligence and Investigations


The Evolution of Cybercrime Against the Financial Industry

By Brian Laing, VP of Products and Business Development, Lastline 2016 saw escalating cyberattacks on European and Asian banks. In April of 2016, the SWIFT international money transfer network that


Businesses fear cyber espionage through ATP – ITProPortal

Cyber-espionage through advanced persistent threats (APT) has become the biggest nightmare for IT security decision makers in the UK, Bitdefender has announced this Wednesday. Click here to view original web


Malware framework using legitimate utilities lobbed at government agencies – Help Net Security

Bitdefender researchers have unearthed a previously unknown malware framework that, unlike those used by most APTs, contains many legitimate utilities. Click here to view original web page at www.helpnetsecurity.com


Cloud-based managed security services to change competitive landscape – Networks Asia – Asia’s Source for Enterprise Network Knowledge

Managed security services (MSSs) with advanced threat detection and remediation capabilities are enjoying high adoption rates in Asia-Pacific, keeping the regional market buoyant despite an economic slowdown. Click here to

Industry Insights

4 Tips For Cyber-Securing Supply Chains – Information Security Buzz

Many organizations are increasingly outsourcing software development and acquiring open source software products. In an effort to reduce costs for production or manufacturing requirements for information technology systems, networks and