APT players lack deep skills of exploitation, fail at QA
Advanced Persistent Threat (APT) actors are generally considered to be among the most sophisticated cyber exploiters out there. But is this perception correct? Gabor …
APT gear: Custom Windows task hiding tool
Cyber attackers, especially persistent ones, use a variety of tools to break into target systems, assure their continuing presence in them and hide their actions, and …
APTs: Minimizing losses with early detection
Let’s travel back to 2006, the year the blockbuster, “The Departed,” came out. Matt Damon plays a young criminal who has infiltrated the state police as an …
eBook: Cybersecurity for Dummies
NOTE: This book is no longer available, thanks for your interest. APTs have changed the world of enterprise security and how networks and organizations are attacked. These …
Linux backdoor used by Turla APT attackers discovered, analyzed
Kaspersky Lab researchers have discovered a new piece of the puzzle called Turla (aka Snake, aka Uroburos): the malware used by attackers does not come only in the Windows …
Regin spy malware was used in Belgacom, EU government hacks
Which nation state is behind the sophisticated Regin espionage malware? According to The Intercept, it’s likely wielded by the UK spy agency GCHQ and/or the US NSA. The …
Regin backdoor: Sophisticated, stealthy, state-sponsored?
Symantec researchers are warning about a new, complex cyber espionage tool that has been around for years and that has likely been created and is wielded by a nation state. …
Malicious Tor exit node is run by MiniDuke APT actors
The malicious Tor exit node located in Russia that added malicious code to the software downloaded by users has been tied to the APT actors wielding the MiniDuke backdoor. …
Most IT sec pros still rely on perimeter security to stop APTs
78 percent of IT security professionals are confident that firewalls and antimalware tools are robust enough to combat today’s advanced persistent threats, say the …
EMEA threat landscape: APTs nearly doubled
Malware attacks – especially advanced targeted attacks – have nearly doubled in the EMEA region in the first half of 2014, say the results of the analysis of …
Cyber security coalition aims to change the game against malware
It’s good to see that “collaboration” is not just an empty word for the cyber security industry. Novetta Solutions announced it is leading a cyber security …
Citadel malware becomes APT tool in newest hacking campaign
APT attackers wielding a newer, more dangerous versions of the Citadel malware have been targeting a number of Middle Eastern petrochemical companies, Trusteer researchers …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints