That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones.
Download this paper to get an overview of the common characteristics of APTs and how they typically work.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.