Read more about APT
Bookmark and Share
  • NLPRank: An innovative tool for blocking APT malicious domains

    05.03.2015

    Security researchers working at OpenDNS' Security Labs have developed NLPRank, a new system that helps detect - quickly and relatively accurately - phishing and malware-download sites set up by APT threat actors.

  • Insider threats continue to dominate

    24.02.2015

    Ordinary employees, privileged users and the supply chain – such as contractors and third party service providers – are all conduits for a traditional insider threat, according to Vormetric.

  • Anthem breach dates back to December

    06.02.2015

    As more details about the Anthem data breach come to light, sources close to the investigation say that Chinese state-sponsored hackers might be behind the attack.

  • APT players lack deep skills of exploitation, fail at QA

    03.02.2015

    Advanced Persistent Threat (APT) actors are generally considered to be among the most sophisticated cyber exploiters out there.

  • APT gear: Custom Windows task hiding tool

    27.01.2015

    Cyber attackers, especially persistent ones, use a variety of tools to break into target systems, assure their continuing presence in them and hide their actions, and exfiltrate information from them.




Spotlight

Crowdsourcing your bug bounty program

David Levin, Director of Information Security at Western Union, talks about crowdsourcing their bug bounty program and the lessons learned along the way.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Mar 30th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //