Cyber attackers, especially persistent ones, use a variety of tools to break into target systems, assure their continuing presence in them and hide their actions, and exfiltrate information from them.
Attackers try hard to mask their activities – but try as they might, in order to accomplish their goals, their behaviors are likely to be anomalous at some point in time.
NOTE: This book is no longer available, thanks for your interest.
Kaspersky Lab researchers have discovered a new piece of the puzzle called Turla (aka Snake, aka Uroburos): the malware used by attackers does not come only in the Windows flavour, but in the Linux one as well.
Which nation state is behind the sophisticated Regin espionage malware? According to The Intercept, it's likely wielded by the UK spy agency GCHQ and/or the US NSA.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.