APT

Sun
28
Feb

Some APT talks – Part 2 – Detect the Undetected

Some APT talks – Part 2 – Detect the Undetected

We have discussed about APT and its attack vectors in Part 1. Now it is important how we plan the mitigation strategies? There are multiple solutions in the market that offers different tools to effectively mitigate APT’s.  It would be boring and repetitive if I go through the best practices and the technologies I have already discussed in this forum such as User Awareness, Password policies, Patching etc. We will have a look at something new- Deception, a proactive way of dealing with these sorts of cyber attacks.

Sun
21
Feb

Some APT talks – Part 1 – Expect the Unexpected

Some APT talks – Part 1 – Expect the Unexpected

In our forum, we have discussed about Advanced Persistent Threat (APT) before.

Who and What it is?

Thu
28
Jan

Are you ready to face the APT Hackers?

Are you ready to face the APT Hackers?

Many organizations would have come across data security breaches resulting in financial losses and disruptions of their services. Though lots of Preventive and detective techniques exists, recently large- scale security breaches exist because of Advanced Persistent Threats (APT).

APT are different from other attacks where they can adapt to any environments and overcome the existing protection mechanisms. They maintain their connectivity with the host system until their objectives are reached.

APT can be done through social engineering techniques such as spear phishing, where the hacker through e-mail spoofing gains sensitive information. The sender name can resemble any reputed organizations (any banks, any payment gateways). Once the user clicks the link or downloads any docs there are chances of downloading a malware.

Pages

Subscribe to RSS - APT