Advanced Persistent Threats

Advanced Persistent Threats news, information, and how-to advice

industrial refinery energy plant oil gas
security bug

north korea statue pyongyang

North Korea hacking group is expanding operations, researchers say

A group of hackers from North Korea (DPRK), recently connected to the usage of an Adobe Flash zero-day vulnerability (CVE-2018-4878), has expanded its operations in both scope and sophistication, FireEye says.

alert hacking threat detected

How to automate threat hunting

The quest for hidden threats...

cyber security

What is cyber security? How to build a cyber security strategy

Organizations face many threats to their information systems and data. Understanding all the basic elements to cyber security is the first step to meeting those threats.

cybersecurity ts

The cybersecurity skills shortage acts as a root cause for security events

New research from ESG and ISSA reveals that a lack of training, inadequate cybersecurity staffing, and business apathy contribute to security events.

it skills gap

Acute cybersecurity skills shortage areas

Security analysts/investigators, application security specialists, and cloud security skills top a long list of skills deficits.

cyber crime cybersecurity

Research confirms the cybersecurity skills shortage is an existential threat

ESG research with ISSA shows that organizations don’t have the right levels of cybersecurity personnel, skills and ongoing training to keep up with cyber risk.

alert hacking threat detected

The cybersecurity skills shortage impacts security operations

Large organizations are understaffed and lack the right skills for things such as threat hunting, prioritizing alerts, and forensic investigations.

quell cyber attacks primary

What is the cyber kill chain? Why it's not always the right approach to cyber attacks

The cyber kill chain breaks down each stage of a malware attack where you can identify and stop it, but be aware of how attack strategies are changing.

managed security service providers

Endpoint security needs 'efficient efficacy'

Enterprise organizations want new endpoint security tools that prevent exploits and malware better and streamline operations.

sequence 01.00 00 56 43.still001
video

Kaspersky Lab, U.S. Cyber Command, Hollywood hacking and ransomware | Salted Hash Ep 1

Reporters Steve Ragan and Fahmida Rashid unpack the hottest topics in the security realm: Kaspersky Lab's Russia connection, the new status for the U.S. Cyber Command, Hollywood's hacking woes and ransomware.

knife lanyard knot untangle rope

Mimecast’s newly discovered email exploit isn’t a vulnerability, it’s a feature

Mimecast, a Boston-based email security firm, claims to have discovered a new email exploit. The exploit itself centers on the fact that an attacker who sends an HTML-based email linking to an external CSS file can "edit any text in...

artificial intelligence / machine learning

How cognitive and robotic automation play in SecOps

Automation is everywhere, yet consistently used at the wrong times and in the wrong ways, leading to a rise in breaches and millions of unfilled security analyst positions. What are the different types of automation? How does human...

nfl football new york jets buffalo bills

Exploit attacker playbooks to improve security

Rick Howard lines up a Security Slap Shot on improving security by going after attacker playbooks.

emmanuel macron france

Newly elected French president raises questions in trying to dupe hackers

Emerging trend of cyber deception, revealed by Emmanuel Macron, may be a slippery slope.

People walking with airplane in background

Email security appears grounded as attacks continue to take flight

With clever cybercriminals finding creative new ways to get to users, has email security lost the battle to protect.

dirty numbers playground

Microsoft keeps to Bill Gates' roots of cybersecurity

A look at the software giant's startling cybersecurity statistics.

kaspersky logo flag

Researchers link Middle East attacks to new victim in Europe

Kaspersky Labs announced new research this morning that shows some links between the massive Shamoon attack that took down 35,000 computers in Saudia Arabia to a new attack against a target in Europe

computer programmer or hacker

Red alert! Beware of insiders bearing APTs

Big enterprises worry about APTs -- and employees who may be using them to engage in corporate espionage. These measures can help you catch the perps

Load More