Advanced persistent threats (APTs) are a growing concern to the world’s companies and networks. This recorded webinar looks at real-world data breaches resulting from APTs and how multi-layered proactive detection can combat this threat.
APTs, fuga de información, explotación de vulnerabilidades y ransomware son algunas de las tendencias en cibercrimen para 2015, que analizamos en detalle.
Les presentamos un resumen de las principales tendencias en materia de malware para el 2015
After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access Trojan. This blog gives an overview of the first one
APTs – or Advanced Persistent Threats – are the most menacing cyber attack there is, some say. Built to be stealthy, they penetrate networks, steal secrets – and vanish. ‘Catching’ one was a little like finding Bigfoot – but the much-hyped threat wasn’t quite so scary up close…
If you're interested in the "APT: Real Threat or Just Hype" keynote session I took part in during the recent Infosecurity Virtual Conference, you can now hear and see the presentations and Q&A (and the other panel sessions from the conference). Register here. Here are the details for that keynote session, chaired by Steve Gold,
You don't need more advice from me on avoiding phishing following the Epsilon fiasco: Randy, among others has posted plenty of sound advice, and I put some links to relevant articles here, though I don't know of anyone who's published a list of the whole 2,500 or so companies that are apparently Epsilon's customers, though comment threads
My latest blog for SC Magazine's Cybercrime Corner looked at the recent APT (Advanced Persistent Threat) attack on RSA, in the light of Uri Rivner's blog on the implementation of the attack. Unfortunately, the exact nature of the target and damage remains somewhat obscure, so while I certainly consider Rivner's blog worth reading, I also found myself