How To Detect And Defend Against Advanced Persistent Threats

  /     /     /  
Publicated : 22/11/2024   Category : security


How To Detect And Defend Against Advanced Persistent Threats


There are no silver bullets for APTs, but there are steps your organization can take. Heres a look at what you can do



[Excerpted from Detecting and Defending Against Advanced Persistent Threats, a new report posted this week on Dark Readings
Advanced Threat Tech Center
.]
One of the most insidious cyberthreats is the one that lies in wait. These exploits, commonly known as advanced persistent threats, are sophisticated, custom exploits with the express objective of gaining access to a targeted system and remaining undetected for an extended period of time.
An APT’s success requires considerable resources and expertise — hence the term “advanced.” “Persistent” doesn’t mean a continual barrage of attacks launched in the hope that one may succeed, but instead the relentless pursuit and development of a successful attack methodology. These exploits are developed by skilled, motivated, organized and well-resourced programmers working with a well-defined road map. These attacks can take many months to develop and even longer to successfully deploy.
The concern about APTs is increasing because of an escalating number of incidents and the severity and extent of the damage they cause. Cisco Security Intelligence Operations has reported a significant increase in the number of unique instances of malware it’s finding, an indication of APTs under development or being deployed. And although big and well-armed companies such as Google, RSA, Sony, and Lockheed Martin have been hit, there are signs that APTs may be going after smaller and less well-protected organizations to get to their eventual targets.
To combat the threat of APTs, it’s important to understand the different phases of an APT attack and the defenses required for each.
To read about the six phases of an APT -- and potential defenses that your organization can employ in each phase --
download the free report on how to detect and defend against APTs
.
Have a comment on this story? Please click Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Sony, XBox Targeted by DDoS Attacks, Hacktivist Threats ◂
Discovered: 23/12/2024
Category: security

▸ There are plenty of online tools for reporting bugs. ◂
Discovered: 23/12/2024
Category: security

▸ 27 Million South Koreans Hit by Online Gaming Theft. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
How To Detect And Defend Against Advanced Persistent Threats