New trend in cybercriminal activity: APT wars

Kaspersky Lab has recorded a rare and unusual example of one cybercriminal attacking another. In 2014, Hellsing, a small and technically unremarkable cyberespionage group …

Insider threats continue to dominate

Ordinary employees, privileged users and the supply chain – such as contractors and third party service providers – are all conduits for a traditional insider …

Anthem breach dates back to December

As more details about the Anthem data breach come to light, sources close to the investigation say that Chinese state-sponsored hackers might be behind the attack. Steve Ragan …

APT gear: Custom Windows task hiding tool

Cyber attackers, especially persistent ones, use a variety of tools to break into target systems, assure their continuing presence in them and hide their actions, and …

APTs: Minimizing losses with early detection

Let’s travel back to 2006, the year the blockbuster, “The Departed,” came out. Matt Damon plays a young criminal who has infiltrated the state police as an …

eBook: Cybersecurity for Dummies

NOTE: This book is no longer available, thanks for your interest. APTs have changed the world of enterprise security and how networks and organizations are attacked. These …