Quantcast
Channel: CSO Online - APT RSS feed
Browsing latest articles
Browse All 15 View Live

Chinese Government's Link to Cyber Espionage Clearer Than Ever

It's a common belief in the information security world that the Chinese government is behind many of the advanced persistent threats that target companies around the world in an effort to steal their...

View Article



Advanced volatile threat: New name for old malware technique?

AVTs are not widespread -- yet -- because 'APTs are working just fine,' says Triumfant CEO. But they could one day start a cyberwar, he said

View Article

IT Concerns About Targeted Malware Rising

IT and security professionals are increasingly concerned about targeted malware and data breaches. What's worse is that their confidence in their ability to identify and stop them is waning.

View Article

Trend pitches Deep Discovery service to Australian customers

Trend Micro has given an overview of its Deep Discovery environment for Australian customers at its Evolve 2013 security conference in Sydney.

View Article

Spear phishing paves road for Advanced Persistent Threats

Specialized spam can be more than it seems -- it sets up a beachhead for malware mischief

View Article


Signature-Based Endpoint Security on Its Way Out

Signature-based blacklisting security technologies are losing the battle against malware, says McAfee, which has streamlined its endpoint security offerings to two suites that it says provide...

View Article

Group behind attack on New York Times linked to G20 phishing attack

Multiple groups are leveraging the upcoming G20 summit to launch Spear Phishing attacks, including the group responsible for attacking the New York Times

View Article

APT malware NetTraveler learning new tricks

Advanced Persistent Threat exploits Java vulnerabilities, embraces watering hole technique, says researcher

View Article


Espionage campaign targeting Asian supply chains uncovered

Kaspersky Lab has released details on an espionage campaign active since 2011, which targeted organizations in Japan and South Korea, which are key elements to Western supply chains

View Article


Data encryption popularity breeding Aussie CSO overconfidence: Vormetric

Many security executives are getting a "false sense of security" in their data-encryption capabilities due to "primitive" solutions that leave private keys exposed to threats from insiders, Vormetric's...

View Article

CosmicDuke will steal your login data and own your network

All malware is bad, but some malware is more insidious than others. That seems to be the case with CosmicDuke. According to a new white paper from F-Secure, CosmicDuke meshes elements of two notorious...

View Article

How hackers used Google in stealing corporate data

A group of innovative hackers used free services from Google and an Internet infrastructure company to disguise data stolen from corporate and government computers, a security firm reported.

View Article

Detecting advanced threats with user behavior analytics

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

View Article


Microsoft tells Office users how to disable DDE after Fancy Bear attacks

Microsoft explains how to disable a protocol that attackers are using to install malware.

View Article

Study: Russia spends up big on hacking groups using unique code to protect...

Russia's lesson to hackers: different teams should avoid sharing code in espionage attacks.

View Article

Browsing latest articles
Browse All 15 View Live




Latest Images