Mandiant Investigates Chinese Government-Sponsored Hackers – Video

Mandiant Investigates Chinese Government-Sponsored Hackers – Video

Experts show that the Chinese military is likely coordinating the attacks

53% of Professionals Wrongly Believe APTs Are Not Different from Traditional Threats

53% of Professionals Wrongly Believe APTs Are Not Different from Traditional Threats

Global IT association ISACA has released the results of a study sponsored by Trend Micro

Cybercriminals Use Legitimate Tools in APT Attacks, Experts Say

Cybercriminals Use Legitimate Tools in APT Attacks, Experts Say

Trend Micro experts provide some valuable advice for IT security teams

HeartBeat: Advanced Persistent Threat Aimed at South Korean Government

HeartBeat: Advanced Persistent Threat Aimed at South Korean Government

Trend Micro researchers have released a details paper on the threat

APT Exploit Fixes for Ubuntu 12.10

APT Exploit Fixes for Ubuntu 12.10

Other two operating system from Canonical have been affected by the issue

Russian Space Research Industry Targeted by Cybercriminals Possibly from Korea

Russian Space Research Industry Targeted by Cybercriminals Possibly from Korea

The education, information and telecommunication industries are targeted as well

Defining Cyber Defense Strategies for 2013 Is Like a Game of Chess, Experts Say

Defining Cyber Defense Strategies for 2013 Is Like a Game of Chess, Experts Say

Trend Micro's Tom Kellerman has released an interesting opinion piece on the matter

Trend Micro Report for Q3, 2012: Zero-Days, Mobile Malware and Phishing

Trend Micro Report for Q3, 2012: Zero-Days, Mobile Malware and Phishing

The number of malicious Android apps has considerably grown in the past months

APT 0.9.7.6 Officially Released

APT 0.9.7.6 Officially Released

The latest version of Advanced Package Tool can be downloaded from Softpedia

Trend Micro Launches “Custom Defense,” APT Protection and Analysis Solution

Trend Micro Launches “Custom Defense,” APT Protection and Analysis Solution

The product focuses on detection, analysis, adaption and response

Cybercriminals Hijack Servers Remotely with Hikit APT

Cybercriminals Hijack Servers Remotely with Hikit APT

The attacker contacts the malware, not the other way around

FireEye Study Reveals False Sense of Security Among Professionals Regarding APTs

FireEye Study Reveals False Sense of Security Among Professionals Regarding APTs

They want to educate IT staffers on the proper defense mechanisms for advanced threats

APT Attacks Rely on New Mac OS X Backdoor to Target Uyghur Activists

APT Attacks Rely on New Mac OS X Backdoor to Target Uyghur Activists

Backdoor.OSX.MaControl.b steals files and executes commands on the infected machine

Softpedia Exclusive Interview: Max Nyman on Advanced Evasion Techniques

Softpedia Exclusive Interview: Max Nyman on Advanced Evasion Techniques

Stonesoft representative details the threats posed by AETs

Softpedia Exclusive Interview: Trend Micro Expert on the IXESHE Campaign

Softpedia Exclusive Interview: Trend Micro Expert on the IXESHE Campaign

Nart Villeneuve, a senior threat researcher, shares their findings and offers some tips

Trend Micro Details IXESHE Advanced Persistent Threat Campaign

Trend Micro Details IXESHE Advanced Persistent Threat Campaign

The main targets are companies from East Asia and electronics manufacturers

EA Security Chief: Networks Hard to Defend Against AETs and APTs

EA Security Chief: Networks Hard to Defend Against AETs and APTs

The CISO believes that executives need to become more involved

 
Want more? Browse: