Advanced Persistent Threats

Advanced Persistent Threats news, information, and how-to advice

hacker, DDOS, IoT, SkilledAnalysts
bubble man data shield attack binary code

cylanceprotect cylance AI

This company uses AI to stop cyberattacks before they start

Cylance, a startup that uses AI to detect and prevent cyberattacks, just took in $100 million in fresh funding

more productivity tips

IT leaders pick productivity over security

Implementing security measures can make systems run slower and essentially bog down productivity -- which is causing some enterprises to abandon them

hacker hacked threat

5 tips for defending against advanced persistent threats

APTs are increasing in occurrence and severity, as are the costs associated with protecting businesses adequately from. Is your organization prepared?

power grid electrical

How much at risk is the U.S. critical infrastructure?

The U.S. intelligence community is well aware that hostile hackers have gained access to portions of the nation’s critical infrastructure. But the debate about how big a threat it is rages on

10 reasons why phishing attacks are nastier than ever

10 reasons why phishing attacks are nastier than ever

Forget Nigerian princes -- today’s spearphishing is sophisticated business, fooling even the most seasoned security pros


Meet the man-in-the-middle of your next security crisis

That pesky, stealthy man-in-the-middle shows up everywhere from the cloud to SSL. You could be at a disadvantage if you don’t know where he’ll strike next


Flash Player emergency patch fixes one flaw already being exploited, and two others

One of the vulnerabilities is already being used in cyber espionage attacks against government targets

cyber attack stock image

Attackers go on malware-free diet

To avoid detection, some hackers are ditching malware and living 'off the land' -- using whatever tools are already available in the compromised systems

a thief caught stealing from the surveillance equipment 77379357

Make stolen data worthless

You can't stop intruders from penetrating your network, but with the right DLP solution, you can encrypt stolen data so it can never be used

Load More