Blog Posts Tagged with "Advanced Persistent Threats"

69dafe8b58066478aea48f3d0f384820

F-Secure: Malicious PDFs Targeting Defense Contractors

July 20, 2011 Added by:Headlines

"It's a PDF file... sent to an employee of a targeted company as an email attachment. It exploits a known Javascript vulnerability and drops a... backdoor. A decoy PDF file is shown... [as] a call for papers for 2012 AIAA Strategic and Tactical Missile Systems Conference... classified as SECRET..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Defense Research Lab Back Online After Attacks

July 18, 2011 Added by:Headlines

Nearly two weeks after an Advanced Persistent Threat (APT) attack caused officials to take systems offline at the Energy Department’s Pacific Northwest National Laboratory (PNNL), nearly all systems have been restored to normal operating parameters...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

This Article Has Been Has Been Re-Hashed Re-Hashed

June 14, 2011 Added by:J. Oquendo

Targeted phishing, aka spearfishing attacks, have been noticed since 9/11 and no one seems to have gotten their act together to defend against this attack. The attack itself is almost always defendable with, and I have stated this over and over again, Extrusion Prevention...

Comments  (0)

F520f65cba281c31e29c857faa651872

APTs Require a Comprehensive Architecture

June 08, 2011 Added by:Rahul Neel Mani

APTs are becoming more and more complicated. However, there are certain security measures that organisation still need to take. Take the case of Epsilon data breach, or RSA breach. Hacked using simple social engineering tools like spear phishing and phishing e-mail to succeed...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

RSA Tokens, Lockheed Martin, APT, OH MY!

June 03, 2011 Added by:Infosec Island Admin

I can hear certain people in the community now groaning at the use of the APT acronym but let me put it to you all straight. If there was a hack on LMCO, maker of the JSF and numerous black type projects to boot, then it was likely China or another nation state’s actors...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacker Offers Insight On Sony PSN Breach

May 19, 2011 Added by:Headlines

"The depths they went indicates that this hack wasn't arbitrary... It seems likely to me that Sony got attacked through its web services first, such as the blog, and it opened up the doors to the rest of Sony's servers..."

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Do You Really Know What’s on Your Network?

May 05, 2011 Added by:Global Knowledge

A simple Android app called Caribou is able to open doors with a simple push of a button once the IP address of the server is identified. When you think of the number of access card systems installed in HOA’s and businesses across the nation, the enormity of the risk becomes easily apparent...

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SMBRelay Attacks on Corporate Users Part 2

April 27, 2011 Added by:Alexander Polyakov

MS Office programs will show an alert to our victim if it couldn't download content from a remote resource. We could put a document on our shared resource and when MS Office opens the doc, it takes a style sheet from our shared resource and doesn't show an alert to the victim...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Thousand Grains of Sand in the Electronic Age

April 20, 2011 Added by:Infosec Island Admin

Over the years the Chinese have made it their business to steal a lot of data. Some of it you would readily see as important militarily or for industrial espionage, but some of the data is much more arcane as to the reasons why they would make the efforts that they do to get it...

Comments  (2)

27ef2e87221c355f517e2824b19f7ca6

European Cybercrime 10 Years On - Why It’s Not Working

April 19, 2011 Added by:Jared Carstensen

The recent economic growth in Europe (bank bailouts aside), upgrades to infrastructure, communications, and internet speeds, coupled with the reduced costs of equipment required for cyber criminals to operate, has greatly assisted cyber criminals and cartels in their mission...

Comments  (2)

959779642e6e758563e80b5d83150a9f

Defining the Insider Threat

April 17, 2011 Added by:Danny Lieberman

Mitigating the insider threat requires defining whether or not there IS a threat, and if so, finding the right security countermeasures to mitigate the risk. One wonders whether or not RSA eats their own dog food, and had deployed a data loss prevention system. Apparently not...

Comments  (8)

850c7a8a30fa40cf01a9db756b49155a

Advanced Persistent Threats - Blame It On REO

April 10, 2011 Added by:J. Oquendo

We can never stop an attacker from trying to compromise us, it is out of our control. This does not mean that we cannot stop connections from leaving that machine. After all, controlling what leaves a machine will always be more important than what is coming INTO a machine...

Comments  (0)

00fd6160b9db2d91e663a578d87cbaf3

A Potential Silver Lining in a Government Shutdown

April 08, 2011 Added by:Wayde York

Threats that exploit our systems and target specific information work in the background in a "low and slow" method, and finding them in the din of normal network traffic is difficult. If the shutdown does occur, the layers of noise that protects these threats will be pulled back...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Government Shutdown Could Impact Cyber Security

April 07, 2011 Added by:Headlines

"When we put ourselves in state of chaos like this, and this is what it will be, think of the opportunities for striking through the APTs (advanced persistent threats), they can pick and choose the targets with much less security behind them..."

Comments  (1)

850c7a8a30fa40cf01a9db756b49155a

The Art of Cyber Warfare - Educational Fail

April 04, 2011 Added by:J. Oquendo

Is there a solution to the ever continuing FUD machine? Cyberwarfare is over-hyped and misrepresented. The fact is, even responsible individuals get it wrong consistently. This is how and why we fail, and will continue to fail, to defend against "computer related" attacks...

Comments  (2)

7af56c65866a442699d6dd1dfb02b528

Why Sending Files Outside Your Enterprise Needs Approval

March 24, 2011 Added by:Eli Talmor

What do we know for sure? Enterprises need to communicate with the outside world. DLP can do a good job with content-screening of email, but file content screening may be a bit too much for DLP - and this is the "sweet spot" being exploited by APT...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »