• By clicking "OK" or continuing to use this site, you agree that we may collect and use your personal data and set cookies to improve your experience and customise advertising. To see how, and to learn how to control cookies, please read our Privacy Policy and Cookie Policy.
Proudly celebrating our 25 th anniversary promoting the public's access to credible, independent news and sport. Celebrating our 25 th anniversary promoting credible and independent news. Celebrating our 25 th anniversary! Celebrating 25 years!
In the last 8 hours
In the last 7 days
How Did Red Cross Get Hacked? UpGuard02:01 27-Jan-23
Quarterly Report: Incident Response Trends in Q4 2022 Talos Intelligence Blog04:03 26-Jan-23
Protecting Against Malicious Use of Remote Monitoring and Management Software United States Computer Emergency Readiness Team13:19 25-Jan-23
New Entries in the CFR Cyber Operations Tracker: Q4 2022 Council on Foreign Relations10:30 25-Jan-23
Steps To Planning and Implementation Of Endpoint Protection Information Security Buzz08:35 25-Jan-23
The Mac Malware of 2022 Objective-See10:56 24-Jan-23
Threat Actors Adopt Silver To Popular C2 Frameworks Information Security Buzz08:22 24-Jan-23
2022 Cyber Review – Is Your Organisation Ready For 2023 Information Security Buzz06:40 24-Jan-23
The H & 5 Ws of cybercrime & security The Times of India22:52 23-Jan-23
23rd January – Threat Intelligence Report Check Point Research08:51 23-Jan-23
Bypass techniques for multi-factor authentication BCS - The Chartered Institute for IT (Press Release)08:27 23-Jan-23
Growth Opportunity Analysis of Security in Oil & Gas, 2022-2030 GlobeNewswire (Press Release)07:09 23-Jan-23
What your SOC will be facing in 2023 Securelist06:22 23-Jan-23
In the last month
Why Altcoins Popped in Value Today The Motley Fool18:36 20-Jan-23
Following the LNK metadata trail Talos Intelligence Blog08:09 19-Jan-23
view more headlines
29 Jan 12:02

About our Advanced Persistent Threats news

Latest news on advanced persistent threats (APTs), stealthy cyber-attacks typically conducted by nation-states or state-sponsored groups that gain unauthorised access to a computer network and remain undetected for an extended period.

APT attacks are typically motivated by political or economic goals and target major business sectors such as government, defence, financial services, legal services, industrial, telecoms, and consumer goods.

The attackers often use traditional espionage techniques such as social engineering, human intelligence, and infiltration to gain access to a physical location to enable network attacks. APT attacks often install custom malware to achieve their objectives.

The median 'dwell-time', or the time an APT attack goes undetected, differs widely between regions, with the mean dwell-time for 2018 in the Americas being 71 days, EMEA being 177 days, and APAC being 204 days.

This feed updates continuously 24/7 so check back regularly. Relevance is automatically assessed, so occasionally headlines not about APT news might appear - if so please contact us regarding any persistent issues.

Publication filters

Headline Density

Sorry, no headlines or news topics were found. Please try different keywords.