• By clicking "OK" or continuing to use this site, you agree that we may collect and use your personal data and set cookies to improve your experience and customise advertising. To see how, and to learn how to control cookies, please read our Privacy Policy and Cookie Policy.
OK
Advertisement
In the last 10 minutes
In the last 8 hours
Earlier today
Yesterday
2nd October – Threat Intelligence Report Check Point Research09:22 2-Oct-23
In the last 7 days
Defending Democracy and Standing Up for Civil Society Cybersecurity and Infrastructure Security Agency (Press Release)14:23 29-Sep-23
CISA and UK NCSC Hold Inaugural Meeting of Strategic Dialogue on Cybersecurity of Civil Society Under Threat of… Cybersecurity and Infrastructure Security Agency (Press Release)13:32 29-Sep-23
APT34 Deploys Phishing Attack With New Malware Trend Micro Simply Security03:26 29-Sep-23
Bitdefender Unveils Powerful New Threat Intelligence Solution Business Wire (Press Release)09:02 28-Sep-23
FTC Continues to Stake Out Role as Key AI Regulator Minding Your Business09:11 26-Sep-23
In the last month
Sophisticated APT Clusters Target Southeast Asia Infosecurity magazine12:43 25-Sep-23
Examining the Activities of the Turla APT Group Trend Micro Simply Security04:27 22-Sep-23
N. Korea’s Hacking Groups KBS World Radio04:06 22-Sep-23
Threat hunting 101: How to outthink attackers Security Intelligence15:55 21-Sep-23
Ex-Conti and FIN7 actors collaborate with new backdoor Security Intelligence15:55 21-Sep-23
view more headlines
3 Oct 17:41

About our Advanced Persistent Threats news

Latest news on advanced persistent threats (APTs), stealthy cyber-attacks typically conducted by nation-states or state-sponsored groups that gain unauthorised access to a computer network and remain undetected for an extended period.

APT attacks are typically motivated by political or economic goals and target major business sectors such as government, defence, financial services, legal services, industrial, telecoms, and consumer goods.

The attackers often use traditional espionage techniques such as social engineering, human intelligence, and infiltration to gain access to a physical location to enable network attacks. APT attacks often install custom malware to achieve their objectives.

The median 'dwell-time', or the time an APT attack goes undetected, differs widely between regions, with the mean dwell-time for 2018 in the Americas being 71 days, EMEA being 177 days, and APAC being 204 days.


Publication filters

Headline Density

Sorry, no headlines or news topics were found. Please try different keywords.