No matter what industry your company is in, you hear about organizations being compromised by targeted attacks nearly every day. It's no secret that we depend on technology to house our most valued intellectual property. It's also no secret that every organization can be a target for advanced attackers. This is the "new normal". Security breaches are inevitable; however, how you identify and respond to them is within your control.Read more...
Entries filed under 'APT'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
June 22, 2012 9:33 PM By Lucas Zaichkowsky
For the last two years, I've observed the information security industry buzzing about the Advanced Persistent Threat (APT), highly sophisticated malware, and 0 day exploits. There are many reasons why these topics are often misunderstood, but I believe there's an incorrect assumption that underlies them all. It causes the wrong questions to be asked and irrelevant answers to be received. It makes executives believe prevention is the key to security, when in fact security breaches are inevitable. The myth that there's a certain level to which the "bar of security" can be raised that will keep attackers out must be dispelled.Read more...
M-Trends #6 – It Pays To Be Persistent: Financially Motivated Attackers Are Shifting Toward Long-Term PresenceMay 25, 2012 2:03 PM By Grady Summers
M-Trends #5 – Some Assembly Required: Attackers Are Targeting Companies That Collaborate Within a Supply ChainMay 23, 2012 1:21 PM By Grady Summers
Our fifth M-Trend, taken from this year's M-Trends report, is a mouthful: attackers are targeting companies that collaborate within a supply chain in order to assemble a comprehensive intellectual property portfolio. However, our short title, Some Assembly Required, sums it up pretty well. What it boils down to is that attackers have moved beyond simply targeting individual companies for a single technology. Since 2011, we have seen clear indications that attackers are being instructed to go after more complex technologies that span multiple organizations.Read more...
May 21, 2012 4:14 PM By Grady Summers