Monday, May 4, 2020

Word of the Day: APT

 
Word of the Day WhatIs.com
Daily updates on the latest technology terms | May 4, 2020

advanced persistent threat

An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period of time.

 

APT attacks are initiated to steal data rather than cause damage to the target organization's network. APT strategies include the use of social engineering, phishing and whaling, and zero-day exploits.

 

Because a great deal of effort and resources are required for the attacker to remain undetected, this type of exploit is usually aimed at high-value targets, such as large corporations, critical infrastructure and nation-states. Threat actors continuously rewrite malicious code in order to avoid discovery, and it is not unusual for APT groups from different countries to attack the same, important target.

APT attacks can be difficult to spot, so it's important to always monitor outbound data for anomalies. Continue reading...

Today's Takeaway

 

"Espionage efforts are often advanced persistent threats (APTs) in which attackers embed spyware early in the supply chain, as was the case with the reported Supermicro vulnerability in late 2018. This makes them particularly difficult to detect and mitigate against." - Johna Till Johnson

Buzzword Alert

 

nation-state cyberattack

Even though organizations face threats coming from many sources, one type of cyberattack should be top of mind for CISOs: those backed by nation-states. Learn why.

 

COVID-19-related cybercrime

The pandemic has provided bad actors with a global climate of fear to prey on and the surge in remote working has sparked a flurry of cybercriminal activity.

 

ransomware

Interpol has warned of a significant increase in the number of attempted ransomware attacks against hospitals on the front line of the fight against the Covid-19.

 

Enterprise Linux
New research shows how APT groups operating on behalf of the Chinese government infiltrated enterprise Linux environments for nearly a decade.

Do You Speak Security?

 
If you answer nine of 10 threat intelligence questions correctly, you'll not only be up to date on the latest cybersecurity issues, but you'll receive CPE credit as well.
Take the quiz

Stay in Touch

 

Thank you for reading! For feedback about any of our definitions or to suggest a new definition (or learning resource) please contact us at: editor@whatIs.com

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2020 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: