Targeted Attacks

The US Federal Bureau of Investigation posted a warning about ransomware targeting companies and enterprises. How serious is this threat?
Pawn Stormpawnstorm, the long-running cyber espionage campaign, added several government offices and one of the largest newspapers in Turkey to its long list of targets.
Operation Pawn Storm is an active economic and political cyber-espionage operation that has targeted high-profile entities from government institutions to media personalities. Here are its latest developments.
View more
The defensive measures companies can take to respond to a targeted attack, from securing sensitive data to intrusion detection and forming an incident response team.
Well-designed attacks proceed in six components that show how attackers progress within their targets. Learn about the components that make for a successful campaign to know how to form a proper threat response plan.
Exploring the motives behind targeted attacks, and why attacker groups spend so much time, effort, and resources to ensure a successful operation.
View more
Analysis and insight on targeted attack cases in 2014, with information on state-sponsored attacks and the new tools and techniques used.
View more
Backdoors are applications that open computers to remote access, and are used as a way to avoid detection and carry out targeted attacks. How can IT administrators secure their networks against these backdoor techniques?
Black Energy and KillDisk are malware that was used on the attack on Ukraine power facilities in December 2015. This primer discusses the different components of the threat, how it can affect enterprises, and what defenses can be set up against such a threat.

Connect with us on