Targeted Attacks

Recently, Operation Pawn Storm targeted the international investigation team of the MH17 plane crash from different sides. It appears that a coordinated attack was launched to gain unauthorized access to sensitive material of the investigation.
    The defensive measures companies can take to respond to a targeted attack, from securing sensitive data to intrusion detection and forming an incident response team.
    Well-designed attacks proceed in six components that show how attackers progress within their targets. Learn about the components that make for a successful campaign to know how to form a proper threat response plan.
    Exploring the motives behind targeted attacks, and why attacker groups spend so much time, effort, and resources to ensure a successful operation.
    Analysis and insight on targeted attack cases in 2014, with information on state-sponsored attacks and the new tools and techniques used.
    Backdoors are applications that open computers to remote access, and are used as a way to avoid detection and carry out targeted attacks. How can IT administrators secure their networks against these backdoor techniques?
    This latest paper details the latest activities of Rocket Kitten, a threat actor group involved in Operation Woolen-Goldfish last March, and how they've been found to be attacking multiple targets in the Middle East.

    Connect with us on