Targeted Attacks

Operation Pawn Storm is an active economic and political cyber-espionage operation that has targeted high-profile entities from government institutions to media personalities. Here are its latest developments.
Details on the programming languages that gets exploited the most, the reasons behind the numbers, and the downsides of using "popular" software.
To help develop the mindset that a real-world, discerning top company executive needs to address targeted attacks, Trend Micro created a game that challenges players to protect company information. Can you pass the targeted attack test? Play the game!
The defensive measures companies can take to respond to a targeted attack, from securing sensitive data to intrusion detection and forming an incident response team.
Well-designed attacks proceed in six components that show how attackers progress within their targets. Learn about the components that make for a successful campaign to know how to form a proper threat response plan.
Exploring the motives behind targeted attacks, and why attacker groups spend so much time, effort, and resources to ensure a successful operation.
Analysis and insight on targeted attack cases in 2014, with information on state-sponsored attacks and the new tools and techniques used.
Backdoors are applications that open computers to remote access, and are used as a way to avoid detection and carry out targeted attacks. How can IT administrators secure their networks against these backdoor techniques?
This latest paper details the latest activities of Rocket Kitten, a threat actor group involved in Operation Woolen-Goldfish last March, and how they've been found to be attacking multiple targets in the Middle East.

Connect with us on