Tag: Advanced Persistent Threat

When I Attack – The Diary of an APT as It Moves Up the Kill Chain

Today I’m going to be speaking from the point of view of an attacker. But not just any attacker. I’m looking through the eyes of what our industry has deemed an Advanced Persistent Threat (APT). This is the beginning of a series of posts that will discuss what I will do as I move through the Kill Chain. READ MORE

Hunting PUTTER PANDA with Lancope

Security researchers are tracking cyber espionage attacks thought to be stemming from a unit of the Chinese PLA, operating under the codename PUTTER PANDA. As with other prominent attacks, organizations can leverage Lancope’s StealthWatch System to search their networks for IOCs from the PUTTER PANDA attacks to determine if they were a victim. READ MORE

Upcoming Black Hat Talk – Military Strategies for Cyber Security

Black Hat USA 2014 is just around the corner, and our very own Tom Cross is teed up to deliver an important talk on the use of military strategies in cyber security, entitled "The Library of Sparta." Participants will leave the session with an entirely new arsenal of military-grade tactics for taking on even the most advanced threats. READ MORE

StealthWatch v6.5 – Data Hoarding

Lancope's StealthWatch System v6.5 has introduced new security algorithms to help detect these types of activities, known as data hoarding. READ MORE

Operation SnowMan Currently Targeting US Military Personnel

A waterhole campaign is currently targeting US military personnel. The campaign was launched this week from the U.S. Veterans of Foreign Wars’ website and is associated with two previous APT campaigns. If your organization employs current or former US military personnel, you should check to see their systems have been compromised. READ MORE