Skip to content
1-888-762-8736(M-F 8:00am-5:00pm CST)
1-877-218-7353(M-F 8:00am-5:00pm CST)
href="http://www.trendmicro.com/us/enterprise/index.html" id="ENT-overview-test2" title="SEE ALL ENTERPRISE SOLUTIONS">Enterprise Overview
Attacks this quarter targeted government entities.
Find out more in the 2Q Targeted Attacks
Attacks are becoming increasingly sophisticated and targeted. Targeted attacks and advanced persistent threats in the second quarter relied on human and systemic weaknesses to compromise organizations. In order to properly address and mitigate potential attacks, enterprises must apply threat intelligence and understand the value of protecting their data.
The second quarter of 2013 saw several attacks targeting government agencies in Asian countries. Relying on human and systemic weakness, these attackers mostly used malicious file attachments and vulnerabilities to compromise organizations.
Stay updated with the latest incidents and news about targeted attacks
Learn more about securing organizations from targeted attacks
We encountered a variety of targeted campaigns in the second quarter of the year, including the EvilGrab campaign, which targeted diplomatic agencies around the world. Learn more details about the campaign and other targeted attacks.
Targeted attacks strive to remain undetected in the network in order to gain access to the company’s crown jewels or valuable data. Learn about the legitimate and malicious tools and techniques attackers often use to extract specific data from an organization.
Learn more about the tactics, tools, and strategies used in malicious attacks through our infographics.
The Danger of Compromise
Threat actors use a variety of tools and legitimate computer features to gain higher access privileges.
Raw data without intelligence is of limited value. Threat intelligence allows organizations to discern malicious from legitimate activities . Protect your organization with cybersecurity and risk management strategies direct from Trend Micro experts, including industry-specific pointers and best practices.
Get insights and advice on the latest incidents from security experts
What can we learn about the timing, damages, and targets of past announced hacking operations? Reviewing what has happened in the past and formulating insights can aid in developing countermeasures against other possible attacks.
The success of any targeted attack defense doesn’t only depend on threat intelligence and good network security software. It also depends on a well-informed, vigilant, and ethical workforce.
Read reports focusing on securing organizations against targeted attacks
Targeted attacks are not unstoppable. Trend Micro expert Jim Gogolinski has some practical suggestions so your organization won’t become the next target. Read up and join the fight against targeted attacks.
Understanding targeted attacks and advanced persistent threats is important in developing the correct mindset for formulating custom defense and security measures. Trend Micro leverages years of threat expertise to deliver compelling and comprehensive research.
Read in-depth research and analysis on specific targeted attacks and campaigns
In this new research paper, TrendLabs documents the tools, tactics, and techniques used in the targeted attack campaign called "Safe," one of the new, smaller emerging campaigns.
Read how IXESHE attackers use compromised machines as C&C servers within a target's internal network.
Get the latest research papers related to APTs and targeted attacks
Attackers always look for ways to blend their malicious traffic with legitimate traffic to avoid detection. See how these try to disguise their network traffic like common instant messenger traffic.
Multiple ongoing APT campaigns can be consistently detected at the network level. Find out how to detect APT activity by leveraging threat intelligence in network traffic analysis.
Connect with us on
| | | |