Skip to content
1-888-762-8736(M-F 8:00am-5:00pm CST)
1-877-218-7353(M-F 8:00am-5:00pm CST)
href="http://www.trendmicro.com/us/enterprise/index.html" id="ENT-overview-test2" title="SEE ALL ENTERPRISE SOLUTIONS">Enterprise Overview
Attacks are becoming increasingly sophisticated and targeted. Equipped with the proper security intelligence, however, organizations can have a better chance to counteract these attacks.
Advanced persistent threats (APTs) or targeted attacks pertain to computer intrusions by threat actors that aggressively pursue and compromise chosen targets. Enterprises consider targeted attacks high-priority threats because of the considerable impact previous victims have sustained. The very act of conducting business and using new technologies, platforms, and entities only broaden the attack surface.
Our recommendation has always been for enterprises to develop and harness external and local threat intelligence in tandem. This site aggregates threat research on targeted attacks in general and on specific campaigns we have been monitoring. In addition to local threat intelligence, these resources will help your IT/security team gain a comprehensive understanding of targeted attacks and approach the problem of defending against these threats with the proper mindset.
In targeted attacks, threat actors need to maintain constant covert communications with the compromised machine inside your network. Know how spotting this type of malicious network traffic can help you build an effective APT defense.
Without a doubt, attackers have recognized how effective email is as a means to deliver attack tools in targeted attack campaigns. Revisit how much email security is taken for granted despite its being a common entry point for targeted attacks.
Learn what network indicators enterprises and security groups can look for when trying to determine if they have an attack in their midst.
Grounded in APT Facts
Organizations and their leaders are able to protect themselves adequately if they choose to learn how to in the process.
View more infographics
Reports of highly targeted attacks have dramatically increased in number. These attacks most commonly target civil society organizations, business enterprises, and government/military networks. Given the targeted nature of these attacks, the distribution is low; however, the impact on compromised institutions remains high. Trend Micro researchers study and monitor targeted attacks and publish their major findings in technical write-ups you can find here.
Attackers always look for ways to blend their malicious traffic with legitimate traffic to avoid detection. See how these try to disguise their network traffic like common instant messenger traffic.
Multiple ongoing APT campaigns can be consistently detected at the network level. Find out how to detect APT activity by leveraging threat intelligence in network traffic analysis.
Read how IXESHE attackers use compromised machines as C&C servers within a target's internal network.
Find out how the people behind the Luckycat campaign used or provided infrastructure for other campaigns that have also been linked to past targeted attacks such as the previously documented ShadowNet campaign.
Trusted websites viewed by employees may not be as reliable as before. Learn how threat actors can initiate an APT attack by compromising sites visited by a target organization's employees.
Defensive strategies can dramatically improve by understanding how targeted attacks work as well as knowing trends regarding threat actors' tools, tactics and procedures. By effectively using threat intelligence derived from external and internal sources combined with context-aware data protection and security tools that empower and inform human analysts, organizations are better positioned to detect and mitigate targeted attacks.
Chess is a game of strategy, and to protect your company from cybercriminals you must plan your moves like the chess masters of old. Learn how to outwit and outmaneuver those who seek to infiltrate your defenses this 2013.
One of the oft-repeated themes in media reports of cyber security events is that the "threat landscape is constantly evolving," that attacks are becoming increasingly sophisticated and targeted, and that the men and women behind them are better resourced than ever before.
Get a rundown of and stay updated on what organizations encounter when faced with this challenge. Browse the featured blog entries:
Connect with us on
| | | |