• By clicking "OK" or continuing to use this site, you agree that we may collect and use your personal data and set cookies to improve your experience and customise advertising. To see how, and to learn how to control cookies, please read our Privacy Policy and Cookie Policy.
In the last 10 minutes
In the last hour
In the last 2 hours
In the last 4 hours
In the last 6 hours
Earlier today
Cyber threats surge in APAC region, reveals Group-IB report SecurityBrief New Zealand21:40 29-Feb-24
In the last 7 days
Why Altcoins Were on Fire Today The Motley Fool22:57 28-Feb-24
FBI Warns: Ubiquiti EdgeRouter is STILL Not Secure Security Boulevard18:31 28-Feb-24
An educational robot security research Securelist13:15 28-Feb-24
Evolving threat landscape: Russian hackers turn to cloud services Proactive Investors (Australia)04:46 28-Feb-24
CISA: APT29 targeting cloud accounts for initial access SearchSecurity.com - Information Security Magazine16:07 27-Feb-24
Russian Cyber Actors Target Cloud-Hosted Infrastructure National Security Agency (Press Release)16:00 26-Feb-24
SVR Cyber Actors Adapt Tactics for Initial Cloud Access United States Computer Emergency Readiness Team12:35 26-Feb-24
Securing the Information Environment: 16th Air Force joins forces with Poland Cyber Command Defense Visual Information Distribution Service17:33 23-Feb-24
Continuously fuzzing Python C extensions Trail of Bits14:38 23-Feb-24
view more headlines
1 Mar 19:43

About our Advanced Persistent Threats news

Latest news on advanced persistent threats (APTs), stealthy cyber-attacks typically conducted by nation-states or state-sponsored groups that gain unauthorised access to a computer network and remain undetected for an extended period.

APT attacks are typically motivated by political or economic goals and target major business sectors such as government, defence, financial services, legal services, industrial, telecoms, and consumer goods.

The attackers often use traditional espionage techniques such as social engineering, human intelligence, and infiltration to gain access to a physical location to enable network attacks. APT attacks often install custom malware to achieve their objectives.

The median 'dwell-time', or the time an APT attack goes undetected, differs widely between regions, with the mean dwell-time for 2018 in the Americas being 71 days, EMEA being 177 days, and APAC being 204 days.

Publication filters

Headline Density

Sorry, no headlines or news topics were found. Please try different keywords.