Cyber security news for all


    Cybersecurity attacks of 2020 include APT data theft

    Just like other attackers, APT (Advanced Persistent Threats) groups steal data, disrupt business operations and damage infrastructures. In contrast to many other cyber criminals, they pursue their goals, usually over several months or years. They coordinate their activities with the security measures of their targeted victim and attack one after another. But be careful: you should not access an APT group immediately if malware is found in your system. However, your security team should keep up to date on the busiest APT groups and their preferred malware variants and be particularly careful when they find these variants on your network.

    Many Data Thefts Are Performed Simultaneously

    APT has systematically stolen hundreds of terabytes of data from at least 150 companies and institutions and demonstrably has the capacity, skills and motivation to perform dozens of data thefts simultaneously. This group’s attacks target companies from a wide range of industries in English-speaking countries. The size of their infrastructure suggests a large group with dozens or even hundreds of members.

    APT data theft

    Over the past years, the industry was fighting with the world’s largest and most serious security breaches. The experience gained was evaluated in Security Operations Centers all over the world and fed into the self-learning, symbiotic security system, which also receives data from more than 10 million sensors and is updated every 60 minutes.

    With this infrastructure, experts track the activities of many APT groups and over 300 types of advanced malware. All of this flows into your data and assessments of the financial and political dimensions of global cyber threats. Specialists can determine not only how high the risk of an exposed attack is, but also how the attackers entered the affected area, how they spread, and what can and should be done about them. They provide the victims of the attack with all of this information as context and help them to quickly classify and quickly avert critical, complex threats.

    Recent Articles

    Related Stories