Cyber security news for all


    Cybersecurity attacks of 2020 include APT data theft

    Just like other attackers, APT (Advanced Persistent Threats) groups steal data, disrupt business operations and damage infrastructures. In contrast to many other cyber criminals, they pursue their goals, usually over several months or years. They coordinate their activities with the security measures of their targeted victim and attack one after another. But be careful: you should not access an APT group immediately if malware is found in your system. However, your security team should keep up to date on the busiest APT groups and their preferred malware variants and be particularly careful when they find these variants on your network.

    Many Data Thefts Are Performed Simultaneously

    APT has systematically stolen hundreds of terabytes of data from at least 150 companies and institutions and demonstrably has the capacity, skills and motivation to perform dozens of data thefts simultaneously. This group’s attacks target companies from a wide range of industries in English-speaking countries. The size of their infrastructure suggests a large group with dozens or even hundreds of members.

    APT data theft

    Over the past years, the industry was fighting with the world’s largest and most serious security breaches. The experience gained was evaluated in Security Operations Centers all over the world and fed into the self-learning, symbiotic security system, which also receives data from more than 10 million sensors and is updated every 60 minutes.

    With this infrastructure, experts track the activities of many APT groups and over 300 types of advanced malware. All of this flows into your data and assessments of the financial and political dimensions of global cyber threats. Specialists can determine not only how high the risk of an exposed attack is, but also how the attackers entered the affected area, how they spread, and what can and should be done about them. They provide the victims of the attack with all of this information as context and help them to quickly classify and quickly avert critical, complex threats.

    Recent Articles

    Millions of RDP attacks on home offices

    Since the corona related move to the home office, the number of daily hacker attacks on remote desktop connections has increased more than tenfold....

    KuCion crypto confirms 150 million dollar security breach

    Cyber criminals were able to steal from the KuCion crypto and stole coins worth millions. On the evening of last Friday, KuCion crypto noticed...

    Hungarian banks were the target of a massive DDoS attack

    Several banks and the Hungarian Telekom have been the target of a cyber attack. The attacks are said to have come in several waves...

    The source code of Windows XP is leaked

    The source code of Windows XP is currently freely accessible. The media says that data first appeared on 4chan and is currently being exchanged...

    Hackers send malicious Azure Cloud apps to Microsoft

    Microsoft has banned some Azure Cloud applications from its cloud that the company identified as part of an attack infrastructure. Microsoft describes the approach...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox