#
Title
RETURN TO OVERVIEW PAGE
2020-08-15
7 Ways to Prevent APT Attacks
APTs –
ADVANCED PERSISTENT THREATS
2020-08-15
APT summary
2020-08-14
Advanced Persistent Threat Groups [Extensive resources]
2020-08-14
APT news reports (extensive list)
2020-08-09
How to Defend Against [APTs]
2020-07-29
APT trends report Q2 2020
2020-07-27
What is an APT?
2020-07-13
U.S. Cyber Intelligence Warning Highlights Security Threat From Nation-Sponsored ...APTs – Part 3
2020-06-26
U.S. Cyber Intelligence Warning Highlights Security Threat From Nation-Sponsored ...APTs – Part 2
2020-06-18
U.S. Cyber Intelligence Warning Highlights Security Threat From Nation-Sponsored ...APTs – Part 1
2020-05-11
Anatomy of an APT Attack and CobaltStrike Beacon’s Encoded Configuration
2020-05-11
APT reports
2020-05-08
…Mitigate APT actors targeting health sector and COVID-19 essential services
2020-04-30
APT trends report Q1 2020
2020-04-30
Sentient-based Access Control model: A mitigation technique for [APTs] in Smartphones (abstract)
2020-04-28
[APT32] Targeting the Chinese Government to Steal COVID-19 Secrets
2020-04-15
APT catalog
2020-04-09
APTs and COVID-19: ... coronavirus as a lure
2020-03-04
Breaking TA505’s Crypter with an SMT Solver
2020-02-28
Advanced Persistence [sic] Threats: The Future of Kubernetes Attacks (46:51)
2020-02-25
DPRK Hidden Cobra Update: North Korean Malicious Cyber Activity
2020-02-25
THE SPRAWLING REACH OF COMPLEX THREATS: 2019 Annual Security Roundup
2020-01-11
Methods and Tactics of Advanced Persistent Threat Actor: Wizard Spider by Matt Russell (39:02)
2019-11-27
[APTs] in 2020: Abuse of personal information, more sophisticated attacks
2019-11-20
[APTs]in 2020: abuse of personal information and more sophisticated attacks are coming
2019-10-03
Deep Insight into “FIN7” Malware Chain: From Office Macro Malware to Lightweight JS Loader
2019-09-19
FIN6 “FrameworkPOS”: Point-of-Sale Malware Analysis & Internals
2019-04-25
Unsolved Mysteries – Revisiting the APT Cold Case Files - SANS CTI Summit 2019 (29:46)
2019-04-25
Unsolved Mysteries – Revisiting the APT Cold Case Files (29:46)
2019-02-05
[APT[ Cyberattacks on Infrastructure (49:23)
2018
5 signs you've been hit with an advanced persistent threat (APT)
2018
Advanced Persistent Threat Groups
2018
Anatomy of Advanced Persistent Threats
2018
APT Attacks Targeting Financial Institutions (55:20)
2018
Defending against the Advanced Persistent Threat: An Optimal Control Approach
2018
How to combat advanced persistent threats: APT strategies to protect your organisation
2018
How to Stop Advanced Persistent Threats - eSecurity Planet
2018
NOKKI Malware Sports Mysterious Link to Reaper APT Group
2018
Potent malware that hid for six years spread through routers
2018
Why is it so easy for APTs (advanced persistent threats) to move through our networks?
2017
Advanced Persistent threat modeling defending against APTs
2017
APT lecture (Kabay)
2017
Defending Against Advanced Persistent Threats Using Game-Theory
2017
Fighting Advanced Persistent Threats with Advanced Persistent Security (1:02:09)
2017
Nation State Actors - Learn About Advanced Persistent Threats (APT) (54:01)
2017
PittyTiger Group (MITRE database)
2017
The Pillars of APT Defense (Kabay)
2017
The Spring Dragon (Lotus Blossom) Advanced Persistent Threat (30:23)
2016
Advanced Persistent Threat (8:38)
2016
Advanced Persistent Threat Modeling: Defending Against Apts (BOOK)
2016
Advanced Persistent Threats: Learn the ABCs of APTs - Part A
2016
Advanced Threat Protection and Advanced Threat Analytics Webinar (55:15)
2016
Announcing Windows Defender Advanced Threat Protection (3:39)
2016
Arbor Networks
2016
How France's TV5 was almost destroyed by 'Russian hackers'
2016
Symantec Advanced Threat Protection – Identify, prioritize & remediate today’s threats (58:16)
2015
Advanced Persistent Threat Demystified (18:27)
2015
Advanced Persistent Threat Life Cycle Management (48:59)
2015
Advanced Threat Analytics Overview (30:11)
2015
IBM -- What are Advanced Persistent Threats? (2:10)
2015
Protect Your Data From Insider Attacks and Advanced Persistent Threats (1:04:01)
2015
Protecting the Net From Advanced Persistent Threats (58:42)
2015
The best way to deal with Advanced Persistent Threats (23:34)
2015
Threat Analysis of Complex Attacks - DFIR Summit 2015 (52:44)
2014
Advanced Persistent Threats -- Fortinet (27:35)
2014
Advanced Persistent Threats Survey (White Paper)
2014
Anatomy of an Advanced Persistent Threat (APT) Group (4:01)
2014
APTs: Detection, Protection & Prevention (White Paper)
2014
Whiteboarding Blue Coat's Advanced Threat Protection: Lifecycle Defense (5:25)
2013
A Detailed Analysis of an Advanced Persistent Threat Malware (White Paper)
2013
SOPHOS -- Network security threats explained: Advanced persistent threats (3:00)
2013
Up Against APT: Dissecting the Kill Chain (26:34)
2012
Sherlock Holmes and the Case of the Advanced Persistent Threat (25:08)
2011
Combatting APTs (White Paper)
2011
Detecting APT and Zero Day Malware (13:14)
2011
Threat Analysis and Defense Strategies for SMB, Mid-Size, and Enterprise Organizations. Rev. 2. (White Paper)
2010
APTs Intro (White Paper)