Threat and Vulnerability Management

The APT Lifecycle and its Log Trail

Provided by LogRhythm

Category Threat and Vulnerability Management

Type White Paper

Length 4

Publish Date November 04 2015

Date posted July 25 2016

Overview

While no two APTs are the same, most follow a common lifecycle. Although their activity is generally done “low and slow,” often utilizing custom malware and/or legitimate credentials to avoid detection, activity at each phase leaves a footprint in the log trail. This Threat Insight Paper examines each phase of the APT lifecycle and provides insight and examples of the log trail that is often left behind at each phase.

Blogs

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Do you use any voice/digital assistants to help you work?