While no two APTs are the same, most follow a common lifecycle. Although their activity is generally done “low and slow,” often utilizing custom malware and/or legitimate credentials to avoid detection, activity at each phase leaves a footprint in the log trail. This Threat Insight Paper examines each phase of the APT lifecycle and provides insight and examples of the log trail that is often left behind at each phase.
Kathryn Cave looks at the big trends in tech
Rupert Goodwins’ unique angle on tech change
Phil Muncaster reports on China and beyond