Threat and Vulnerability Management

The APT Lifecycle and its Log Trail

Provided by LogRhythm

Category Threat and Vulnerability Management

Type White Paper

Length 4

Publish Date November 04 2015

Date posted July 25 2016


While no two APTs are the same, most follow a common lifecycle. Although their activity is generally done “low and slow,” often utilizing custom malware and/or legitimate credentials to avoid detection, activity at each phase leaves a footprint in the log trail. This Threat Insight Paper examines each phase of the APT lifecycle and provides insight and examples of the log trail that is often left behind at each phase.



Thinking Different

Taking baby steps with Big Data

Jon Collins’ in-depth look at tech and society


China Rising

The South China Sea: A new hacking hotspot

Phil Muncaster reports on China and beyond


CIO Watch

Losing CIOs to startups could be costly

Mark Chillingworth on IT leadership

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk


Crowdfunding: Viable alternative to VC funding or glorified marketing?