Blog | G5 Cyber Security

CSO’s guide to Advanced Persistent Threats

APT-based incidents are hard, if not outright impossible to prevent, making them the type of incident that often requires well-defined response and recovery plans. The topics covered in this guide are reconnaissance,weaponization and delivery, exploitation and installation, command and control, and exfiltration. The takeaway is that it’s entirely possible to defend against attacks of all types and sizes, but it isn’t easy. The processes and tools behind a true APT campaign: Reconnaissance, Weaponization and Delivery, Exploitation and Installation, Command & Control, and Exfiltration are covered.”]

Source: https://www.csoonline.com/article/2134332/cso-s-guide-to-advanced-persistent-threats.html

Exit mobile version