The term advanced persistent threat joined the common vocabulary of the information security profession in mid-January, when Google announced its intellectual property had been the victim of a targeted attack originating from China. Google wasn’t alone; more than 30 other technology firms, defense contractors and large enterprises had been penetrated by hackers using an array of social engineering, targeted malware and monitoring technologies to quietly access reams of sensitive corporate data. In this article, we’ll define APT, dispel some myths and explain what you can do about this adversary.”]
Source: https://taosecurity.blogspot.com/2010/07/my-article-on-advanced-persistent.html

