The report provides key insights, statistics, and case studies illustrating how the tools and tactics of advanced persistent threat (APT) actors have evolved over the last year. The report also outlines approaches that organizations can take to improve the way they detect, respond to, and contain advanced attacks.
Key findings include:
- Attackers had access to victims’ environments for 205 days before they were discovered.
- Sixty-nine percent of victims learn from a third party that they are compromised.
- Attribution is becoming harder as the lines blur between tactics used cyber criminals and nation-state actors.
- Over the last year, threat actors have used stealthy new tactics to move laterally and maintain a presence in victim environments.
Download a copy of the white paper from a link in this Bank Info Security article.
Is your monitoring strategy focused on the right things? Time is of the essence.
Waverley Labs suggests a scenario-driven data gathering methodology to monitor what matters.