UBM: TECH DIGITAL RESOURCE LIBRARY

How Three Cyber Threats Transform the Role of Incident Response

Authored on: Oct 29, 2012

Download �The theft began with an instant message sent to a Google employee in China who was using Microsoft�s Messenger program� Ultimately, the intruders were able to gain control of a software repository used by the development team.� - New York Times - Cyberattack on Google Said to Hit Password System

While we still use many of the same old names - viruses, Trojans, and worms - today�s malware enables potent multistage attacks called advanced persistent threats. In these carefully sequenced attacks, criminals rely on custom and constantly changing malware placed where it will go unnoticed, returning the maximum value from their investment.

In this white paper, you will learn about:

� Real-world examples of targeted attacks, system exploits, and data theft.
� How malware enables advanced persistent threats.
� Incident response (IR) teams employing cyberforensics tools and minimizing damage.


Whitepaper