How Three Cyber Threats Transform the Role of Incident Response
Click here to download now
Overview: “The theft began with an instant message sent to a Google employee in China who was using Microsoft’s Messenger program… Ultimately, the intruders were able to gain control of a software repository used by the development team.” - New York Times - Cyberattack on Google Said to Hit Password System
While we still use many of the same old names - viruses, Trojans, and worms - today’s malware enables potent multistage attacks called advanced persistent threats. In these carefully sequenced attacks, criminals rely on custom and constantly changing malware placed where it will go unnoticed, returning the maximum value from their investment.
In this white paper, you will learn about:
• Real-world examples of targeted attacks, system exploits, and data theft.
• How malware enables advanced persistent threats.
• Incident response (IR) teams employing cyberforensics tools and minimizing damage.