Like any other attacks, there is no silver bullet to securing an organisation from APT attacks. We advise organisations to understand the cyber kill chain that illustrates the various stages of an APT attack – reconnaissance, weaponisation, delivery, exploitation, installation, command and control, and actions on objectives – and adopt defence measures at each stage of the kill chain. The earlier an organisation can detect and stop an attack closer to the beginning of the kill chain, the better. In addition, we recommend organisations to subscribe to threat intelligence services that offer research and analysis about APT groups targeting their industries or geographies, so that they are informed of the latest tactics, techniques, and procedures of certain APT groups and can make intelligence-led decisions to protect their assets from potential APT attacks.
More Weekly Cyber Newsanalysis and insights
University of Hawaii Employees Targeted by Phishing Email, Wichita State University Students and Employees Suffer Email Scam
Russian Intelligence Agents Launched Cyberattack on UK-Based TV Station in 2015, Google Exposed Users’ Personal Data in March
FakeSpy Android Malware Targets Japanese Delivery Company, Heathrow Airport Fined for Data Protection Failings
French Police Sold Police Data on Dark Web, Russian Hacker Group Conducts New Low-Key Espionage Operations
Enhancing your security posture, developing your cyber strategy, and designing your incident response plans.
Ensign Systems Integration
Architecting and implementing cybersecurity solutions that bolster defences
Ensign Managed Security Services
Managing your security operations for advanced threat detection, continuous monitoring, and triage services