Spear-Phishing Email: Most Favored APT Attack Bait

Spear-Phishing Email: Most Favored APT Attack Bait
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
Download Whitepaper
Related Whitepapers
Thanks for downloading Spear-Phishing Email: Most Favored APT Attack Bait. Here are some other white papers that we feel may be of interest to you given your recent download:
  • In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for: • Leading meaningful security discussions with the board of directors • Engaging end users to protect business information • Meeting security-related compliance requirements Download whitepaper »

  • This whitepaper shares information about the next generation of ADC deployment and how the importance of that breakthrough rings loud and clear among IT executives. · Data centres finally have a more efficient high-availability deployment option for application delivery controllers · Deploying ADCs in ‘active-active clusters', instead of ‘active-passive’ involves multiple active ADCs sharing the load simultaneously · The latest version of one of the industry’s most respected ADCs is the first to support active-active clustering Download whitepaper »

  • This report demonstrates how enterprises can leverage their existing footprint of market-leading application delivery controllers for both instrumentation and policy enforcement. · The ability to observe, diagnose, and subsequently improve the performance of business-critical applications is essential · The challenge of establishing an effective application visibility and control function is only growing as tech trends become more widespread · A next-generation application visibility solution can efficiently and economically deliver unprecedented insight into virtual desktops, mobile and cloud services Download whitepaper »