Spear-Phishing Email: Most Favored APT Attack Bait

Spear-Phishing Email: Most Favored APT Attack Bait

This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.

Download Whitepaper
Related Whitepapers
Thanks for downloading Spear-Phishing Email: Most Favored APT Attack Bait. Here are some other white papers that we feel may be of interest to you given your recent download:
  • NSS Labs performed an independent test of the Carbon Black Cb Protection product. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v1.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Carbon Black’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com. Download whitepaper »

  • What Boards Want to Know and CISOs Need to Say Seven years ago in the SBIC report Bridging the CISO-CEO Divide, we explored the best practices security leaders could use to communicate more effectively with their C􀀁Os. CISOs were at a crossroads and just beginning to take a seat at the executive table. We provided recommendations from global leaders about ways CISOs could embrace their growing leadership role, build trust with the executive leadership team and earn the confidence of their C􀀁O. We discussed how harting a new course based on a strategic, risk-based approach to information security would drive clear business value. Download whitepaper »

  • 22 Experts Share How to Communicate Security Program Effectiveness to Upper Management. Today’s cybersecurity challenges are more complex than ever before. Technologies like Development Containers, Cloud, BYOD, and BYOA have greatly complicated the security team’s ability to understand all of the potential IT attack surface. We hope you find this e-book useful in helping you develop and communicate security metrics in your own organization. Download whitepaper »

Market Place