The Hacker News Logo
Subscribe to Newsletter

The Hacker News — Cyber Security and Hacking News Website: Advanced Persistent Threat

Researchers Developed Artificial Intelligence-Powered Stealthy Malware

Researchers Developed Artificial Intelligence-Powered Stealthy Malware

August 09, 2018Mohit Kumar
Artificial Intelligence (AI) has been seen as a potential solution for automatically detecting and combating malware, and stop cyber attac...
A New Paradigm For Cyber Threat Hunting

A New Paradigm For Cyber Threat Hunting

June 11, 2018Mohit Kumar
It’s no secret that expecting security controls to block every infection vector is unrealistic. For most organizations, the chances are v...
Mobile Bootloaders From Top Manufacturers Found Vulnerable to Persistent Threats

Mobile Bootloaders From Top Manufacturers Found Vulnerable to Persistent Threats

September 06, 2017Swati Khandelwal
Security researchers have discovered several severe zero-day vulnerabilities in the mobile bootloaders from at least four popular device ...
Russian Hackers Hijack Satellite To Steal Data from Thousands of Hacked Computers

Russian Hackers Hijack Satellite To Steal Data from Thousands of Hacked Computers

September 10, 2015Swati Khandelwal
A group of Russian hackers, most notably the Turla APT (Advanced Persistent Threat) is hijacking commercial satellites to hide command...
FBI’s Cyber Task Force Identifies Stealthy FF-RATs used in Cyber Attack

FBI’s Cyber Task Force Identifies Stealthy FF-RATs used in Cyber Attack

September 02, 2015Wang Wei
In both April and June this year, a series of cyber attacks was conducted against the United States Office of Personnel Management (OPM)...
Operation Lotus Blossom APT - Elise Malware

Operation Lotus Blossom APT - Elise Malware

August 04, 2015Swati Khandelwal
Advanced Persistent Threat (APT) type attacks continue to emerge on a global scale. What makes these attacks deviate from the norm is o...
APT28 — State Sponsored Russian Hacker Group

APT28 — State Sponsored Russian Hacker Group

October 30, 2014Mohit Kumar
Nearly a decade-long cyber espionage group that targeted a variety of Eastern European governments and security-related organizations in...
POWELIKS — A Persistent Windows Malware Without Any Installer File

POWELIKS — A Persistent Windows Malware Without Any Installer File

August 04, 2014Mohit Kumar
Malware is nothing but a malicious files which is stored on an infected computer system in order to damage the system or steal sensitive...
APT Groups Return - Chinese Hackers Resume Cyber Espionage Operations

APT Groups Return - Chinese Hackers Resume Cyber Espionage Operations

April 11, 2014Swati Khandelwal
Year back, one of the largest “ Advanced Persistent Threat ” ( APT ) hacking groups received widespread attention from the media and from th...
Malaysian flight MH370 tragedy abused by Chinese hackers for Espionage attacks

Malaysian flight MH370 tragedy abused by Chinese hackers for Espionage attacks

March 26, 2014Wang Wei
The Mysterious Malaysian Airlines flight MH370 , a Boeing 777-200 aircraft that has gone missing by the time it flew from Kuala Lumpur t...
ASLR bypass techniques are popular with APT attacks

ASLR bypass techniques are popular with APT attacks

October 16, 2013Mohit Kumar
Address space layout randomization (ASLR) is a security technique involved in protection from buffer overflow attacks. Many recent APT ...
Detecting Advanced Persistent Threat with Network Traffic Analysis

Detecting Advanced Persistent Threat with Network Traffic Analysis

October 27, 2012Mohit Kumar
A high degree of stealthiness over a prolonged duration of operation in order to do a successful cyber attack can be defined as Advanced Per...
Exclusive Deals

Get Daily News Updates By Email

Join over 350,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.