Smarter, Stealthier, Sneakier MalwareSmarter, Stealthier, Sneakier Malware
From Stuxnet to Duqu to new incarnations of Zeus, sophisticated attacks are becoming more numerous -- and harder to stop
February 9, 2012
Stuxnet. Duqu. Advanced persistent threats. Ever-evolving versions of Zeus and other malware.
Malware is not only spreading, it's getting smarter. And sneakier. For most enterprises, it's difficult just to keep up with the newest and most sophisticated attacks, let alone stop them.
Dark Reading doesn't have any silver bullets, either, but we can help you catch up with the latest on the werewolves and the vampires. In fact, that's purpose behind "Smarter, Stealthier, Sneakier Malware," a new report published this week on Dark Reading's Advanced Threats Tech Center.
The report, which offers a look back at our recent coverage of emerging malware and next-generation attacks, offers a look at some key developments from the past few months:
>> New versions of Zeus and SpyEye have developed the ability to circumvent out-of-band security technology.
>> Experts offers some advice on how to stop advanced threats after they've penetrated your outer defenses.
>> A relatively small number of attackers are responsible for most of the APTs the industry has seen so far.
>> The link between the Stuxnet and Duqu attacks leads to some key lessons for enterprises that must defend against such sophisticated attacks.
>> A new denial-of-service attack creates trouble for websites by causing content to be read slowly.
To read these articles and other coverage of the most recent advanced threats, download the full Dark Reading Alert on advanced malware.
Have a comment on this story? Please click "Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author(s)
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
Building Immunity: The 2021 Healthcare and Pharmaceutical Industry Cyber Threat Landscape Report
5 Reasons To Move your PKI Deployment to the Cloud