# Title RETURN TO OVERVIEW PAGE
2020-08-15 7 Ways to Prevent APT Attacks APTs –
ADVANCED PERSISTENT THREATS
2020-08-15 APT summary
2020-08-14 Advanced Persistent Threat Groups [Extensive resources]
2020-08-14 APT news reports (extensive list)
2020-08-09 How to Defend Against [APTs]
2020-07-29 APT trends report Q2 2020
2020-07-27 What is an APT?
2020-07-13 U.S. Cyber Intelligence Warning Highlights Security Threat From Nation-Sponsored ...APTs – Part 3
2020-06-26 U.S. Cyber Intelligence Warning Highlights Security Threat From Nation-Sponsored ...APTs – Part 2
2020-06-18 U.S. Cyber Intelligence Warning Highlights Security Threat From Nation-Sponsored ...APTs – Part 1
2020-05-11 Anatomy of an APT Attack and CobaltStrike Beacon’s Encoded Configuration
2020-05-11 APT reports
2020-05-08 …Mitigate APT actors targeting health sector and COVID-19 essential services
2020-04-30 APT trends report Q1 2020
2020-04-30 Sentient-based Access Control model: A mitigation technique for [APTs] in Smartphones (abstract)
2020-04-28 [APT32] Targeting the Chinese Government to Steal COVID-19 Secrets
2020-04-15 APT catalog
2020-04-09 APTs and COVID-19: ... coronavirus as a lure
2020-03-04 Breaking TA505’s Crypter with an SMT Solver
2020-02-28 Advanced Persistence [sic] Threats: The Future of Kubernetes Attacks (46:51)
2020-02-25 DPRK Hidden Cobra Update: North Korean Malicious Cyber Activity
2020-02-25 THE SPRAWLING REACH OF COMPLEX THREATS: 2019 Annual Security Roundup
2020-01-11 Methods and Tactics of Advanced Persistent Threat Actor: Wizard Spider by Matt Russell (39:02)
2019-11-27 [APTs] in 2020: Abuse of personal information, more sophisticated attacks
2019-11-20 [APTs]in 2020: abuse of personal information and more sophisticated attacks are coming
2019-10-03 Deep Insight into “FIN7” Malware Chain: From Office Macro Malware to Lightweight JS Loader
2019-09-19 FIN6 “FrameworkPOS”: Point-of-Sale Malware Analysis & Internals
2019-04-25 Unsolved Mysteries – Revisiting the APT Cold Case Files - SANS CTI Summit 2019 (29:46)
2019-04-25 Unsolved Mysteries – Revisiting the APT Cold Case Files (29:46)
2019-02-05 [APT[ Cyberattacks on Infrastructure (49:23)
2018 5 signs you've been hit with an advanced persistent threat (APT)
2018 Advanced Persistent Threat Groups
2018 Anatomy of Advanced Persistent Threats
2018 APT Attacks Targeting Financial Institutions (55:20)
2018 Defending against the Advanced Persistent Threat: An Optimal Control Approach
2018 How to combat advanced persistent threats: APT strategies to protect your organisation
2018 How to Stop Advanced Persistent Threats - eSecurity Planet
2018 NOKKI Malware Sports Mysterious Link to Reaper APT Group
2018 Potent malware that hid for six years spread through routers
2018 Why is it so easy for APTs (advanced persistent threats) to move through our networks?
2017 Advanced Persistent threat modeling defending against APTs
2017 APT lecture (Kabay)
2017 Defending Against Advanced Persistent Threats Using Game-Theory
2017 Fighting Advanced Persistent Threats with Advanced Persistent Security (1:02:09)
2017 Nation State Actors - Learn About Advanced Persistent Threats (APT) (54:01)
2017 PittyTiger Group (MITRE database)
2017 The Pillars of APT Defense (Kabay)
2017 The Spring Dragon (Lotus Blossom) Advanced Persistent Threat (30:23)
2016 Advanced Persistent Threat (8:38)
2016 Advanced Persistent Threat Modeling: Defending Against Apts (BOOK)
2016 Advanced Persistent Threats: Learn the ABCs of APTs - Part A
2016 Advanced Threat Protection and Advanced Threat Analytics Webinar (55:15)
2016 Announcing Windows Defender Advanced Threat Protection (3:39)
2016 Arbor Networks
2016 How France's TV5 was almost destroyed by 'Russian hackers'
2016 Symantec Advanced Threat Protection – Identify, prioritize & remediate today’s threats (58:16)
2015 Advanced Persistent Threat Demystified (18:27)
2015 Advanced Persistent Threat Life Cycle Management (48:59)
2015 Advanced Threat Analytics Overview (30:11)
2015 IBM -- What are Advanced Persistent Threats? (2:10)
2015 Protect Your Data From Insider Attacks and Advanced Persistent Threats (1:04:01)
2015 Protecting the Net From Advanced Persistent Threats (58:42)
2015 The best way to deal with Advanced Persistent Threats (23:34)
2015 Threat Analysis of Complex Attacks - DFIR Summit 2015 (52:44)
2014 Advanced Persistent Threats -- Fortinet (27:35)
2014 Advanced Persistent Threats Survey (White Paper)
2014 Anatomy of an Advanced Persistent Threat (APT) Group (4:01)
2014 APTs: Detection, Protection & Prevention (White Paper)
2014 Whiteboarding Blue Coat's Advanced Threat Protection: Lifecycle Defense (5:25)
2013 A Detailed Analysis of an Advanced Persistent Threat Malware (White Paper)
2013 SOPHOS -- Network security threats explained: Advanced persistent threats (3:00)
2013 Up Against APT: Dissecting the Kill Chain (26:34)
2012 Sherlock Holmes and the Case of the Advanced Persistent Threat (25:08)
2011 Combatting APTs (White Paper)
2011 Detecting APT and Zero Day Malware (13:14)
2011 Threat Analysis and Defense Strategies for SMB, Mid-Size, and Enterprise Organizations. Rev. 2. (White Paper)
2010 APTs Intro (White Paper)