Research on C&C servers suggests existence of shadow sponsor enabling attacks in the Middle East
A good measure of changing trends in the computer industry is changes in cybercriminal behavior. The post-PC era is clearly here—and it’s already looking to be a more dangerous era with the acceleration of cyber attacks against mobile devices, social media platforms, and Macs in the past year.
Cybercriminals continue to enhance their tools to improve the effectiveness of cyber attacks. Tried-and-true crimeware such as the Black Hole Exploit Kit, automatic transfer systems, and ransomware have been refined and improved in ways that demonstrate how malware development has become increasingly professional in rigor, discipline, and methodology.
We see this sophistication play out particularly in highly targeted, advanced persistent threats that are fast becoming the cyber threats to lose sleep over because traditional detection and prevention tools are no longer adequate.
Our threat research experts track and analyze not only threat activity, but the threat actors themselves, to provide deep understanding of cyber threats and the criminals who perpetrate the attacks.
Combat sophisticated and targeted attacks by arming your organization with the proper security intelligence.
Find out how to protect your mobile devices, not just your computers, in today’s “post-PC” era.
Stay one step ahead of cybercriminals with in-depth information on the latest threats.