Research Library > Venafi > In-depth Review of APT Attack Methods

In-depth Review of APT Attack Methods

Published By: Venafi
Venafi
Published:  Jul 27, 2015
Length:  14 pages

Cybercriminals have found ways to bypass layered security defenses. To learn how, Raxis—a recognized penetration testing firm—reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today. 

Get the details on why this attack was successful in the white paper, Real-world Attack Case Study: Private Keys and Digital Certificates Used for Phishing and Breach of a Global Bank:

  1. Learn the 4 steps used by Russian hackers to breach the global bank
  2. Understand how hackers accessed almost 100 servers and tens of millions of customer records
  3. Find out how the bank could have discovered the breach faster and remediated more quickly to prevent damages

Fill out the form on the right to read the white paper.


 



Tagscybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks, it security, cryptographic keys, digital certificates, security controls, access control, application security, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, ssl, web service security, vulnerability management