• RSS
  • Twitter
  • FaceBook
Home > White Papers > Venafi > In-depth Review of APT Attack Methods

In-depth Review of APT Attack Methods

By: Venafi
Venafi

Cybercriminals have found ways to bypass layered security defenses. To learn how, Raxis—a recognized penetration testing firm—reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today. 

Get the details on why this attack was successful in the white paper, Real-world Attack Case Study: Private Keys and Digital Certificates Used for Phishing and Breach of a Global Bank:

  1. Learn the 4 steps used by Russian hackers to breach the global bank
  2. Understand how hackers accessed almost 100 servers and tens of millions of customer records
  3. Find out how the bank could have discovered the breach faster and remediated more quickly to prevent damages

Fill out the form on the right to read the white paper.


 

Email this page
Published:  Jul 27, 2015
Length:  14
Type:  White Paper
Tags : 
cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks, it security, cryptographic keys, digital certificates, security controls, access control, application security, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, ssl, web service security, vulnerability management



Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter