
What is an Advanced Persistent Threat?
07/29/21 • 26 min
APTs are said to be the most menacing cyber attacks in existence. Designed to be stealthy, gain access to corporate networks and steal secrets, APTs can cause crippling damage to businesses and governments alike. APT stands for Advanced Persistent Threats and this week we dive deep into the nature of these threats for our audience. From exploiting vulnerabilities to exfiltrating data, we explore how these threats, and the teams of attackers behind them, can gain access to corporate and government secrets. Buckle up for this one!
Links:
What is an APT - https://www.cioinsight.com/security/apt-attack/
This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.
APTs are said to be the most menacing cyber attacks in existence. Designed to be stealthy, gain access to corporate networks and steal secrets, APTs can cause crippling damage to businesses and governments alike. APT stands for Advanced Persistent Threats and this week we dive deep into the nature of these threats for our audience. From exploiting vulnerabilities to exfiltrating data, we explore how these threats, and the teams of attackers behind them, can gain access to corporate and government secrets. Buckle up for this one!
Links:
What is an APT - https://www.cioinsight.com/security/apt-attack/
This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.
Previous Episode

The sinister nature of Stalkerware
Stalkerware is monitoring software which enables a remote user to track the activities of another user’s device. With stalkerware appearing in news headlines around the world, this week we discuss what this dangerous software is, how it spies on its victims, and how you can detect it on your device. We also discuss the privacy implications of stalkerware and share helpful resources for victims seeking help.
Links
What is spyware? https://www.bbc.com/news/av/technology-57894917
Stalkerware surges in 2021 https://www.zdnet.com/article/stalkerware-adoption-rates-surge-over-2020-hundreds-of-vulnerabilities-found/
NCSA Stalkerware tip sheet https://staysafeonline.org/resource/stalkerware-tip-sheet/
National Domestic Violence Hotline https://www.thehotline.org/
This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.
Next Episode

Apple to begin reporting Child Sexual Abuse Material (CSAM)
Apple recently announced it will begin reporting Child Sexual Abuse Material (CSAM) to law enforcement with the latest iOS 15 update. The new system aims to identify images using a process called hashing, which turns images into numbers. On this episode, we discuss how Apple’s new system will work and how this bold step in combating Child Sexual Abuse is being received by privacy-sensitive users around the world.
Links:
Apple to combat Child Sexual Abuse Material: https://www.cnbc.com/2021/08/05/apple-will-report-child-sexual-abuse-images-on-icloud-to-law.html
National Center for Missing Exploited Children (NCMEC): Home (missingkids.org)
Internet Watch Foundation (IWF): Homepage | Internet Watch Foundation (iwf.org.uk)
This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.
If you like this episode you’ll love
Episode Comments
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/speakeasy-security-241635/what-is-an-advanced-persistent-threat-26884199"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to what is an advanced persistent threat? on goodpods" style="width: 225px" /> </a>
Copy