SHARE
Facebook X Pinterest WhatsApp

Network Security Breaches Originated As Spear Phishing

thumbnail Network Security Breaches Originated As Spear Phishing

Blaming network security breaches on advanced persistent threat has become a convenient excuse for organization. In reality, reports eWeek, the attacks are malware and not advanced at all. In fact, almost all publicized and self-declared APT attacks this year have originated as spear phishing, an un-glamorous but very effective breaching of security. “There is a […]

Apr 25, 2011
Enterprise Networking Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Blaming network security breaches on advanced persistent threat has become a convenient excuse for organization. In reality, reports
eWeek, the attacks are malware and not advanced at all. In fact, almost all publicized and self-declared APT attacks this year have originated as spear phishing, an un-glamorous but very effective breaching of security.


“There is a growing feeling among security researchers that organizations were using APT as a convenient excuse when their network security has been breached. ‘The funny thing here is that the malware used in most of the
'APT' attacks we've seen recently isn't really all that nefarious; it’s just the
new stuff on the market,' Ghosh said."

Read the Full Story at E Week

Recommended for you...

4 Phishing Examples: Spot and Avoid Fraudulent Attacks
Examples of Ransomware: A Cautionary Tale
Juniper, Cato Build Out SASE Platform Offerings
Jeff Burt
Feb 4, 2022
Pandemic Leads to Permanent Changes in Workforce, WAN: Aryaka
Jeff Burt
Jan 20, 2022
Enterprise Networking Planet Logo

Enterprise Networking Planet aims to educate and assist IT administrators in building strong network infrastructures for their enterprise companies. Enterprise Networking Planet contributors write about relevant and useful topics on the cutting edge of enterprise networking based on years of personal experience in the field.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.