tag:blogger.com,1999:blog-4088979.post1611076541809188413..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: My Article on Advanced Persistent Threat PostedRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-4088979.post-54540754982297207492010-07-15T08:33:27.701-04:002010-07-15T08:33:27.701-04:00I'm baffled why the word "China" is ...I'm baffled why the word "China" is classified. The source IP is coming from China, the attackers browser is set to Mandarin Chinese....<br />Quacks like a duck, walks like a duck.....<br /><br />APT, why not China....no wonder there is confusionAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-64101435774716728662010-07-13T14:09:23.335-04:002010-07-13T14:09:23.335-04:00Nice. Thanks for clearing things up Richard. I'...Nice. Thanks for clearing things up Richard. I've been dealing with APTs since 2002 and I was like, "What's up with this new term?? Why is everyone treating APT like it's something new? Why are people getting so excited about all of this?" Now it makes sense. lol<br /><br />My recommended solution for dealing with APT: Connectivity auditing!<br /><br />CheersMister Reinerhttp://misterreiner.wordpress.comnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-6321576199383282232010-07-13T13:33:12.352-04:002010-07-13T13:33:12.352-04:00Great article!
I especially like the section towa...Great article!<br /><br />I especially like the section towards the end regarding getting that knock on the door from the FBI versus soliciting them for a briefing.Alex Raitzhttp://www.splunk.comnoreply@blogger.com