{"id":24834,"date":"2019-01-31T15:00:29","date_gmt":"2019-01-31T15:00:29","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=542597"},"modified":"2019-01-31T15:00:29","modified_gmt":"2019-01-31T15:00:29","slug":"what-enterprise-leaders-should-know-about-persistent-threats-in-2019","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/","title":{"rendered":"What Enterprise Leaders Should know about Persistent Threats in 2019"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"227\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/brafton6-300x227.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\"\/><\/p>\n<p>Staving off critical threats in the current cybersecurity landscape is a tall order for any size organization. As hackers continually shift and improve upon their attack and breach strategies, IT and security stakeholders must do their best to keep up and remain informed of these trends. This is one of the best and most successful ways of staying ahead of the increasing wave of threats that impact businesses across industry sectors.<\/p>\n<p>One particular security issue that\u2019s come to light recently are persistent threats. Advanced persistent threats, or APTs, represent a category of their own, and attacks that fall under this umbrella can be especially damaging.<\/p>\n<p>After delving through expert analysis, user behaviors, market trends and other resources, Trend Micro researchers have identified a few of the outstanding persistent threats that will emerge this year. Enterprise leaders that inform themselves and spread awareness of these security threats stand the best chance of safeguarding their company\u2019s sensitive data, systems and intellectual property.<\/p>\n<h3><strong>What is an APT?<\/strong><\/h3>\n<p>As Trend Micro noted in its definition, <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/advanced-persistent-threat\">APT is a term adapted from the military sector<\/a> and applied to security to demonstrate threats carried out by attackers leveraging in-house tools. Because these approaches\u00a0to attack and breach are not usually seen within the cybercriminal underground circles, they are unique and warrant their own classification.<\/p>\n<p>However, as Trend Micro noted, APTs exist in a category of their own, and are different from persistent threats and targeted attacks. Where APTs are more sophisticated and leverage more original, in-house tools to support infection, persistent threats are those that use more recognizable and familiar strategies of attack. That\u2019s not to say, though, that persistent threats aren\u2019t a major security issue for enterprises.<\/p>\n<p>In addition, the term \u201ctargeted attack\u201d typically emerges in conjunction with the APT discussion. Although APTs can involve a specific target, there is a distinction to be aware of here.<\/p>\n<p>\u201cWhile targeted attacks also involve complex stages similar to APT. their targets are different; targeted attacks aren\u2019t carried out by nation states,\u201d Trend Micro\u2019s definition stated. \u201cMeanwhile, APTs are more sophisticated in nature and require deft knowledge and skills to execute. It is also typical of APT attacks to go after a country\u2019s infrastructure, such as power grids, nuclear reactors, or fuel pipelines.\u201d<\/p>\n<p>This year, APTs as well as persistent threats will impact organizations and individual users alike. Let\u2019s examine some of the threats outlined in Trend Micro\u2019s new report, \u201c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/predictions\/2019\">Mapping the Future: Dealing with Pervasive and Persistent Threats<\/a>,\u201d as well as what these issues mean for today\u2019s enterprise leaders.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-542598\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/brafton5.jpg\" alt=\"\" width=\"800\" height=\"430\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/brafton5.jpg 800w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/brafton5-300x161.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/brafton5-768x413.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/brafton5-640x344.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/brafton5-440x237.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/brafton5-380x204.jpg 380w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"\/><\/p>\n<p><em>APTs are their own unique type of attack.<\/em><\/p>\n<h3><strong>Consumer threats: Social engineering and use of breached credentials<\/strong><\/h3>\n<p>While business leaders may not be particularly concerned about threats that target individual consumers specifically, it\u2019s important to have awareness of these, particularly if the organization operates within the tech or other advanced and highly-targeted sector. Consumer threats like those discussed in Trend Micro\u2019s report may impact an organization\u2019s client base or target audience. In addition, depending on the nature of the business, users may turn to the company as a trusted and authoritative source for information, awareness, tips and best practices. In this way, being informed and aware of consumer-targeted threats can benefit an enterprise.<\/p>\n<p>Two issues to be aware of in this arena include a rise in social engineering attacks, and the fraudulent use of stolen credentials. As Trend Micro noted in its report, individual consumers will be hit with a considerably higher rate of social engineering attacks that leverage phishing techniques. Advanced threats like this prey on victims\u2019 emotions, and utilize publicly available information to better tailor phishing messages and encourage successful intrusions.<\/p>\n<p>Often, breaches center around data theft, including highly sensitive consumer information. News reports of millions of customers and their personal information being impacted by a breach are nothing new. But this year, experts predict a sharp rise in fraudulent activity connected with the theft of breached credentials.<\/p>\n<p>\u201cBreached credentials will be actively and heavily used in fraudulent transactions as cybercriminals take the next logical step after amassing data breach info dumps in past years: using these stolen credentials,\u201d the report stated. \u201cWe will see cybercriminals signing up with stolen account credentials for mileage and rewards programs, and using them to register trolls for cyberpropaganda, manipulate consumer portals by posting fake reviews, or add fake votes to community-based polls \u2014 the applications are endless.\u201d<\/p>\n<p>As these types of instances of fraud increase, it can be helpful for organizations to put additional layers of vetting and verification in place for account set-up. Checking that an individual is who they claim to be can support more robust data security on the part of the organization and help reduce instances of fraud.<\/p>\n<h3><strong>Automation and its impact on BPC<\/strong><\/h3>\n<p>Business Process Compromise, or BPC, became a significant threat last year, wherein hackers breach certain business processes for profit. Trend Micro experts predict that this issue will not only continue this year, but will become heightened thanks to growing use of automation.<\/p>\n<p>Automated software programs overseeing and managing key business processes will likely create increased opportunities for hackers to silently infiltrate. Making matters worse is the fact that this risk could travel up the supply chain and impact an organization\u2019s vendors and partners as well.<\/p>\n<p>In this way, it\u2019s imperative for all automated systems to be properly vetting and strongly secured from the point of deployment to reduce the risk of BPC.<\/p>\n<h3><strong>New players enter the APT arena<\/strong><\/h3>\n<p>In addition to these robust predictions from Trend Micro\u2019s report, security experts at Kaspersky Labs forecast a <a href=\"http:\/\/newsbytes.ph\/2018\/11\/27\/predictions-for-2019-threat-actors-may-go-to-new-depths-to-carry-out-attacks\/\">rise in APT activity<\/a>, coming at the hands of newcomer threat actors. Reporting on Kaspersky\u2019s predictions, Newsbytes noted that even novice individuals can now access resources to support successful APT attacks.<\/p>\n<p>\u201cThe barrier to entry has never been so low, with hundreds of very effective tools, re-engineered leaked exploits and all kinds of frameworks, publicly available for anyone to use,\u201d Newsbytes explained.<\/p>\n<p>In particular, experts predict a rise in APT activity targeting organizations in South East Asia and the Middle East. Organizations inside and outside of these regions must be on the lookout for suspicious activity that can point to an APT attack, including the use of social engineering and zero-day vulnerabilities.<\/p>\n<h3><strong>Safeguarding data in the age of persistent threats<\/strong><\/h3>\n<p>In addition to these threats, Trend Micro also highlighted other security issues within its report, including:<\/p>\n<table>\n<tbody readability=\"2\">\n<tr readability=\"4\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>Cybercriminals leveraging more advanced tactics to blend in and hide their malicious activity.<\/li>\n<li>Rising exploit attacks being based on non-zero-day vulnerabilities.<\/li>\n<li>APTs targeted industrial control systems heightening risks in essential service sectors.<\/li>\n<li>Increasing risks to cloud software systems.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>It\u2019s imperative for enterprise leaders to aware of what\u2019s on the horizon within the current and emerging threat landscape. Furthermore, stakeholders must work with their internal IT security leaders as well as their technology vendors to enable a proactive protection stance against these malicious tactics.<\/p>\n<p><a href=\"https:\/\/documents.trendmicro.com\/assets\/rpt\/rpt-mapping-the-future.pdf\">Check out Trend Micro\u2019s report<\/a> to learn more about the persistent threats that we\u2019ll see this year.<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Staving off critical threats in the current cybersecurity landscape is a tall order for any size organization. As hackers continually shift and improve upon their attack and breach strategies, IT and security stakeholders must do their best to keep up and remain informed of these trends. This is one of the best and most successful&#8230;<br \/>\nThe post What Enterprise Leaders Should know about Persistent Threats in 2019 appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24835,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[5676,2862,5349,5677,5678,311,307,355],"class_list":["post-24834","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-advanted-persistent-threats","tag-apt","tag-apts","tag-bpc","tag-business-process-compromise","tag-current-news","tag-security","tag-social-engineering"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Enterprise Leaders Should know about Persistent Threats in 2019 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Enterprise Leaders Should know about Persistent Threats in 2019 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-31T15:00:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"227\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"What Enterprise Leaders Should know about Persistent Threats in 2019\",\"datePublished\":\"2019-01-31T15:00:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\\\/\"},\"wordCount\":1192,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019.jpg\",\"keywords\":[\"Advanted persistent threats\",\"apt\",\"APTs\",\"BPC\",\"business process compromise\",\"Current News\",\"Security\",\"Social Engineering\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\\\/\",\"name\":\"What Enterprise Leaders Should know about Persistent Threats in 2019 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019.jpg\",\"datePublished\":\"2019-01-31T15:00:29+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019.jpg\",\"width\":300,\"height\":227},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Advanted persistent threats\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/advanted-persistent-threats\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Enterprise Leaders Should know about Persistent Threats in 2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Enterprise Leaders Should know about Persistent Threats in 2019 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/","og_locale":"en_US","og_type":"article","og_title":"What Enterprise Leaders Should know about Persistent Threats in 2019 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-01-31T15:00:29+00:00","og_image":[{"width":300,"height":227,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"What Enterprise Leaders Should know about Persistent Threats in 2019","datePublished":"2019-01-31T15:00:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/"},"wordCount":1192,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019.jpg","keywords":["Advanted persistent threats","apt","APTs","BPC","business process compromise","Current News","Security","Social Engineering"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/","url":"https:\/\/www.threatshub.org\/blog\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/","name":"What Enterprise Leaders Should know about Persistent Threats in 2019 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019.jpg","datePublished":"2019-01-31T15:00:29+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019.jpg","width":300,"height":227},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/what-enterprise-leaders-should-know-about-persistent-threats-in-2019\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Advanted persistent threats","item":"https:\/\/www.threatshub.org\/blog\/tag\/advanted-persistent-threats\/"},{"@type":"ListItem","position":3,"name":"What Enterprise Leaders Should know about Persistent Threats in 2019"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24834"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24834\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24835"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}