Articles by Tag #apt

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

How the Monkey King maps to privilege escalation, polymorphic threat logic, and...

Learn More 0 0Oct 28 '25

APTs: Defense Strategies and Mitigation Techniques

Originally published at Cyberpath Advanced Persistent Threats (APTs) represent some of the most...

Learn More 0 0Jan 2

APTs: Tactics, Techniques, and Procedures

Originally published at Cyberpath Advanced Persistent Threats (APTs) are among the most...

Learn More 0 0Jan 2

Advanced Persistent Threats (APT): Threat Hunting Methodologies

Advanced Persistent Threats (APT): Threat Hunting Methodologies Executive...

Learn More 1 0Aug 10 '25

An intro to Helm

I’m currently learning Helm to improve how I deploy and manage Kubernetes applications. This post is...

Learn More 0 0Jun 25 '25

The $50M Intelligence Question: How Cyber Espionage ROI Is Calculated

TL;DR Nation state cyber units operate like venture capital firms — they evaluate targets...

Learn More 0 0Mar 9

Salt Typhoon APT Targets Telecoms with GhostSpider: How to Defend

Chinese APT group Salt Typhoon uses GhostSpider malware to backdoor telecoms. Learn the technical details and defense strategies.

Learn More 0 0Feb 25

Dohdoor Backdoor 2026: Exploiting DNS-over-HTTPS for Stealthy C2

Analyze the Dohdoor backdoor leveraging DNS-over-HTTPS for C2 in the 2026 threat landscape, targeting US education and healthcare sectors.

Learn More 0 0Feb 26

Ubuntu Fundamentals: APT

APT: Beyond the Basics - A Production Engineer's Perspective ...

Learn More 0 0Jun 21 '25