Advanced threats use less conventional means to attack or infect a system. Heuristic
scanning can
detect advanced threats to mitigate damage to company systems. Enabling ATSE adds
another layer of
protection to systems against threats that are typically used in targeted attacks.
Some types of advanced threats that ATSE detects include:
-
Exploits:
Exploits are pieces of code purposely created by attackers to take advantage
of software vulnerabilities. Such code is typically incorporated into
malware.
-
Targeted attacks: Targeted attacks refer to
computer intrusions staged by threat actors that aggressively pursue
and compromise specific targets. These attacks seek to maintain
a persistent presence within the target's network so that the attackers
can move laterally and extract sensitive information.
-
Zero-day threats: Zero-day threats exploit previously
unknown vulnerabilities in software.
|
Tip
Trend Micro recommends enabling ATSE.
|