{"id":25967,"date":"2022-03-21T14:47:00","date_gmt":"2022-03-21T13:47:00","guid":{"rendered":"https:\/\/perseus.de\/advanced-persistent-threat\/"},"modified":"2026-03-27T11:27:40","modified_gmt":"2026-03-27T10:27:40","slug":"advanced-persistent-threat","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/advanced-persistent-threat\/","title":{"rendered":"Advanced Persistent Threat"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"25967\" class=\"elementor elementor-25967 elementor-22058\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Advanced Persistent Threat<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25801\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d889425 e-flex e-con-boxed e-con e-parent\" data-id=\"1d889425\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-68561973 e-con-full e-flex e-con e-child\" data-id=\"68561973\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This term translates as \u2018advanced persistent threat\u2019 and refers to particularly sophisticated cyberattacks. Advanced persistent threats are usually targeted and can cause significant damage. On the one hand, through the destruction of data (sabotage). On the other hand, through the theft of particularly valuable data, such as state secrets or product innovations (espionage).   <\/p><h2> <\/h2><h4>What exactly does the term \u2018Advanced Persistent Threat\u2019 mean?<\/h4><p>In the case of an Advanced Persistent Threat, cybercriminals invest a great deal of time, effort and expertise in carrying out a targeted attack on a company. It is this determination that sets Advanced Persistent Threats apart from many other cyber risks. Typical targets of an Advanced Persistent Threat include:  <\/p><ul><li>Public authorities<\/li><li>Research institutions<\/li><li>A country&#8217;s critical infrastructure<\/li><li>Large and medium-sized enterprises, particularly in the high-tech sector <\/li><li>Particularly innovative companies, such as the \u2018hidden champions\u2019<\/li><li>Military installations, the defence industry and their partner and supplier companies<\/li><\/ul><p> <\/p><p>Advanced Persistent Threats are characterised by cybercriminals\u2019 long-term, planned approach:<\/p><ul><li>The first step is gaining initial access to the network. Once this is achieved, malware that appears to have been distributed at random can be deployed, such as Trojan horses in an email attachment. <\/li><li>After that, the cybercriminals attempt to gain and expand their access to the network.<\/li><li>They employ a range of techniques tailored to the situation, such as: malware for specific tasks, setting up strategically important backdoors, establishing and expanding a covert IT infrastructure, and responding in real time to the security measures of the targeted system<\/li><\/ul><p> <\/p><p>Typically, cybercriminals involved in an Advanced Persistent Threat (APT) aim to remain undetected for as long as possible. This allows them to continuously spy on up-to-date data or cause the greatest possible damage at a later date. Advanced Persistent Threats often persist for a very long time before they are detected \u2013 in some cases, the median duration is said to be over 400 days. Most Advanced Persistent Threats are discovered by outsiders or by chance.   <\/p><h4> <\/h4><h4>Where do I encounter advanced persistent threats in my day-to-day work?<\/h4><p>Advanced Persistent Threats can potentially strike anywhere and everywhere. \u2018Anywhere\u2019 in the sense that cybercriminals can exploit a wide range of entry points to gain access to your company\u2019s IT systems. These include:  <\/p><ul><li>Malware in email attachments (e.g. Trojan horses, keyloggers)<\/li><li>Phishing, spear phishing<\/li><li>Advertising via compromised web applications<\/li><li>Social engineering<\/li><li>Malware on removable storage devices such as USB sticks or USB-powered promotional items<\/li><li>Workstations that are left unattended for a short time<\/li><li>CEO-Fraud<\/li><li>Malware on \u2018shadow IT\u2019 (devices, services and programmes used for both personal and business purposes. These are often overlooked by many security measures and remain, so to speak, in the shadows.)<\/li><\/ul><p> <\/p><p>Not at all, in the sense that an Advanced Persistent Threat is not usually noticeable to the average user. Cybercriminals place great emphasis on this in order to avoid what they see as premature detection. <\/p><h2> <\/h2><h4>What can I do to protect myself against advanced persistent threats?<\/h4><p><strong> <\/strong><\/p><p><strong>Prevention<\/strong><\/p><p>As a general rule: adopt a multi-layered approach wherever possible. In the case of an Advanced Persistent Threat, cybercriminals invest a great deal of time in identifying and exploiting vulnerabilities in your company\u2019s network. Minimise your attack surface by maximising your cybersecurity, including through:  <\/p><ul><li>Technical measures such as firewalls, antivirus software, anti-spyware software, encrypted Wi-Fi and two-factor authentication<\/li><li>Security and hygiene measures: Keep operating systems, software and, in particular, antivirus scanners up to date by installing updates. Carry out frequent, thorough scans. <\/li><li>Employee-focused measures: training, awareness-raising, and information campaigns. Your employees are a key safeguard for your business, particularly when it comes to the large amount of malware spread via email. <\/li><li>Organisational and technical measures: separate networks for different departments, tiered access rights, prompt deletion of all user accounts belonging to former employees<\/li><li>Administrator actions: monitoring outgoing data traffic for anomalies, monitoring logins for anomalies (e.g. an unusually high number of logins at night), whitelisting programmes, paying particular attention to large volumes of data in unusual locations and unusual compression formats<\/li><\/ul><p><strong> <\/strong><\/p><p><strong>If you detect an Advanced Persistent Threat<\/strong><\/p><p>Stay calm. Above all, make sure the cybercriminals don\u2019t realise they\u2019ve been found out. For the time being, don\u2019t make any changes to your IT infrastructure, don\u2019t clean up any systems \u2013 nothing.  <\/p><ul><li>Take action outside your IT infrastructure. For example, call your IT department or IT service provider on your mobile phone so that the analysis phase of the incident response can begin as soon as possible. <\/li><li>IMPORTANT: In the case of an Advanced Persistent Threat, cybercriminals are likely monitoring your entire network, including emails, VoIP calls and calendars. Do not mention here that you have discovered the Advanced Persistent Threat. <\/li><li>Engage external IT security experts, such as Perseus, who have extensive experience in incident response relating to advanced persistent threats, as soon as possible.<\/li><li>Please also notify the relevant authorities. They will treat your cyber incident in strict confidence. On the one hand, this information is important for better protecting you and your business. On the other hand, it is possible that your business is not the ultimate target of the advanced persistent threat, but that you can make a significant contribution to the investigation.  <\/li><\/ul><p> <\/p><p>Organisations you can contact include:<\/p><ul><li>The <a href=\"https:\/\/www.bsi.bund.de\/DE\/Themen\/Unternehmen-und-Organisationen\/Cyber-Sicherheitslage\/Reaktion\/CERT-Bund\/cert-bund_node.html\">Federal Computer Emergency Response Team<\/a> (CERT-Bund) of the Federal Office for Information Security (BSI)<\/li><li>Your local Office for the Protection of the Constitution (LfV)<\/li><li>The police, or more specifically: the <a href=\"https:\/\/www.allianz-fuer-cybersicherheit.de\/Webs\/ACS\/DE\/IT-Sicherheitsvorfall\/Unternehmen\/Kontakt-zur-Polizei\/kontakt-zuer-polizei.html\">cybercrime units within the police forces of the federal states and the federal government responsible for business affairs<\/a>.<\/li><\/ul><h2> <\/h2><h4>Interesting background information<\/h4><p>The guidance document \u201c<a href=\"https:\/\/www.allianz-fuer-cybersicherheit.de\/SharedDocs\/Downloads\/Webs\/ACS\/DE\/BSI-CS\/BSI-CS_115.pdf?__blob=publicationFile&amp;v=1\">Protect yourself against targeted cyber attacks by professionals<\/a>\u201d published by the Federal Office for Information Security (BSI) provides a good, in-depth introduction to this topic.<\/p><p>The BSI\u2019s working document <a href=\"https:\/\/www.allianz-fuer-cybersicherheit.de\/SharedDocs\/Downloads\/Webs\/ACS\/DE\/ATP\/Teil4_Reaktion_Technisch.html?nn=522758\">\u2018First Aid in the Event of an APT Attack<\/a>\u2019 provides initial guidance on how to respond once an Advanced Persistent Threat has been detected. As this document is publicly available, you will come across the message \u2018Content removed\u2019 in many places \u2013 as this information would also be highly valuable to cybercriminals. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ad73d61 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ad73d61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Advanced Persistent Threat This term translates as \u2018advanced persistent threat\u2019 and refers to particularly sophisticated cyberattacks. Advanced persistent threats are usually targeted and can cause significant damage. On the one hand, through the destruction of data (sabotage). On the other hand, through the theft of particularly valuable data, such as state secrets or product innovations [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[57],"tags":[],"class_list":["post-25967","post","type-post","status-publish","format-standard","hentry","category-cyber-glossary"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Advanced Persistent Threat - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/advanced-persistent-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Advanced Persistent Threat - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Advanced Persistent Threat This term translates as \u2018advanced persistent threat\u2019 and refers to particularly sophisticated cyberattacks. Advanced persistent threats are usually targeted and can cause significant damage. On the one hand, through the destruction of data (sabotage). On the other hand, through the theft of particularly valuable data, such as state secrets or product innovations [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/advanced-persistent-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-21T13:47:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-27T10:27:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/advanced-persistent-threat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/advanced-persistent-threat\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Advanced Persistent Threat\",\"datePublished\":\"2022-03-21T13:47:00+00:00\",\"dateModified\":\"2026-03-27T10:27:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/advanced-persistent-threat\\\/\"},\"wordCount\":1004,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/advanced-persistent-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyber Glossary\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/advanced-persistent-threat\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/advanced-persistent-threat\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/advanced-persistent-threat\\\/\",\"name\":\"Advanced Persistent Threat - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/advanced-persistent-threat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/advanced-persistent-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-03-21T13:47:00+00:00\",\"dateModified\":\"2026-03-27T10:27:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/advanced-persistent-threat\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/advanced-persistent-threat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/advanced-persistent-threat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/advanced-persistent-threat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Advanced Persistent Threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Advanced Persistent Threat - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/advanced-persistent-threat\/","og_locale":"en_US","og_type":"article","og_title":"Advanced Persistent Threat - Perseus Technologies","og_description":"Advanced Persistent Threat This term translates as \u2018advanced persistent threat\u2019 and refers to particularly sophisticated cyberattacks. Advanced persistent threats are usually targeted and can cause significant damage. On the one hand, through the destruction of data (sabotage). On the other hand, through the theft of particularly valuable data, such as state secrets or product innovations [&hellip;]","og_url":"https:\/\/perseus.de\/en\/advanced-persistent-threat\/","og_site_name":"Perseus Technologies","article_published_time":"2022-03-21T13:47:00+00:00","article_modified_time":"2026-03-27T10:27:40+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/advanced-persistent-threat\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/advanced-persistent-threat\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Advanced Persistent Threat","datePublished":"2022-03-21T13:47:00+00:00","dateModified":"2026-03-27T10:27:40+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/advanced-persistent-threat\/"},"wordCount":1004,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/advanced-persistent-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyber Glossary"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/advanced-persistent-threat\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/advanced-persistent-threat\/","url":"https:\/\/perseus.de\/en\/advanced-persistent-threat\/","name":"Advanced Persistent Threat - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/advanced-persistent-threat\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/advanced-persistent-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-03-21T13:47:00+00:00","dateModified":"2026-03-27T10:27:40+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/advanced-persistent-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/advanced-persistent-threat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/advanced-persistent-threat\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/advanced-persistent-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Advanced Persistent Threat"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/25967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=25967"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/25967\/revisions"}],"predecessor-version":[{"id":25968,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/25967\/revisions\/25968"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=25967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=25967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=25967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}