This document discusses advanced persistent threats (APTs) and analyzes recent APT attack techniques to propose effective countermeasures. It describes the lifecycle of a generic APT attack and analyzes several popular past APTs, including Stuxnet and Flame. The document also discusses steps for detecting APTs, mounting proper responses, and developing secure networks against APT attacks. Additionally, it briefly introduces advanced volatile threats (AVTs) and argues why enterprises should prepare for them.