3rd Latin American Security Analysts Summit in Cancun

Last week, GReAT LatAm participated in the 3rd Latin American Security Analysts Summit, which took place in Cancun, Mexico.


It was a great event as it brought together close to 30 journalists from 12 countries in the region as well as guest presenters, such as Cesar Longa from IDC, Ruben Aquino from CERT Mexico, Independent Expert Jorge Mieres and the Cybersecurity Advisor of Ecuador Juan Andres Guerrero.

The event was divided into two working days. Presentations and a roundtable held during the first day focused on B2B threats ranging in topic from APT attacks, the BYOD trend and threats, to patch management and vulnerabilities. Presentations during the second day focused on attacks targeting the end-user discussing topics such as threats towards children and the development of crimeware in Latin America. The LatAm team also pre-launched Kaspersky Internet Security Multidevice 2014 at the conference.
In addition, all participants participated in a live demo of Kaspersky Internet Security Multidevice 2014.


Perhaps one of the most interesting presentations was the one on APT attacks with Latin American targets. This presentation was very relevant to the journalists because in the past we had only seen collateral effects of such attacks in the region as it was in case with Duqu in Chile and Red October in Brazil. However, the situation has now changed. For example, we have seen there are some local APT players carrying out targeted attacks in Latin America with regional targets.

The roundtable discussion with our guest panelists centered on enterprise security and how to deal with APTs. The opinions of our panelists were extremely appreciated since they were impartial and independent from Kaspersky Lab’s as well as any other AV company.


There was another good thing – in Kaspersky Lab we know how to work hard but we also know how to have a good time! You may appreciate what I mean with the picture below.


Follow me on twitter: @dimitribest

3rd Latin American Security Analysts Summit in Cancun

Your email address will not be published. Required fields are marked *



APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

LuminousMoth APT: Sweeping attacks for the chosen few

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

WildPressure targets the macOS platform

We found new malware samples used in WildPressure campaigns: newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script working on both Windows and macOS.

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Subscribe to our weekly e-mails

The hottest research right in your inbox