3rd Latin American Security Analysts Summit in Cancun

Last week, GReAT LatAm participated in the 3rd Latin American Security Analysts Summit, which took place in Cancun, Mexico.


It was a great event as it brought together close to 30 journalists from 12 countries in the region as well as guest presenters, such as Cesar Longa from IDC, Ruben Aquino from CERT Mexico, Independent Expert Jorge Mieres and the Cybersecurity Advisor of Ecuador Juan Andres Guerrero.

The event was divided into two working days. Presentations and a roundtable held during the first day focused on B2B threats ranging in topic from APT attacks, the BYOD trend and threats, to patch management and vulnerabilities. Presentations during the second day focused on attacks targeting the end-user discussing topics such as threats towards children and the development of crimeware in Latin America. The LatAm team also pre-launched Kaspersky Internet Security Multidevice 2014 at the conference.
In addition, all participants participated in a live demo of Kaspersky Internet Security Multidevice 2014.


Perhaps one of the most interesting presentations was the one on APT attacks with Latin American targets. This presentation was very relevant to the journalists because in the past we had only seen collateral effects of such attacks in the region as it was in case with Duqu in Chile and Red October in Brazil. However, the situation has now changed. For example, we have seen there are some local APT players carrying out targeted attacks in Latin America with regional targets.

The roundtable discussion with our guest panelists centered on enterprise security and how to deal with APTs. The opinions of our panelists were extremely appreciated since they were impartial and independent from Kaspersky Lab’s as well as any other AV company.


There was another good thing – in Kaspersky Lab we know how to work hard but we also know how to have a good time! You may appreciate what I mean with the picture below.


Follow me on twitter: @dimitribest

3rd Latin American Security Analysts Summit in Cancun

Your email address will not be published. Required fields are marked *



Lazarus targets defense industry with ThreatNeedle

In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Lazarus covets COVID-19-related intelligence

As the COVID-19 crisis grinds on, some threat actors are trying to speed up vaccine development by any means available. We have found evidence that the Lazarus group is going after intelligence that could help these efforts by attacking entities related to COVID-19 research.

Sunburst: connecting the dots in the DNS requests

We matched private and public DNS data for the SUNBURST-malware root C2 domain with the CNAME records, to identify who was targeted for further exploitation. In total, we analyzed 1722 DNS records, leading to 1026 unique target name parts and 964 unique UIDs.

Subscribe to our weekly e-mails

The hottest research right in your inbox