Events

AVAR 2014 – Australia

This year’s 17th Association of anti-Virus Asia Researchers international conference, “AVAR 2014” came back to Sydney, Australia with the theme “Security Down-Under”. The event was held here also in 2003.

The arrival hall at Sydney airport did indeed look like this:

down-under

More than 170 attendees related to the anti-virus industry, CERTs, law enforcement and academia from around the world had plenty of opportunities to network and exchange thoughts and ideas.

avar-logo

The keynote, delivered by Graham Cluley, included a part where everybody was invited to join in singing “The anti-virus industry song”.

anti-song

The presentations covered subjects like the current global anti-malware ecosystem, the mobile cybercriminal underground market in a certain country, details about the Dragonfly threat actor and much more (see the link below for more information).

Kaspersky Lab’s Roman Unuchek did present his research about Android banking botnets.

roman-unuchek

fake-token

Colleagues from ESET did a great job organizing not only the conference but also an entertaining gala dinner at the “Power House Museum”.

Another highlight was the “after party” in a Bavarian Beer Cafe. That turned into a kind of power house as well when some attendees of the AVAR 2014 got on stage and rocked the place.

Last but not least there was also an opportunity to see a bit of Sydney’s scenery and wild life during a tour.

sce-ne ani-mals

We are looking forward to the next AVAR in 2015, which will be held in Vietnam.

Event site: http://www.avar2014.com/ehome/index.php?eventid=83858&

AVAR 2014 – Australia

Your email address will not be published. Required fields are marked *

 

  1. Campbell

    Upside down picture ? Witty !!! But I guess thats Koala Diplomacy…..

Reports

APT trends report Q3 2021

The APT trends reports are based on our threat intelligence research and provide a representative snapshot of what we have discussed in greater detail in our private APT reports. This is our latest installment, focusing on activities that we observed during Q3 2021.

Lyceum group reborn

According to older public researches, Lyceum conducted operations against organizations in the energy and telecommunications sectors across the Middle East. In 2021, we have been able to identify a new cluster of the group’s activity, focused on two entities in Tunisia.

GhostEmperor: From ProxyLogon to kernel mode

While investigating a recent rise of attacks against Exchange servers, we noticed a recurring cluster of activity that appeared in several distinct compromised networks. With a long-standing operation, high profile victims, advanced toolset and no affinity to a known threat actor, we decided to dub the cluster GhostEmperor.

Subscribe to our weekly e-mails

The hottest research right in your inbox