Events

CODE BLUE in Tokyo

On February 17th (MON) – 18th (TUE), 2014 we were at an event in Tokyo called “CODE BLUE”, a new international information security conference originating from Japan.

2082160931

Even though this conference was being held for the first time, no less than 400 visitors attended, with people coming from about 10 different countries.

The overall atmosphere at the event was kind and friendly and everything seemed to go smooth and swiftly.

Topics on the first day were the keynote by Jeff Moss, followed by presentations about “The Current State of Automotive Security”, “A Security Barrier Device”, “Remote linux exploits” and hard-/software related hard disk matters.

For the Japanese speakers among you there’s a more detailed review of the event here.

OLYMPUS DIGITAL CAMERA

The second day also offered plenty of interesting topics.

I must say that it was a big surprise to me that so many people attended an event held for the first time. I wasn’t sure what to expect but I am glad that I decided to attend.
While the event itself is ‘new’, the organizers and staff are all veterans in the security field with much experience and know-how.

During the two days of presentations I spotted only ONE person briefly sleeping in their seat; and that’s not because so much coffee was consumed (there was actually one moment where ALL the coffee had run out), but because the overall content of the program was too interesting to miss.

CODE BLUE will be held annually. One of the important aspects of the conference is that it tries to give opportunities to researchers from countries where English is not the native language.

The simultaneous interpreters did an amazing job, offering translations in to English and Japanese.

At the close of CODE BLUE, it was announced that the event will be held again before the end of 2014. So make sure to keep an eye on further announcements so as not to miss it.

CODE BLUE in Tokyo

Your email address will not be published. Required fields are marked *

 

Reports

APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

LuminousMoth APT: Sweeping attacks for the chosen few

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

WildPressure targets the macOS platform

We found new malware samples used in WildPressure campaigns: newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script working on both Windows and macOS.

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Subscribe to our weekly e-mails

The hottest research right in your inbox