Events

InfoSecurity Europe 2011

Earlier today, at 10 am sharp, Europe’s number one security event – InfoSec – opened its doors at Earl’s Court Hall, in London, UK.

As usual, Kaspersky Lab has prepared a few interesting things for you, with half-hourly security briefings from the company’s top security experts (full schedule here – http://www.kaspersky.co.uk), and a speech from the company CEO and founder, Eugene Kaspersky.

In addition to this, tonight we’re going to the SC Magazine awards ceremony, where Kaspersky Lab is shortlisted in three categories:

  • Information Security Person of the Year
  • Best Anti-Malware Solution – Kaspersky Open Space Security 2010
  • Information Security Vendor of the Year

If you happen to be in the vicinity, please drop by and visit us at stand C41!

InfoSecurity Europe 2011

Your email address will not be published. Required fields are marked *

 

Reports

LuminousMoth APT: Sweeping attacks for the chosen few

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

WildPressure targets the macOS platform

We found new malware samples used in WildPressure campaigns: newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script working on both Windows and macOS.

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Andariel evolves to target South Korea with ransomware

In April 2021, we observed a suspicious Word document with a Korean file name and decoy. It revealed a novel infection scheme and an unfamiliar payload. After a deep analysis, we came to a conclusion: the Andariel group was behind these attacks.

Subscribe to our weekly e-mails

The hottest research right in your inbox