IT-Security for the Next Generation conference in Erfurt

After an amazing weekend in Erfurt, Germany I’m back to an even colder Sweden. This weekend I participated in the annual Kaspersky Student Conference: IT-Security for the Next Generation (European Cup). This is a conference where we at Kaspersky invite students who have submitted interesting and innovative research papers to come and present them. So we don’t just read about their research, but also get the chance to meet them face to face and share some of our research.

As a participant from Kaspersky I was also a speaker at the event. During the two days I gave one speech about the false perception that Unix/Linux based operating systems do not need any protection against malicious code. To demonstrate my points I also invited everyone to a workshop where they had achance to get their hands on this topic practically.

But it was not only work, we had some amazing dinners and fun teambuilding. I can also promise everyone some REALLY entertaining behind- the- scenes interviews with both Kaspersky experts and other participants. Watch this space!

During the conference I had the chance to listen to many interesting presentations. We invited a total of 26 students that presented their research on many different topics. We had students talking about everything from Run-Time Malware Analysis Systems to Relay Attacks Against Wireless Payment Protocols. But there were a few students that REALLY impressed us with both their research, and their presentations. I would like to congratulate the following students for their excellent work, and winning a place to attend and compete atour international student conference in April!

  • Roberto Sponchioni – (Run-Time Malware Analysis System)
  • Christian Sieche – (CrypTool Online)
  • Viviane Zwanger – (Stealthy DNS hijacking using the Transport Driver Interface)
  • Mark M. Seeger – (The Cost of Observation for Intrusion Detection)
  • Christopher Smith – (A Relay Attack Against Wireless Payment Protocols)

More pictures and information about this conference can be found on our Facebook page:

IT-Security for the Next Generation conference in Erfurt

Your email address will not be published. Required fields are marked *



APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

LuminousMoth APT: Sweeping attacks for the chosen few

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

WildPressure targets the macOS platform

We found new malware samples used in WildPressure campaigns: newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script working on both Windows and macOS.

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Subscribe to our weekly e-mails

The hottest research right in your inbox