Events

Looking back at BlackHat

BlackHat USA may have been wrapped up for the year but DEFCON is in full swing.
I didn’t stay around for DEFCON though, which means I finally have some time to reflect on BlackHat.

This year featured the first time Apple presented at BlackHat, about iOS security.
While the presentation lacked the details usually seen in BH talks it definitely showed Apple is trying to open up. Being (more) communicative is vital to doing security response right.

This is of particular importance for Apple as there were quite a few talks focusing on Apple’s security. Ranging from attacks on iOS to Mac-oriented EFI rootkits.

Morgan Marquis-Boire’s talk on malware attacks targeting activists in the Middle East was of particular interest, amongst others disclosing the finding of FinFisher malware.
FinFisher – which is sold to governments – has been discussed in the past but up until now samples had never been found. See a blog post on the topic here.

Overall it was another very interesting conference and I’ll be looking forward to see what the next BlackHat will bring.

David and Nikita at BlackHat

Looking back at BlackHat

Your email address will not be published. Required fields are marked *

 

  1. Waffa

    The blog post link has died out.

    If we would only know that there is ways be on computer electronic that can monitor and track humans.. 🙂

    Spiritual ware and spy systems 😉

Reports

Operation TunnelSnake

A newly discovered rootkit that we dub ‘Moriya’ is used by an unknown actor to deploy passive backdoors on public facing servers, facilitating the creation of a covert C&C communication channel through which they can be silently controlled. The victims are located in Africa, South and South-East Asia.

APT trends report Q1 2021

This report highlights significant events related to advanced persistent threat (APT) activity observed in Q1 2021. The summaries are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports.

The leap of a Cycldek-related threat actor

The investigation described in this article started with one such file which caught our attention due to the various improvements it brought to this well-known infection vector.

Subscribe to our weekly e-mails

The hottest research right in your inbox