Events

SAS, sweet SAS

As you may already know from our social network posts, we have rescheduled the SAS 2020 conference for November 18-21 due to the COVID-19 pandemic and to ensure your safety. Though we still think that Barcelona is a great place to meet and it will not be a “real” SAS if we cannot hug, shake hands and touch beer glasses in that beautiful city, we cannot just leave it all until November. That is why we invite you to SAS at Home, a series of webinars scheduled to kick off very soon, on the 28th-30th of April.

For each of the three days, we have prepared presentations and master classes by world-renowned information security experts, who will share their expertise, best practice and tricks. We will be talking about APT groups, zero-day vulnerabilities and exploits, sophisticated attacks, and the state of the information security industry. As for master classes, Igor Kuznetsov will cover some of the most useful techniques for reverse engineering malware during his webinar, Static Binary Analysis: The Essentials. And that is just one example. Last but not least, Eugene Kaspersky himself will deliver a keynote address in the good old SAS tradition.

To learn more about SAS at Home, follow us on Twitter and Instagram. Do not miss your chance to spend your self-isolation days as usefully as possible and meet the world’s top information security experts, even if not in person. See you all at SAS at Home!

SAS, sweet SAS

Your email address will not be published. Required fields are marked *

 

  1. Carlos Duron

    I’m interesting participante un the event

Reports

The leap of a Cycldek-related threat actor

The investigation described in this article started with one such file which caught our attention due to the various improvements it brought to this well-known infection vector.

Lazarus targets defense industry with ThreatNeedle

In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Subscribe to our weekly e-mails

The hottest research right in your inbox