Events

SAS, sweet SAS

As you may already know from our social network posts, we have rescheduled the SAS 2020 conference for November 18-21 due to the COVID-19 pandemic and to ensure your safety. Though we still think that Barcelona is a great place to meet and it will not be a “real” SAS if we cannot hug, shake hands and touch beer glasses in that beautiful city, we cannot just leave it all until November. That is why we invite you to SAS at Home, a series of webinars scheduled to kick off very soon, on the 28th-30th of April.

For each of the three days, we have prepared presentations and master classes by world-renowned information security experts, who will share their expertise, best practice and tricks. We will be talking about APT groups, zero-day vulnerabilities and exploits, sophisticated attacks, and the state of the information security industry. As for master classes, Igor Kuznetsov will cover some of the most useful techniques for reverse engineering malware during his webinar, Static Binary Analysis: The Essentials. And that is just one example. Last but not least, Eugene Kaspersky himself will deliver a keynote address in the good old SAS tradition.

To learn more about SAS at Home, follow us on Twitter and Instagram. Do not miss your chance to spend your self-isolation days as usefully as possible and meet the world’s top information security experts, even if not in person. See you all at SAS at Home!

SAS, sweet SAS

Your email address will not be published. Required fields are marked *

 

  1. Carlos Duron

    I’m interesting participante un the event

Reports

LuminousMoth APT: Sweeping attacks for the chosen few

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

WildPressure targets the macOS platform

We found new malware samples used in WildPressure campaigns: newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script working on both Windows and macOS.

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Andariel evolves to target South Korea with ransomware

In April 2021, we observed a suspicious Word document with a Korean file name and decoy. It revealed a novel infection scheme and an unfamiliar payload. After a deep analysis, we came to a conclusion: the Andariel group was behind these attacks.

Subscribe to our weekly e-mails

The hottest research right in your inbox