Events

The CARO 2010 Technical Workshop

Today was the opening day of the CARO 2010 Workshop, which is hosted by F-Secure in Helsinki.

Mikko Hypponen, the CRO of F-Secure opened the conference by announcing this year’s theme, which is Big Numbers. With between 30,000-50,000 new malicious samples daily, this is a very hot topic in the industry.

One of the highlights of the conference was undoubtedly the keynote address by Dr Alan Solomon.

Dr Solly spoke a bit about the history of computer viruses, starting with the Brain boot sector virus, but also about the founding of CARO and EICAR.

The industry has come a long way from the days of 5 new samples a week. Sample-sharing initiatives, more efficient ways of fighting malicious code and malicious websites were just a few of the subjects discussed. Our own Roel Schouwenberg spoke a bit earlier about the mentality shift required for moving from detecting continuously changing threats to detecting their original sources.

For live coverage of the event, feel free to follow @caroworkshop on Twitter or watch for the tag #CAROHELSINKI.

The CARO 2010 Technical Workshop

Your email address will not be published. Required fields are marked *

 

Reports

Lyceum group reborn

According to older public researches, Lyceum conducted operations against organizations in the energy and telecommunications sectors across the Middle East. In 2021, we have been able to identify a new cluster of the group’s activity, focused on two entities in Tunisia.

GhostEmperor: From ProxyLogon to kernel mode

While investigating a recent rise of attacks against Exchange servers, we noticed a recurring cluster of activity that appeared in several distinct compromised networks. With a long-standing operation, high profile victims, advanced toolset and no affinity to a known threat actor, we decided to dub the cluster GhostEmperor.

APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

Subscribe to our weekly e-mails

The hottest research right in your inbox