Today at the Kaspersky Lab Security Analyst Summit, researchers disclosed details on the Poseidon APT group, a group of hackers who blackmail targets into a fake business relationship where they can further steal data.
Browsing Category: Security Analyst Summit
Chris Rouland, an expert when it comes to the security of the internet of things, stressed the modern-day equivalent of the Melissa worm could be imminent.
The security industry has done a good job of following the government’s lead when it comes to developing new approaches and strategies.
Microsoft’s John Lambert said today at Kaspersky Lab’s Security Analyst Summit that today’s network defenders need to be pliable, share threat information, and view their network dependencies as attackers do.
At the Security Analyst Summit, Kaspersky Lab researchers unveiled three cybercrime outfits—Metel, GCMAN, and Carbanak 2.0—targeting Russian banks with APT-style tactics.
Advanced attacks against industrial control systems are intelligence gathering operations in order to learn the inner workings of ICS infrastructure to facilitate sabotage.
At last week’s Security Analyst Summit Kris McConkey, part of PricewaterhouseCoopers’ UK Cyber Threat Operations team, discusses OpSec failures: How attackers are still humans and make mistakes like sometimes using personal email addresses and real names in their campaigns.
Dennis Fisher and Mike Mimoso discuss their takeaways from the SAS 2015 conference, including the Equation Group APT analysis, hacking car washes, indexing the dark web and hacking home appliances.
In this video from last week’s Security Analyst Summit, HackerOne’s Katie Moussouris explains the main thing companies that want to start a bounty program or vulnerability incentive program need to know: There is no one size fits all.
Trey Ford from Project Sonar describes the group’s initiative at Kaspersky’s Security Analyst Summit. The Rapid 7 service scans public-facing networks for apps, software, and hardware, then analyzes that cache of information to gain insight to trends and common vulnerabilities.