Cookie Consent by Free Privacy Policy Generator 📌 VB2015 preview: advanced persistent threats

🏠 Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeiträge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden Überblick über die wichtigsten Aspekte der IT-Sicherheit in einer sich ständig verändernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch übersetzen, erst Englisch auswählen dann wieder Deutsch!

Google Android Playstore Download Button für Team IT Security



📚 VB2015 preview: advanced persistent threats


💡 Newskategorie: Malware / Trojaner / Viren
🔗 Quelle: virusbtn.com

Several conference papers to deal with targeted attacks.

There was a time when analyses of malware and viruses at the Virus Bulletin conference used the number of infections as a measure of the harm done. And while there are still many talks on what is now referred to as 'opportunistic malware', targeted attacks, or APTs, have become a prominent feature of recent conference programmes. VB2015 is no exception.

Those who think that cyber-espionage attacks are the domain of the global superpowers should attend the talk by Check Point researchers Yaniv Balmas, Shahar Tal and Ron Davidson. They will present a paper analysing a custom-made trojan called 'Explosive', which was used by the Volatile Cedar campaign (which we blogged about in April). This campaign has been traced to an actor operating out of Lebanon.

Malware attribution is notoriously hard, but sometimes researchers get help from unexpected sources. Thanks to documents leaked by Edward Snowden, we know that Canadian intelligence is 'moderately certain' that the 'SNOWGLOBE' campaign was conducted by French intelligence. Cyphort researcher Marion Marschalek will present a paper in which she analyses four malware families linked to this campaign: NBOT, Bunny, Babar and Caspar, three of which share names with well-known French cartoon characters.

The 'Derusbi' malware family may not be too familiar a name, but it dates back to at least 2008 and has been used in a number of prominent attacks, from the breach at Mitsubishi Heavy Industries in 2011 to the high-profile Anthem breach from the beginning of this year. Fortinet researchers Micky Pun, Eric Leung and Neo Tan will present a paper in which they look at the malware, its evolution and its use in state-sponsored attacks.

Read more (7 paragraphs)

...













📌 VB2015 preview: advanced persistent threats


📈 53.94 Punkte

📌 VB2015 preview: advanced persistent threats


📈 53.94 Punkte

📌 So erklärt man Advanced Persistent Threats der Geschäftsleitung


📈 25.18 Punkte

📌 So erklärt man Advanced Persistent Threats der Geschäftsleitung


📈 25.18 Punkte

📌 Advanced and inept persistent threats to be discussed at VB2017


📈 25.18 Punkte

📌 Security Know-how: Advanced Persistent Threats (APTs) erklärt


📈 25.18 Punkte

📌 3 Ways Attack Simulations Can Protect Enterprises Against Advanced Persistent Threats


📈 25.18 Punkte

📌 3 Ways Attack Simulations Can Protect Enterprises Against Advanced Persistent Threats


📈 25.18 Punkte

📌 What Are Advanced Persistent Threats (APTs), and How Do You Find Them?


📈 25.18 Punkte

📌 Security Know-how: Advanced Persistent Threats (APTs) erklärt


📈 25.18 Punkte

📌 How Organizations Can Defend Against Advanced Persistent Threats


📈 25.18 Punkte

📌 APT Security: What You Need to Know about Advanced Persistent Threats


📈 25.18 Punkte

📌 Advanced Persistent Threats (APTs) in Fintech: A Guide to Bolster Cyber Resilience


📈 25.18 Punkte

📌 Understanding Advanced Persistent Threats


📈 25.18 Punkte

📌 Kaspersky’s Advanced Persistent Threats Predictions for 2024


📈 25.18 Punkte

📌 Advanced Persistent Threats: OffSec’s Comprehensive Guide


📈 25.18 Punkte

📌 VB2015 video: TurlaSat: The Fault in our Stars


📈 21.8 Punkte

📌 VB2015 paper: Effectively testing APT defences


📈 21.8 Punkte

📌 VB2015 video: Making a dent in Russian mobile banking phishing


📈 21.8 Punkte

📌 VB2015 'Steganoprague' competition


📈 21.8 Punkte

📌 VB2015 last-minute papers announced


📈 21.8 Punkte

📌 VB2015: some important information


📈 21.8 Punkte

📌 VB2015 paper: The ethics and perils of APT research: an unexpected transition into intelligence brokerage


📈 21.8 Punkte

📌 VB2015 paper: Digital 'Bian Lian' (face changing): the Skeleton Key malware


📈 21.8 Punkte

📌 VB2015 paper: Sizing cybercrime: incidents and accidents, hints and allegations


📈 21.8 Punkte

📌 VB2015 paper: Will Android Trojans, Worms or Rootkits Survive in SEAndroid and Containerization?


📈 21.8 Punkte

📌 VB2015 paper: Effectively testing APT defences


📈 21.8 Punkte

📌 VB2015 paper: The ethics and perils of APT research: an unexpected transition into intelligence brokerage


📈 21.8 Punkte

📌 VB2015 paper: Digital 'Bian Lian' (face changing): the Skeleton Key malware


📈 21.8 Punkte

📌 VB2015 video: The Fault in our Stars


📈 21.8 Punkte

📌 VB2015 paper: VolatilityBot: Malicious Code Extraction Made by and for Security Researchers


📈 21.8 Punkte

📌 VB2015 paper: Mobile Banking Fraud via SMS in North America: Who's Doing it and How


📈 21.8 Punkte

📌 VB2015 paper: Economic Sanctions on Malware


📈 21.8 Punkte

📌 VB2015 paper: DDoS Trojan: A Malicious Concept that Conquered the ELF Format


📈 21.8 Punkte

matomo