Remove Antivirus Remove Malware Remove Webinar
article thumbnail

Webinar on cyberattacks in Ukraine – summary and Q&A

SecureList

About the webinar. In the webcast, we also provided an analysis of attacks identified using Kaspersky’s honeypot network in Ukraine; as well as an analysis of the APT attacks by Gamaredon, Cyclops Blink, Hades/Sandworm and unknown groups, using commodity malware such as PandoraBlade.

DDOS 116
article thumbnail

Webinar: Inside the REvil Ransomware – Pick Your Path

Security Boulevard

The post Webinar: Inside the REvil Ransomware – Pick Your Path appeared first on Security Boulevard. Today's ransomware actors are operating to devastating effect as evidenced by the Colonial Pipeline and JBS attacks, showing that a successful attack can disrupt any business.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Behind the scenes with the head of Kaspersky’s GReAT

SecureList

Unfortunately, none of the antivirus products that were available back then were actually able to clean the virus, so the teachers who knew I had some experience with computers asked me if I could write an antivirus for it. And slowly, this turned into a more capable antivirus product. What makes research successful?

article thumbnail

Australia Stresses Cybersecurity Precautions in Wake of Ukraine Conflict

Duo's Security Blog

But policies around out-of-date software and operating systems are just as important, because when users’ devices are out of date, they’re more at risk of exploits that leverage known flaws in software, such as malware attacks. Resources Webinar: Essential Eight - How Does Your Organization Rate?

article thumbnail

Protecting Industrial Control Systems Against Cyberattacks – Part 1

Security Boulevard

This renders the attacks undetectable and able to bypass conventional security solutions such as EDR, antivirus and other traditional security lines of defense. Industroyer , also called CrashOverride , is believed to be the malware that shut down the power grid in Kiev, Ukraine’s capital, in December 2016.

article thumbnail

Applied YARA training Q&A

SecureList

On August 31, 2021 we ran a joint webinar between VirusTotal and Kaspersky, with a focus on YARA rules best practices and real world examples. If you didn’t have the chance to watch the webinar live, you can see it as a recording on Brighttalk: Applied YARA training. Introduction. Costin here. Costin here. Vicente here.

Malware 102
article thumbnail

The Need for Zero Trust Workload Protection

Security Boulevard

Gartner has recognized this gap and recommends that we should “ at runtime, replace antivirus-centric strategies with “zero-trust execution. ” The attackers know this – and can easily create thousands of variants of malware, that will not trigger these reactive defenses. Webinar: Zero Trust Cloud Workload Protection. . [1]