Inspired by Insecure

default deny

06/02/16 Blog # , , ,

#TheSAS2016: The city never sleeps

Security Analyst Summit 2016

Security Analyst Summit 2016

TITLE: The city never sleeps
SPEAKERS: Yury Namestnikov, Denis Makrushin

Among other things, security professionals rely on strict security policies to limit the internet access for applications and to deter cyber-criminals roaming through a corporate infrastructure. However, then employees go to sleep, many dangers lurk within corporate networks.

In this presentation, we will discuss what happens late at night when the dark side of applications wake up and run. We will show you how a malicious hacker doesn’t even need to knock on the corporate network’s from door, all because the city never sleeps. We will tell you stories about innocent Notepad, AutoCAD, Messenger and SAP modules doing dangerous things late at night when everyone is asleep.

06/02/16 Blog 0 likes no responses # , , ,
16/04/15 |Blog # , ,

Deny the Hellsing APT by default

Efficiency Default Deny on the initialization stage of Hellsing lifecycle

Kaspersky Lab experts have discovered a new APT campaign that targets government institutions, mainly in the APAC region. It was named “Hellsing” after the string containing the project directory name found within the attack components’ code.

Special for Kaspersky Lab Business Blog

Kaspersky Lab Business Blog

Continue reading

0 likes no responses
21/03/15 |Blog # , , , , , ,

Default Deny против APT

Стадии развертывания компонентов платформы Regin

Многие годы внимание киберпреступников было направлено на ценные данные обычных пользователей. Собирая «с миру по нитке», преступники выуживали платежную информацию пользователей с их компьютеров при помощи банковского вредоносного программного обеспечения и тем самым крали миллионы долларов со счетов банков и платежных систем. Однако в настоящее время фокус внимания киберпреступных групп заметно сместился в сторону целенаправленных атак (Advanced Persistent Threat, APT) на корпоративные инфраструктуры, в ходе которых также используется специализированная малварь. Continue reading

0 likes no responses
Stay up to date

Twitter
When Smart Medicine breaches its "First Do No Harm" principle. #IoT #TheSAS2017 https://t.co/59Jn20idWW
#Petya is a Wiper, not ransomware: threat actor cannot decrypt victims’ disk, even if a payment was made. https://t.co/nppCEaodrF
Stack Buffer Overflow #Vulnerability in Microsoft Skype v7.3.6 https://t.co/RjSDyi00I9
Smoking kills. And vaporizing kills too: how your e-cigarette can hack your computer. https://t.co/f57jyKRdnS
Honeypots and the Internet of Things: analysis of data harvested #IoT honeytraps https://t.co/OpLh1PUnO0
Recent Comments
- Sergey to Погружение в даркнет: Снифаем выходную ноду Tor и анализируем получившийся контент
лучше заходиииииииить через тор онлайн http://torproject.online/,...
- Denis Makrushin to The problems of heterogeneous means of protection
Of course!...
- K. Olbert to The problems of heterogeneous means of protection
Insightful diagram, Denis. Would you mind if I use it in a presentation, with credit, of course?...