Hi [[ session.user.profile.firstName ]]

Zero-days in the wild: 2019 retrospective

Attacks that involve zero-day vulnerabilities remain among the most dangerous with more and more investment into zero-day exploits taking place in the criminal world. Zero-day vulnerabilities involve the exploitation of an undiscovered and unfixed weaknesses, which makes them particularly difficult to detect and prevent. If such a vulnerability is found by criminals first, it can be used to create an exploit – a special malicious program that will have open access to an entire system. This “hidden threat” attack scenario is widely used by sophisticated actors in APT attacks and was used to conduct a number of incidents in 2019.
Security researcher Boris Larin will present an overview of four zero-day vulnerabilities detected and disclosed by Kaspersky in 2019, following mechanisms that detected the exploit, which included Miscosoft Windows OS and Google Chrome exploits.
In this session, Boris will share:
•What is happening in the zero-day market
•What framework was often used to implement many zero-day exploits
•What work was done by him and his team when working on the following vulnerabilities:
CVE-2019-0797, CVE-2019-0859, CVE-2019-1458, CVE-2019-13720
Recorded Apr 21 2020 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Boris Larin, senior security researcher at Kaspersky
Presentation preview: Zero-days in the wild: 2019 retrospective

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Best practices: how to find network threats effectively using NIDS Oct 21 2020 10:00 am UTC 29 mins
    Tatyana Shishkova, security analyst at Kaspersky
    Protecting corporate networks is challenging. Large organizations are attacked daily and more often than not, the speed at which you find threats entering the network is vital. Network Intrusion Detection Systems (NIDS) are key components that help protect the network perimeter and analyze network traffic. But how can they be used most effectively?


    In this webinar Tatyana Shishkova, a security researcher at Kaspersky, who specializes in threat detection, will share her expertise and cover the following topics:

    ∙ What NIDS is, how it works and where to start
    ∙ What is possible with threat detection
    ∙ Best practices and Suricata rules
    ∙ NIDS limitations and possible workarounds
  • Preventing cybercrime with SOC augmentation Oct 19 2020 9:00 am UTC 36 mins
    Ewan Hubac, Product Manager, EclecticIQ; Artem Karasev, Senior Product Marketing Manager, Kaspersky
    The connected world is under constant threat of cybercrime. As enterprises further their digital transformation, they need to constantly adapt to the rapidly evolving cyberthreat landscape, while weighing up cyber-risks against overall business goals and priorities. Staying ahead of cyberthreats is a race against time. Having the right people, technology and processes is no longer enough. Cybersecurity practices, like SOC and incident response, need to be augmented with timely, relevant, and actionable cyberthreat intelligence.

    From informing strategic decisions to boosting incident containment and response, cyberthreat intelligence supports security leaders and practitioners in their mission to protect their businesses and support growth. Some key elements to that mission are:

    - Informing executive management of the current threat landscape and demonstrating return on investment

    - Shifting the enterprise security posture from reactive to proactive, and preventing breaches even before they occur, through seamless integration of technology, processes and data

    - Having all relevant information in a single pane of glass to facilitate threat hunting and response, and contribute to incident management and prioritization activity

    The Kaspersky and EclecticIQ collaboration on their portfolio of integrations guarantees high-end Cyber Threat Intelligence analysis, empowering organizations to stay ahead of cybercrime. Join us on a live webinar to learn more about the strength of our combined portfolio and offering, with a live product demonstration.
  • Stalkerware: at the intersection of intimate partner violence and cybercrime Oct 6 2020 1:00 pm UTC 75 mins
    UNODC, UN Women, F-Secure, European Network for the Work with Perpetrators of Domestic Violence, Kaspersky
    Please join representatives from the Coalition Against Stalkerware, the UN Office on Drugs and Crime, and UN Women for a discussion about how stalkerware, a form of tech-facilitated abuse, can act as a tool for intimate partner violence and different forms of cybercrime. Stalkerware is commercially available software that an abuser can use to remotely record a person’s calls, log text messages, monitor social media activity, and track location data without notifying that person and without their consent. This type of software can enable acts of intimate partner violence, both digitally and offline. Stalkerware can also facilitate cybercrime, given the fact that this type of software can access personally-identifiable information stored on a device. We all have a role to play in recognizing the insidious nature of these technologies, the harmful impact that they have, and the need for collective action to support and assist individuals targeted by stalkerware.

    Presenters’ Names and Titles:
    • Live Brenna, Cybercrime Officer, UNODC
    • Sachiko Hasumi, Manager, Information Security & Compliance, UN Women
    • Anthony Melgarejo, Threat Prevention Service Owner, F-Secure
    • Alessandra Pauncz, PhD, Executive Director, European Network for the Work with Perpetrators of Domestic Violence
    • Tara Hairston, Head of Government Relations, North America, Kaspersky
  • Online payment details theft via Google Analytics: how to stay safe Oct 1 2020 2:00 pm UTC 12 mins
    Victoria Vlasova, malware analyst at Kaspersky
    In June 2020, Kaspersky researchers uncovered a new technique for stealing users’ payment information on online shopping websites — a type of attack known as web skimming. Web skimming is a popular practice used by attackers to steal users’ credit card details from the payment pages of online stores, whereby attackers inject pieces of code into the source code of the website. This malicious code then collects the data inputted by visitors to the site (i.e. payment account logins or credit card numbers) and sends the harvested data to the address specified by attackers in the malicious code.

    This time, cybercriminals invented a new technique, abusing the capabilities of Google Analytics. By registering for web analytics accounts and injecting these accounts’ tracking code into the websites’ source code, attackers can collect users’ credit card details. About two dozen online stores worldwide were compromised using this method.

    In this webinar you will find out:

    •How cybercriminals manage to gather personal details via the web analytics service
    •Technical analysis of the new malware and its features
    •Best practices to avoid such threats

    Read the full report about the new threat on Securelist: https://securelist.com/web-skimming-with-google-analytics/97414/

    Disclaimer: Kaspersky has informed Google of the problem, and they confirmed they have ongoing investments into resolving the issue.
  • No two attacks are identical: a year in incident response Recorded: Sep 9 2020 65 mins
    Dr. Serge Droz, Forum of Incident Response and Security Teams (FIRST); Chris Kubecka, HypaSEC; Ayman Shaaban, Kaspersky
    Daily interaction with organizations that seek assistance with full-scale incident response helps Kaspersky’s Incident Response Team understand the latest cyberthreat trends. After analyzing data containment, digital forensics investigations and malware analysis, as well as helping to improve security processes following incidents, the team now has a great knowledge base with statistical data of recent incidents.

    After this panel discussion with experts from different organizations, attendees will understand the latest trends in attack scenarios and the details of some of the most noteworthy cases they faced. This session will be of special interest to representatives of financial organizations, government agencies, and industrial bodies, as well as others.

    Today's speakers:
    • Chris Kubecka, CEO and Founder of HypaSEC, previously established security after Shamoon attack against Saudi Aramco in 2012 – will discuss how global corporates manage cyber risk and what should be changed in their approach to the incident response
    • Ayman Shaaban, Digital Forensics and Incident Response Manager of Kaspersky Global Emergency Response Team (GERT) – will share his knowledge, based on his day-to-day experiences. He will present statistical analysis of recent incidents, the most frequent reasons why the Kaspersky incident response service was requested, and tools used in the attacks
    • Dr. Serge Droz, Chair of the Board of directors of the Forum of Incident Response and Security Teams (FIRST) and seasoned incident responder working at Proton Technologies, will share his vision of global incident response as well as some interesting cases from his practice.
  • Experts Talk. Why master YARA: from routine to extreme threat hunting cases Recorded: Sep 3 2020 128 mins
    Costin Raiu, Yury Namestnikov, Dan Demeter and Juan Andres Guerrero-Saade
    YARA is often called the “pattern matching Swiss knife for malware researchers and everyone else”, and for a good reason: YARA detection rules help find malware, exploits and 0-days that couldn’t be found by other methods.

    How could YARA benefit you and your organization? What are the ingredients of a good YARA rule? How can you use YARA to find unknown threats and anomalies?

    Join our online session with Costin Raiu, Director of Kaspersky’s Global Research an Analysis Team (GReAT) and Juan Andres Guerrero-Saade, Adjunct Professor of Strategic Studies, Johns Hopkins SAIS, and moderated by Dan Demeter, senior security researcher at Kaspersky’s GReAT – cybersecurity experts who have been using YARA more than 6 years— for their insights and tips on using it for threat hunting.

    Held on September 3 at 2 PM GMT, the webinar will also include an exclusive preview by Yury Namestnikov, Head of GReAT EEMEA Research Center, of the new Kaspersky online self-study training ‘Hunt APTs with YARA like a GReAT Ninja’ which will launch in September. Armed with the knowledge, tools and YARA rules from this training, any IT security professional interested can study the Kaspersky Global Research & Analysis Team’s best practices on threat hunting with YARA. In addition to the practical insights from the company’s world-renowned cybersecurity experts, training includes access to a special virtual lab where learners can practice their new skills by working on 20+ threat hunting exercises – all based on Kaspersky’s exclusive research.

    In this webinar you will be able to:
    - Hear from cybersecurity experts their tips and insights on efficient threat hunting with YARA
    - See a detailed demo of our renowned training and have a chance to win a free YARA training worth 1400 USD
    - Tune into a threat hunting panel discussion

    Learn more about Kaspersky’s online cybersecurity training on threat hunting with YARA: xtraining.kaspersky.com
  • GReAT Ideas. Powered by SAS: threat hunting and new techniques Recorded: Aug 25 2020 164 mins
    GReAT Team
    On July 22 Kaspersky's Global Research and Analysis Team (GReAT) held its second talk of ‘GReAT Ideas. Powered by SAS’ series.

    Watch the recording of the session if you missed it live.

    ‘GReAT Ideas’ will empower you with information about the threat landscape directly from the experts themselves. During the second edition of the series GReAT researchers focused on curious malware specimens and campaigns as well as the new cutting-edge tools and techniques that they have implemented in threat hunting and detection.

    The agenda includes:
    14:00Clearing the WellMess: a technical look at recent attacks by Brian Bartholomew
    14:25Threat hunting in new kicks: using VirusTotal code similarity with KTAE by Ariel Jungheit
    14:50Cloud Snooper – detecting a Linux rootkit at scale by Pierre Delcher
    15:15GReAT thoughts: Awesome IDA Pro Plugins by Boris Larin
    15:40Unmasking COVID-19 cyber-badness: content filtering at a worldwide level by Dmitry Bestuzhev and Fabio Assolini
    16:00AMA session
    16:30End of program

    Learn more on Securelist.com
  • Twitter Hack: Lessons Learned Recorded: Aug 17 2020 31 mins
    Dmitry Galov, Security Researcher at Kaspersky
    On July 16, the social media platform Twitter experienced one—if not the biggest—security breaches in its history when cybercriminals hacked into major public figures’ verified accounts and convinced users worldwide to transfer them nearly $120,000 in bitcoin.

    While the exact details of how this breach happened may never be fully known, Twitter is not the first—nor will it be the last—to be faced with a hack. The more important question to ask here is how can these sorts of incidents be prevented in the future?

    Join Kaspersky security researcher Dmitry Galov for a look at what lessons can be taken from the Twitter hack and what policies should factor into your company’s security program. Get ready to learn:
    •The components of a strong cybersecurity program
    •How to promote cybersecurity best practices among your employees
    •Strategies for secure remote work
    •Ways to prevent spear phishing attacks from being successful

    A hack isn’t inevitable. Time to bolster your company’s security.
  • New threats in a changing world: APT trends in Q2, 2020 Recorded: Jul 29 2020 61 mins
    Costin Raiu, Vicente Diaz and David Emm - security researchers in Kaspersky’s Global Research and Analysis Team
    Kaspersky experts present their latest quarterly review of advanced persistent threat (APT) activity in 2020 in a new discussion format.

    Costin Raiu, Vicente Diaz and David Emm will review and discuss the latest campaigns, tools and techniques deployed by established and emerging threat actors, and highlight some of the most significant events and shifts that have taken place across the cyberthreat landscape in the second quarter of the year.

    During this webinar you will learn about:

    • Which APT campaigns made their mark in Q2
    • The new tools and techniques have been spotted
    • The new developments and trends the security industry should expect
    • The best way to protect users against emerging threats

    Join the GReAT team on this webinar to find out about the most up-to-date news and participate in a Q&A session with leading cybersecurity experts.
  • What’s new with corporate spam and phishing in H1 2020? Recorded: Jul 27 2020 35 mins
    Konstantin Ignatiev and Andrey Sidenko, security researchers at Kaspersky
    Kaspersky experts present their review of spam and phishing activity in the first half of 2020.

    Phishing emails remain one of the most common ways to infect user devices and 2020 has shown that this is still the case. But is there more to these content-related threats? What should employers be aware of?

    Learn about what has happened over the first half of the year in the area of corporate spam and phishing, the new topics and techniques cybercriminals came up with and what new trends we should expect in the coming second half of the year.

    During this webinar you will learn about:

    ∙ New ways phishers and spammers target organizations
    ∙ New topics and techniques used by cybercriminals in this area
    ∙ What risks phishing and spam may have on the targeted organization
    ∙ How to protect yourself and your employees from phishing and spam attacks
  • Online payment details theft via web analytics service: how to stay safe Recorded: Jul 7 2020 13 mins
    Victoria Vlasova, malware analyst at Kaspersky
    In June 2020, Kaspersky researchers uncovered a new technique for stealing users’ payment information on online shopping websites — a type of attack known as web skimming. Web skimming is a popular practice used by attackers to steal users’ credit card details from the payment pages of online stores, whereby attackers inject pieces of code into the source code of the website. This malicious code then collects the data inputted by visitors to the site (i.e. payment account logins or credit card numbers) and sends the harvested data to the address specified by attackers in the malicious code.

    This time, cybercriminals invented a new technique, abusing the capabilities of Google Analytics. By registering for web analytics accounts and injecting these accounts’ tracking code into the websites’ source code, attackers can collect users’ credit card details. About two dozen online stores worldwide were compromised using this method.

    In this webinar you will find out:

    •How cybercriminals manage to gather personal details via the web analytics service
    •Technical analysis of the new malware and its features
    •Best practices to avoid such threats

    Read the full report about the new threat on Securelist: https://securelist.com/web-skimming-with-google-analytics/97414/

    Disclaimer: Kaspersky has informed Google of the problem, and they confirmed they have ongoing investments into resolving the issue.
  • Adaptive learning on cybersecurity: How to find a tailored approach for everyone Recorded: Jun 25 2020 60 mins
    Nick J Howe, Chief Learning Officer, Area9 Lyceum; Denis Barinov, Head of Kaspersky Academy
    Employees are a company's best asset and often considered to be the heart and soul of a business. In many respects, it depends on how they are managed that determines if staff will become the weak link or an entry point for cybercriminals to take advantage of, or if they are able to contribute to its prosperity and cyber-safety.

    During this webinar you will learn:

    - Why employees’ IT mistakes can ruin your business
    - Why standard training and tip sheets do not work (and what you can do about this right now)
    - How to teach employees about topics they may not necessarily be interested in. How than to turn this knowledge into permanent behavioral change, so your employees have positive cybersecurity habits
    - Tutor in-a-box: an adaptive learning approach to fit every individual’s nature and needs
  • Threat landscape in META: cyberthreats in the new reality Recorded: Jun 23 2020 64 mins
    Amin Hasbini and Maher Yamout, Kaspersky’s GReAT
    The META threat landscape: cyberthreats in the new reality
    The world is changing every day and the cyberthreat landscape now fully reflects that. In this webinar, Amin Hasbini and Maher Yamout, security researchers from Kaspersky’s GReAT, will provide an overview of the latest cyberattacks in the META region and share their insights about the new threats to have affected the cybersecurity sector in the past month.

    You will learn more about:
    ∙ Cybersecurity after several months of working remotely: what has changed and what still needs attention
    ∙ Coronavirus and the threat landscape in the META region
    ∙ Kaspersky’s latest private threat intelligence findings on the most recent incidents in the region
  • GReAT Ideas. Powered by SAS: malware attribution and next-gen IoT honeypots Recorded: Jun 17 2020 128 mins
    GReAT researchers: Costin Raiu, Kurt Baumgartner, Denis Legezo and Kaspersky's Honeypot Team
    Get the inside scoop on GReAT, Kaspersky’s Global Research and Analysis team, which works on uncovering APTs, cyber-espionage campaigns, major malware, ransomware and underground cyber-criminal trends across the world.

    ‘GReAT Ideas. Powered by SAS’ is a series of talks held by GReAT and aimed at sharing their latest expertise on hot tech topics. Inspired by the regular team internal meet-ups, as well as by the Security Analyst Summit’s friendly atmosphere of exchanging knowledge, this series will empower you with information about the threat landscape, the most recent cases and techniques used in the cybersecurity world, directly from the experts themselves.

    Here is what you will learn during this webinar:

    Linking attacks to threat actors: case studies

    In this talk, Kurt Baumgartner will examine recent APT alerts and discussions, and how to get the jump on how or why this malware is connected with past activity. In particular, we will start with 2020 Kwampirs and Lazarus reporting and present details on these malware techniques.

    Threat hunting with Kaspersky’s new malware attribution engine

    Kaspersky introduces a new malware attribution engine, which has evolved from an internal tool used by Kaspersky’s GReAT. This technology was already leveraged in the investigation of a number of renowned APT campaigns, such as TajMahal, ShadowHammer, ShadowPad and Dtrack. See how it works in a demo by Costin G. Raiu, the director of GReAT

    Microcin-2020: GitLab programmers ban, async sockets and the sock

    In this current campaign, the threat actor Microcin is still using steganography, keeping his interest in diplomatic entities, but has improved the last-stager in an interesting way. Learn about it directly from Denis Legezo, the researcher who analyzed it.

    The next generation IoT honeypots

    Kaspersky Honeypots Team will show you the techniques and new kicks in the next generation of honeypot infrastructure being developed by Kaspersky
  • Best practices: how to find network threats effectively using NIDS Recorded: Jun 10 2020 30 mins
    Tatyana Shishkova, security analyst at Kaspersky
    Protecting corporate networks is challenging. Large organizations are attacked daily and more often than not, the speed at which you find threats entering the network is vital. Network Intrusion Detection Systems (NIDS) are key components that help protect the network perimeter and analyze network traffic. But how can they be used most effectively?


    In this webinar Tatyana Shishkova, a security researcher at Kaspersky, who specializes in threat detection, will share her expertise and cover the following topics:

    ∙ What NIDS is, how it works and where to start
    ∙ What is possible with threat detection
    ∙ Best practices and Suricata rules
    ∙ NIDS limitations and possible workarounds
  • History of Hackers: How Hackers Changed Everything Recorded: Jun 7 2020 5 mins
    David Jacoby, Security Evangelist at Kaspersky
    Technological progress, new devices and tools have evolved in the past 40 years, but how did the methods and targets actually change? What is new?

    Watch a quick overview of how hacking has changed over the past decade, presented by David Jacoby, a security evangelist from Kaspersky’s GReAT, at #SASatHome, the online version of the renowned Security Analyst Summit, which took place on 28-30, April.
  • Combining code similarity with YARA to find goodies Recorded: Jun 3 2020 62 mins
    Costin Raiu, Director Global Research & Analysis Team (GReAT)
    #SASatHome, the online version of a renowned Security Analyst Summit took place on 28-30, April. Watch one of the highlights of the event – the talk by Costin Raiu, the director of Kaspersky’s Global Research and Analysis Team (GReAT) dedicated to combining code similarity with YARA.

    There is little doubt that YARA has changed the threat hunting game. According to Costin, this is for a couple of reasons, between them: it is easy to learn, easy to use and easy to deploy. Indeed, pretty much anyone can learn and start writing YARA rules! Thanks to platforms such as VTMIS, threat hunting with YARA can help uncover threats against your organization and greatly improve your defenses and awareness. Yet, while many can do strings, code-based YARA rules are somehow rare.

    In this talk, we combine code similarity with YARA to live hunt for some fresh stuff. And while at it, we’ll be learning who is NN and why does he keep losing at Chess?
  • Preventing cybercrime with SOC augmentation Recorded: May 28 2020 37 mins
    Ewan Hubac, Product Manager, EclecticIQ; Artem Karasev, Senior Product Marketing Manager, Kaspersky
    The connected world is under constant threat of cybercrime. As enterprises further their digital transformation, they need to constantly adapt to the rapidly evolving cyberthreat landscape, while weighing up cyber-risks against overall business goals and priorities. Staying ahead of cyberthreats is a race against time. Having the right people, technology and processes is no longer enough. Cybersecurity practices, like SOC and incident response, need to be augmented with timely, relevant, and actionable cyberthreat intelligence.

    From informing strategic decisions to boosting incident containment and response, cyberthreat intelligence supports security leaders and practitioners in their mission to protect their businesses and support growth. Some key elements to that mission are:

    - Informing executive management of the current threat landscape and demonstrating return on investment

    - Shifting the enterprise security posture from reactive to proactive, and preventing breaches even before they occur, through seamless integration of technology, processes and data

    - Having all relevant information in a single pane of glass to facilitate threat hunting and response, and contribute to incident management and prioritization activity

    The Kaspersky and EclecticIQ collaboration on their portfolio of integrations guarantees high-end Cyber Threat Intelligence analysis, empowering organizations to stay ahead of cybercrime. Join us on a live webinar to learn more about the strength of our combined portfolio and offering, with a live product demonstration.
  • Upping the APT hunting game: learn the best YARA practices from Kaspersky Recorded: May 21 2020 76 mins
    Costin Raiu, security researcher in Kaspersky’s Global Research and Analysis Team
    Have you ever wondered how Kaspersky discovered some of the world’s most famous APT attacks? Now, the answer is within your reach. Watch the latest recorded webinar by Costin Raiu, director of Kaspersky’s Global Research and Analysis Team (GReAT), who will be sharing best practices on the use of YARA, an essential tool for APT hunters that can assist with the discovery of new malware samples, exploits and zero-days, speed up incident response, and increase your defenses by deploying custom rules inside your organization.

    If you ever wanted to master YARA and achieve a new level of knowledge in APT detection, mitigation and response, now is your chance.

    This brief webinar is based on Kaspersky’s exclusive training on YARA rules, which has already helped improve the APT detection strategies of many cybersecurity teams from leading businesses across the world. During the webinar, you will learn how to write test and improve effective YARA rules. You will also get a glimpse of some of our internal tools and learn how to maximize your knowledge for building effective APT detection strategies with YARA.

    This practical webinar is useful for security researchers and incident response personnel, malware analysts, security engineers, network security analysts, APT researchers and IT security staff. The content is suitable for both beginners and seasoned YARA users.

    During this webinar, you will learn about:

    •YARA syntax
    •Tips & tricks for creating fast and effective rules
    •Using YARA-generators
    •Testing YARA rules for false positives
    •Hunting new undetected samples
    •Using external modules within YARA for effective hunting
    •Anomaly search
    •Real-life examples

    Don’t miss this opportunity to learn about APT threat detection from Kaspersky’s Global Research and Analysis Team.

    Attendees’ requirements:
    Technical level: medium
    Prerequisites: knowledge of basic programming languages
    Software to install: YARA 3.11.0 or newer (if any)
  • The ransomware ecosystem: how it functions and how to protect against it Recorded: May 12 2020 40 mins
    Ivan Kwiatkowski, Senior Security Researcher, GReAT EU
    Recently INTERPOL issued a warning about the increase of ransomware threat in the time of the pandemic. According to them, there is a significant increase in the number of attempted ransomware attacks against key organizations and infrastructure engaged in the virus response.

    In fact, ransomware has been recognized as one of the most significant threats for businesses for a few years now, but not many actually know how profoundly it has developed over the past few years. As massive b2c ransomware campaigns ceased to be attractive, cyber criminals turned to those, who actually pay up – organizations.

    In this webinar, Ivan Kwiatkowski, senior security researcher at Kaspersky’s Global Research and Analysis Team (GReAT) will explain how:

    •the ransomware and cybercrime ecosystem is now structured
    •the infection process in organizations takes place
    •to secure your data and avoid falling victim to ransomware
Latest on cyberthreats and protection technologies
Top-notch cybersecurity and protection technology experts share their knowledge on how to mitigate the most dangerous cyberthreats that any organization may face. Contact us at https://www.kaspersky.com/about/contact

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Zero-days in the wild: 2019 retrospective
  • Live at: Apr 21 2020 3:00 pm
  • Presented by: Boris Larin, senior security researcher at Kaspersky
  • From:
Your email has been sent.
or close