Flamer: The most complex malware threat since Stuxnet and Duqu

Manage webcast
Candid Wüest, Principal Software Engineer & Orla Cox, Sr Security Operations Manager, Security Response , Symantec
The latest high-profile Internet threat is called Flamer. As with Stuxnet and Duqu, this code was not likely to have been written by a single individual but by an organised, well-funded group of people working to a clear set of directives.

While our analysis is currently ongoing, the primary functionality is to obtain information and data. This is not unique and by itself would not make Flamer significant. But when combined with the complexity of the code, the identified targets, and the possible link to recent threats described by the Iran National CERT, Flamer becomes a very noteworthy threat.

Join our Symantec’s Security Response experts in this webcast which we will discuss the latest information about the threat and what it means in terms of the wider threat landscape.
Jun 6 2012
64 mins
Flamer: The most complex malware threat since Stuxnet and Duqu
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5967)
  • Upcoming (119)
  • Date
  • Rating
  • Views
  • Over 90% of targeted attacks start with email. Criminals create very convincing emails to trick your users into clicking on a link, opening an attachment, or replying with their credentials. The attack methods criminals employ with phishing emails are constantly changing and so must your email security to block these attacks before damage occurs. Learn about the newest trends in phishing email attacks and how to protect your organization.
  • Watch this 5 minute video to learn about credential stuffing attack and how adversaries use stolen usernames and passwords to hijack accounts.
  • With the proliferation of mobile devices and emergence of free file sharing services, information workers expect and demand fast, responsive services. If enterprise software limitations restrict productivity, end users will circumvent the policies set by their organization in order to get their job done.
    In this 60-minute webinar, Ron Charity, Business Development Manager at AvePoint and Miguel Caron, Technical Solutions Professional at AvePoint, will discuss how AvePoint Perimeter can make your on-premises SharePoint environment more powerful than Dropbox, Google Drive, and even Office 365 by enabling two-way collaboration and external sharing without ever having to leave SharePoint.
    In this webinar, you’ll learn how you can:

    • Overcome native SharePoint limitations and productivity challenges
    • Collaborate with external users just like how you work internally
    • Stop your end users from using unsecure file sharing services like Dropbox and Google Drive
    • Increase collaboration with two-way editing and external sharing
    • Enhance the value of on-premises SharePoint and drive adoption
  • NTT Com Security would like to invite you to join us and our partner LogRhythm on July 28th, 2015 from 2:00-3:00 p.m. EST for a webinar addressing the current and ongoing cyber-threat to Financial and Insurance institutions.
  • Organizations have long struggled to find objective ways to measure and compare performance, leaving many executives to trust metrics and data points that may not be painting the clearest picture of security posture.

    To highlight this issue, BitSight recently surveyed over 300 IT executives in 4 major industries to assess their confidence in their security performance. We then compared responses to our own security ratings data, which measures effectiveness across key performance areas including security events, configurations, and user behaviors.

    In this webinar, BitSight EVP of Sales & Marketing Tom Turner takes a deeper look into these fidings and discusses the business implications of optimism bias.

    Download this webinar to learn:

    How security performance varies among Finance, Healthcare, Retail, and Energy/Utilities
    Whether optimism bias exists in these industries and how it may be affecting overall security performance
    Why continuous performance monitoring should be a critical component of enterprise risk management and how leading organizations are using BitSight Security Ratings to manage their cyber risk
  • Organizations have long struggled to find objective ways to measure and compare performance, leaving many executives to trust metrics and data points that may not be painting the clearest picture of security posture.

    To highlight this issue, BitSight recently surveyed over 300 IT executives in 4 major industries to assess their confidence in their security performance. We then compared responses to our own security ratings data, which measures effectiveness across key performance areas including security events, configurations, and user behaviors.

    In this webinar, BitSight EVP of Sales & Marketing Tom Turner takes a deeper look into these fidings and discusses the business implications of optimism bias.

    Download this webinar to learn:

    How security performance varies among Finance, Healthcare, Retail, and Energy/Utilities
    Whether optimism bias exists in these industries and how it may be affecting overall security performance
    Why continuous performance monitoring should be a critical component of enterprise risk management and how leading organizations are using BitSight Security Ratings to manage their cyber risk
  • Organizations have long struggled to find objective ways to measure and compare performance, leaving many executives to trust metrics and data points that may not be painting the clearest picture of security posture.

    To highlight this issue, BitSight recently surveyed over 300 IT executives in 4 major industries to assess their confidence in their security performance. We then compared responses to our own security ratings data, which measures effectiveness across key performance areas including security events, configurations, and user behaviors.

    In this webinar, BitSight EVP of Sales & Marketing Tom Turner takes a deeper look into these fidings and discusses the business implications of optimism bias.

    Download this webinar to learn:

    How security performance varies among Finance, Healthcare, Retail, and Energy/Utilities
    Whether optimism bias exists in these industries and how it may be affecting overall security performance
    Why continuous performance monitoring should be a critical component of enterprise risk management and how leading organizations are using BitSight Security Ratings to manage their cyber risk
  • Organizations have long struggled to find objective ways to measure and compare performance, leaving many executives to trust metrics and data points that may not be painting the clearest picture of security posture.

    To highlight this issue, BitSight recently surveyed over 300 IT executives in 4 major industries to assess their confidence in their security performance. We then compared responses to our own security ratings data, which measures effectiveness across key performance areas including security events, configurations, and user behaviors.

    In this webinar, BitSight EVP of Sales & Marketing Tom Turner takes a deeper look into these fidings and discusses the business implications of optimism bias.

    Download this webinar to learn:

    How security performance varies among Finance, Healthcare, Retail, and Energy/Utilities
    Whether optimism bias exists in these industries and how it may be affecting overall security performance
    Why continuous performance monitoring should be a critical component of enterprise risk management and how leading organizations are using BitSight Security Ratings to manage their cyber risk
  • Organizations have long struggled to find objective ways to measure and compare performance, leaving many executives to trust metrics and data points that may not be painting the clearest picture of security posture.

    To highlight this issue, BitSight recently surveyed over 300 IT executives in 4 major industries to assess their confidence in their security performance. We then compared responses to our own security ratings data, which measures effectiveness across key performance areas including security events, configurations, and user behaviors.

    In this webinar, BitSight EVP of Sales & Marketing Tom Turner takes a deeper look into these fidings and discusses the business implications of optimism bias.

    Download this webinar to learn:

    How security performance varies among Finance, Healthcare, Retail, and Energy/Utilities
    Whether optimism bias exists in these industries and how it may be affecting overall security performance
    Why continuous performance monitoring should be a critical component of enterprise risk management and how leading organizations are using BitSight Security Ratings to manage their cyber risk
  • No complexo ambiente de negócios de hoje, a sua organização se depara com dificuldades de segurança cada vez maiores e exigências legais que fazem com que seja essencial controlar e monitorar seus usuários privilegiados.
    O gerenciamento senhas de contas privilegiadas é um ponto de partida para proteger o seu ambiente de TI, mas ainda há muito a ser feito.
    Nesta sessão, descubra como o CA Privileged Identity Manager pode ajudar sua organização a gerenciar identidades privilegiadas (PIM) e controlar de maneira completa seus usuários privilegiados a fim de reduzir o risco de falhas de conformidade ou de violações de segurança com alto custo.
  • Channel
  • Channel profile
  • Symantec protege tus sistemas Windows Server 2003 ante el EOSL Recorded: Jun 30 2015 29 mins
    Jose Carlos Cerezo – Especialista en Seguridad Data Center
    Sesión sobre la protección de sus sistemas Windows Server 2003 después de la finalización del soporte.
    •¿Sabía que el 14 de julio finalizará el soporte del producto Windows Server 2003?
    oDespués de esta fecha , Microsoft dejará de emitir parches de seguridad , dejando a estos sistemas en un estado de vulnerabilidad alto frente a los ataques de día cero y otras formas de código malicioso.
    •Conozca a que riesgos se expone si no hace frente a esta situación y como Symantec le ayuda a proteger sus sistemas ante la finalización del soporte para estos sistemas.
  • If Hacking is the Poison, What's the Antidote? Recorded: Jun 9 2015 42 mins
    James Hanlon CISM, CISSP, Cyber Security Strategy & GTM Lead, EMEA
    James Hanlon, Security Strategist at Symantec, looks at both the current cyber poisons and potential antidotes to the cyber security challenge. The discussion will focus current threat landscape and the changes we are seeing in regard to hacking and cyber attacks. It will pose the questions to whether global intelligence & data analytics is an approach that can be used counter the most advanced threats.
  • Symantec protege tus sistemas Windows Server 2003 ante el EOSL Recorded: Jun 1 2015 10 mins
    Jose Carlos Cerezo – Especialista en Seguridad Data Center
    •¿Sabía que el 14 de julio finalizará el soporte del producto Windows Server 2003?
    oDespués de esta fecha , Microsoft dejará de emitir parches de seguridad , dejando a estos sistemas en un estado de vulnerabilidad alto frente a los ataques de día cero y otras formas de código malicioso.

    •Conozca a que riesgos se expone si no hace frente a esta situación y como Symantec le ayuda a proteger sus sistemas ante la finalización del soporte para estos sistemas.
  • Threat Protection: how does the growing threat landscape affect you? Recorded: May 26 2015 41 mins
    Sunil Choudrie - Product Marketing Manager
    If there is one thing that can be said about the threat landscape, and cybersecurity as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code than in previous years.
    Join us on 26th May, at 10:00 - 10:45 to understand the growing threat landscape and how this affects your business.
    On this webcast we will cover;
    •The main security challenges and trends in 2014
    •Highlight how threats operate to allow you to better informed
    •Key takeaways for executive / functional leaders
  • Big Data & Cyber Sécurité - Symantec Internet Security Threat Report 2015 Recorded: May 7 2015 45 mins
    Laurent Heslault, Directeur des Stratégies de Sécurité – Symantec Europe du Sud
    Symantec fournit chaque année une rapport sur les menaces et tendances de sécurité, grâce à la collecte inégalée de données partout dans le monde et à l’analyse effectuée par nos experts en cyber sécurité.
    Lors de ce webcast, Laurent Heslault, notre stratégiste sécurité, vous présentera les résultats mondiaux et pour la France de la 20ème édition du Symantec Internet Security Threat Report.
    Vous en saurez plus sur :
    -Les changements observés dans les techniques d’attaques
    -La vitesse d’exécution des nouvelles attaques
    -Les cibles privilégiées et les enjeux financiers
    -Les tendances à suivre (social media, IoT…)
    Si vous êtes intéressé par le rôle que la sécurité doit jouer dans la stratégie d’entreprise pour tendre vers la cyber résilience, ne manquez pas cette opportunité de discuter avec nos experts.
  • Die wichtigen Trends bei Cyberkriminalität in Deutschland Recorded: May 6 2015 49 mins
    Candid Wueest, Cyber Security Strategist bei Symantec in Deutschland
    Das Jahr 2014 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.

    Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.

    Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
  • Is your security strategy on track? Internet Security Threat Report v20 is here! Recorded: May 6 2015 49 mins
    Sunil Choudrie - Product Marketing Manager
    A good strategy relies on you knowing where you want to go. Unless you understand the latest security trends and challenges then your program could be off track. Every year, Symantec distils the expertise from our team of experts into the Internet Security Threat Report. We have recently published our 20th edition and invite you to join this webcast to gain insights to drive your security program.

    Our Internet Security Threat Report Webcast summarises he key findings from these trends to help you focus your defences and counter measures. The agenda includes:
    • How attacker techniques are evolving
    • Why vulnerabilities are still being exploited
    • The dramatic rise in ransom ware
    • Our simple steps that can yield big improvements across your security

    If you are interested in ensuring security contributes to business strategy - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for staff involved in day to day security.
  • Step out of the day-to-day, let Internet Security Threat Report 20 guide the way Recorded: May 6 2015 49 mins
    Sunil Choudrie - Product Marketing Manager
    If you’re busy protecting your organisation from IT threats, then it’s natural to focus on the here and now. However, the world of security is changing fast. Symantec’s annual report provides analysis from our team of experts. The report describes the security trends we observed in 2014 to help you be better prepared going forward.

    Our Internet Security Threat Report Webcast distils the key findings from these trends to help you focus your defences and counter measures. The agenda includes:
    • How attacker techniques are evolving
    • Why vulnerabilities are still being exploited
    • The dramatic rise in ransom ware
    • Our simple steps that can yield big improvements across your security

    If you are interested in the role security has to play in the day-to-day - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for executive leaders.
  • Symantec Internet Security Threat Report (ISTR) 2015 Recorded: May 6 2015 49 mins
    Antonio Forzieri, EMEA Cyber Security and ISS Lead – Technology Sales and Services, Symantec
    Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2015 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Non mancare a questo importante approfondimento!
  • Securing Legacy systems in the Public Sector Recorded: Mar 19 2015 32 mins
    Mark Fox Senior Principal Consultant, Data Centre Security and Compliance
    Government departments are facing several problems in relation to Legacy Operating Systems and Applications. Windows Server support is due to end on the 14th of July 2015, and stricter controls regarding access to the PSN network & resources are coming into force this year.

    You have options but you need to be sure that you can continue to access to business critical applications and at the same time be secure without incurring significant costs from custom support agreements. Symantec has an answer that extends the life of your Windows 2003 systems that is cost effective and increases your security.

    Attend this webinar if you want to learn how you can:

    •Safely extend the lifetime of Windows Server 2003 systems in your environment
    •Reduce business operational costs
    •Significantly improve your security
    •Reduce risk to business critical applications
  • EU General Data Protection Regulation is coming: Time for ‘Privacy by Design' Recorded: Mar 18 2015 46 mins
    Mike Smart - Symantec Security Strategist
    The European Union’s proposed General Data Protection Regulation (GDPR) has left even the most informed confused.
    Attend Mike Smart’s panel session to hear from Sian John, Symantec’s Chief Strategist and Tamzin Matthew, Symantec’s Director of Legal introduce this new legislation.
    This webinar will cover 3 topics of discussion; Scope of the new regulation, roles and responsibilities of those involved in data privacy and how implementing ‘Privacy by Design’ will minimize the impact of the GDPR.
  • How Does Big Data Threat Analytics Heighten Cyber Security? Recorded: Feb 17 2015 47 mins
    Sunil Choudrie, Symantec Security Specialist
    Advanced cyber-attacks are just too difficult to deal with! Often hard to detect, challenging to respond to and even then you are not sure it will be any better next time. Big data threat analytics is a growing theme in the security industry that helps organisations move from simple reaction to being able to detect and defend themselves more effectively. With 25 years of malware research and big data threat analytics experience, Symantec explains the benefits of big data threat analytics.
  • Reduce the cost and securely extend the life of your Windows 2003 Estate. Recorded: Feb 5 2015 61 mins
    James Hanlon CISM, CISSP Cyber Security Strategy & GTM Lead, EMEA - Mark Fox, Sr Principle Technical Specialist
    Time is short. With Windows Server support due to end on the 14th of July 2015, now is the time to consider your strategy to address this issue. You have options but you need to be sure your business critical applications are available & secure whilst not incurring significant costs from custom support agreements. Symantec has an answer which will extend the life of your Windows 2003 systems and that is cost effective and increases your security.

    Attend this webinar if you want:
    •Safely extend the lifetime of Windows Server 2003 systems in your environment
    •Reduce business costs
    •Significantly improve your security
    •Reduce risk to business critical applications
  • Advanced Threats & Malware Attacks Rising: Ready for the impact of a breach? Recorded: Feb 3 2015 47 mins
    Mike Smart, Sian John and Laurence Pitt (Security Specialists)
    2013 was the year of the Mega Breach…and unfortunately the trend continues. Attacks on global corporations were highly visible in 2014 – a direct result of the huge increase in complex breaches. It’s no longer enough to simply work on keeping the bad guys out. You need a response and remediation plan for when (not if) a breach occurs.

    In this webinar Mike Smart From Symantec will be hosting a panel with Sian John and Laurence Pitt discussing ‘how to protect against cyber-attack from the inside’. You will also hear Symantec discuss how IT Security leaders can balance business innovation and protection in the modern IT world.
  • Dynamic Data Protection: set your data free with confidence Recorded: Feb 3 2015 46 mins
    Mike Smart, Sian John and Laurence Pitt (Security Specialists)
    Information is everywhere: with an increasingly mobile workforce and snowballing adoption of cloud services, IT leaders are struggling to protect information in this distributed environment. In this webinar Mike Smart From Symantec will be hosting a panel with Sian John and Laurence Pit discussing why ‘work is what you do not where you are’. You will also hear Symantec discuss how IT Security leaders can balance business innovation and protection in the modern IT world.
  • Why PCI/DSS needs to be part of a bigger security strategy Recorded: Jan 20 2015 59 mins
    Tom Davison (Security Specialist) C.Baker (Senior Manager Gov Affairs), J.Fletcher (Head of IT Risk Swinton Group Ltd)
    Cybercrime is booming.

    Every day we hear new headlines about breaches that have resulted in the significant loss of credit card information or customer data. Many of these companies are PCI/DSS compliant. So what went wrong? More importantly, what can you do to make sure your business isn’t attacked next?
    In this webinar we talk about the advantages of using PCI/DSS as a base from which to build a wider, stronger cyber security strategy. By making strategic security investments, you can mitigate risk while maximizing business opportunities. Ticking the boxes to avoid a fine isn’t enough to keep cyber criminals at bay.

    Our experts will cover:
    •Overview of PCI/DSS and characteristics of successful projects
    •The new European General Data Protection Regulation and likely regulatory/financial impact
    • Case Study
  • Step up to your Digital Security Responsibilities Recorded: Jan 15 2015 61 mins
    Tom Davison Symantec and David Gillick HP
    Malware has grown to be a major concern across the Enterprise. The emergence of ransomware, such as Cryptlocker, shows the increasing sophistication of modern malware attacks and the threat these cause to your business. Ransomware disables the functionality of a computer in some way. The malware, in effect, holds the computer ransom and requests payment from the user to restore function. According to our research, as many as 2.9 percent of compromised users admitted to paying out, however the real number is likely to be much higher.

    Take an Intelligent Approach to Security

    Intelligent Security from HP ESS and Symantec not only identifies how to proactively approach your cyber security, but also how making the right risk management decisions can enable your business to operate most securely and efficiently.
  • Vers une approche cyber sécurité intégrée Recorded: Jan 9 2015 39 mins
    Evelyne Lescuyer, Consultante Information Security, Symantec
    La complexité et les enjeux liés à la cyber sécurité requièrent une plateforme de sécurité cohérente et unifiée, prenant en compte autant la connaissance des risques internes qu'externes. Lors de ce webcast vous découvrirez comment Symantec peut vous aider à mettre en place une approche sécurité complète et holistique, combinant les meilleures pratiques, l'expérience et l'intelligence, au travers d'une plateforme de services sécurité, et ainsi rendre votre entreprise cyber préparée.
  • Un monde sans mot de passe ? Recorded: Jan 9 2015 35 mins
    Cédric Pottier, Consultant Information Security - CISSP, Symantec
    Durant les 20 dernières années, les experts sécurité ont toujours clamé que les mots de passe étaient le talon d'Achille de leur stratégie. Les entreprises ont dû composer avec l'augmentation des risques, les freins à la productivité des utilisateurs et les investissements dans des solutions de gestion des mots de passe. Découvrez lors de ce webcast la nouvelle solution VIP, la première solution d'authentification pour limiter les mots de passe en entreprise. Vous en saurez plus sur cette nouvelle méthode d'authentification à vos applications mobiles, SaaS et web. Et vous découvrirez comment Symantec Identity and Authentication Platform s'intègre avec des offres tiers pour servir de socle commun d'IAM, d'authentification forte, de provisionning et de protection de l'information.
  • L’actu cyber du mois, so what ? Recorded: Jan 9 2015 31 mins
    Laurent Heslault - Directeur cyber stratégiesPaul Dominjon - Responsable stratégie décideurs
    •C’est arrivé durant les 30 derniers jours, nouvelles attaques, nouvelles vulnérabilités, rapport d’experts, point de vue des analystes, les éléments les plus marquants du mois seront commentés et interprétés en terme d’impact et d’analyse de risques, pour les décideurs et professionnels de la cyber sécurité.
    •Votre rendez-vous de 20 minutes pour comprendre l’essentiel, vous aider à y voir plus clair et répondre à vos questions du moment.
Webcasts targeted to software security professionals
Symantec Corporation Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Our presenters usually are combined with a customer, analyst or partner. We plan to run 2 webcasts a month and they are targeted to the software security professional.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Flamer: The most complex malware threat since Stuxnet and Duqu
  • Live at: Jun 6 2012 9:00 am
  • Presented by: Candid Wüest, Principal Software Engineer & Orla Cox, Sr Security Operations Manager, Security Response , Symantec
  • From:
Your email has been sent.
or close
You must be logged in to email this