{"media":[],"blog":[{"id":5,"title":"SAS 2019: Joe FitzPatrick Warns of the \u2018$5 Supply Chain Attack\u2019","date":"2019-04-10 00:00:00","resource":"ThreatPost","logo":"","link":"https:\/\/threatpost.com\/sas-2019-joe-fitzpatrick-warns-of-the-5-supply-chain-attack\/143684\/","show_date":"2019, Apr 10","link_logo":"https:\/\/thesascon.com\/uploads"},{"id":6,"title":"SAS 2019: Triton ICS Malware Hits A Second Victim","date":"2019-04-10 00:00:00","resource":"ThreatPost","logo":"","link":"https:\/\/threatpost.com\/triton-ics-malware-second-victim\/143658\/","show_date":"2019, Apr 10","link_logo":"https:\/\/thesascon.com\/uploads"},{"id":7,"title":"SAS 2019: Fake News Peddlers Adopt Clever New Trick to Fool Facebook, Twitter","date":"2019-04-11 00:00:00","resource":"ThreatPost","logo":"","link":"https:\/\/threatpost.com\/sas-2019-fake-news-peddlers-adopt-clever-new-trick-to-fool-facebook-twitter\/143701\/","show_date":"2019, Apr 11","link_logo":"https:\/\/thesascon.com\/uploads"},{"id":8,"title":"Gaza Cybergang Group1, operation SneakyPastes","date":"2019-04-10 00:00:00","resource":"Securelist","logo":"","link":"https:\/\/securelist.com\/gaza-cybergang-group1-operation-sneakypastes\/90068\/","show_date":"2019, Apr 10","link_logo":"https:\/\/thesascon.com\/uploads"},{"id":9,"title":"Large-scale SIM swap fraud","date":"2019-04-11 00:00:00","resource":"Securelist","logo":"","link":"https:\/\/securelist.com\/large-scale-sim-swap-fraud\/90353\/","show_date":"2019, Apr 11","link_logo":"https:\/\/thesascon.com\/uploads"},{"id":10,"title":"Cyber-news from the dark side \u2013 ver. SAS-2019.","date":"2019-04-30 00:00:00","resource":"Eugene Kaspersky blog","logo":"","link":"https:\/\/eugene.kaspersky.com\/2019\/04\/30\/cyber-news-from-the-dark-side-ver-sas-2019\/","show_date":"2019, Apr 30","link_logo":"https:\/\/thesascon.com\/uploads"}],"video":[{"id":11,"title":"<p>SAS@Home Video: Combining code similarities with Yara to find goodies<\/p>","description":"<p>Hands-on master class by Costin Raiu, Director, Global Research and Analysis Team (GReAT), Kaspersky, on how to use <a href=\"https:\/\/www.youtube.com\/results?search_query=%23Yara\">#Yara<\/a> to discover advanced threats<\/p>","id_video":"DQXpdEvyasc","preview":null,"order":0,"link_facebook":null,"link_twitter":null,"link_linkedin":null,"preview_full_url":"https:\/\/thesascon.com\/uploads"},{"id":12,"title":"<p>SAS@Home Video: Operation V-Neptun<\/p>","description":"<p>A fascinating story of the disinformation campaign that happened during the height the Cold War in Czekhoslovakia, by Thomas Rid, Professor of Strategic Studies, Johns Hopkins<\/p>","id_video":"9lXiqPL9PyY","preview":null,"order":1,"link_facebook":null,"link_twitter":null,"link_linkedin":null,"preview_full_url":"https:\/\/thesascon.com\/uploads"},{"id":13,"title":"<p>SAS@home Video: Alex Frappier - Nonverbal Secrets and Myths<\/p>","description":"<p>Alex Frappier, CanCyber Foundation, talks about how he came to learning non-verbal communications through trying to understand the success rate of social engineering.<\/p>","id_video":"e7yu3SW-er8","preview":null,"order":2,"link_facebook":null,"link_twitter":null,"link_linkedin":null,"preview_full_url":"https:\/\/thesascon.com\/uploads"},{"id":14,"title":"<p>SAS@Home Video: Igor Kuznetsov - Static binary analysis: the essentials<\/p>","description":"<p>Igor Kuznetsov, Principal Security Researcher, Kaspersky, plunges deed into the fundamentals of reverse engineering and static malware analysis.<\/p>","id_video":"nC98-ywm7lU","preview":null,"order":3,"link_facebook":null,"link_twitter":null,"link_linkedin":null,"preview_full_url":"https:\/\/thesascon.com\/uploads"},{"id":3,"title":"<h3>Operation ShadowHammer<\/h3>","description":"<p>In this talk, Costin Raiu and Vitaly Kamlyuk reflect on the discovery of <a href=\"https:\/\/www.youtube.com\/results?search_query=%23ShadowHammer\">#ShadowHammer<\/a><\/p>","id_video":"T5wPwvLrBYU","preview":null,"order":4,"link_facebook":null,"link_twitter":null,"link_linkedin":null,"preview_full_url":"https:\/\/thesascon.com\/uploads"},{"id":4,"title":"<h3>Eva Galperin at <a href=\"https:\/\/www.youtube.com\/results?search_query=%23TheSAS2019\">#TheSAS2019<\/a><\/h3>","description":"<p><a href=\"https:\/\/www.youtube.com\/results?search_query=%23Spouseware\">#Spouseware<\/a> and <a href=\"https:\/\/www.youtube.com\/results?search_query=%23Stalkerware\">#Stalkerware<\/a>: Where Do We Go from Her<\/p>","id_video":"QvorPIKXrYA","preview":null,"order":5,"link_facebook":null,"link_twitter":null,"link_linkedin":null,"preview_full_url":"https:\/\/thesascon.com\/uploads"},{"id":5,"title":"<h3>Maddie Stone at <a href=\"https:\/\/www.youtube.com\/results?search_query=%23TheSAS2019\">#TheSAS2019<\/a><\/h3>","description":"<p>Chamois: The Most Impactful Android Botnet of 2018 - Maddie Stone at <a href=\"https:\/\/www.youtube.com\/results?search_query=%23TheSAS2019\">#TheSAS2019<\/a><\/p>","id_video":"J2QBvetsdWc","preview":null,"order":6,"link_facebook":null,"link_twitter":null,"link_linkedin":null,"preview_full_url":"https:\/\/thesascon.com\/uploads"},{"id":6,"title":"<h3>Sergey Lozhkin at <a href=\"https:\/\/www.youtube.com\/results?search_query=%23TheSAS2019\">#TheSAS2019<\/a><\/h3>","description":"<p>Doppelgangers Unlimited<\/p>","id_video":"DwxP9Wtevko","preview":null,"order":7,"link_facebook":null,"link_twitter":null,"link_linkedin":null,"preview_full_url":"https:\/\/thesascon.com\/uploads"},{"id":10,"title":"<h3>The Grugq at <a href=\"https:\/\/www.youtube.com\/results?search_query=%23TheSAS2019\">#TheSAS2019<\/a><\/h3>","description":"<p>Opaque at Both Ends<\/p>","id_video":"3stKeaAdwGg","preview":null,"order":8,"link_facebook":null,"link_twitter":null,"link_linkedin":null,"preview_full_url":"https:\/\/thesascon.com\/uploads"}],"photos":[]}
We use cookies to make your experience of our websites better. By using and further navigating this
website you accept that some of your browsing activity can be recorded in cookies. Detailed information
about the use of cookies on this website is available by clicking on more information.