Anton Ivanov

@antonivanovm

Head of Advanced Threats Research and Detection Team, My tweets are my own opinion.

Moscow, Russia
Vrijeme pridruživanja: listopad 2015.

Tweetovi

Blokirali ste korisnika/cu @antonivanovm

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @antonivanovm

  1. proslijedio/la je Tweet

    A lot has been written about CVE-2020-0601 and POCs, the question that you should be asking is does your security solution protect you? Our products do, regardless of your version of version.

    Poništi
  2. 10. pro 2019.
    Poništi
  3. proslijedio/la je Tweet
    1. stu 2019.

    A few days ago our technologies caught a new Chrome 0day exploit used in the wild and we reported it to Google. Just released-Chrome 78 patches it, credits to my colleagues and Alexey Kulaev for finding the bug.

    Prikaži ovu nit
    Poništi
  4. 1. stu 2019.
    Poništi
  5. proslijedio/la je Tweet

    exploits ✔️ Windows vulnerability ✔️ processor architecture ✔️Oracle Weblogic vulnerability ✔️ attacks MSP providers. Very unusual . Technical details:

    Poništi
  6. proslijedio/la je Tweet
    20. svi 2019.

    We analyzed the vulnerability CVE-2019-0708 and can confirm that it is exploitable. We have therefore developed detection strategies for attempts to exploit it and would now like to share those with trusted industry parties. Please contact: nomoreworm@kaspersky.com

    Poništi
  7. 15. tra 2019.
    Poništi
  8. 9. tra 2019.

    We found one more exploit! Details soon.

    Poništi
  9. proslijedio/la je Tweet
    25. ožu 2019.

    Asus Live Updater was used in a big supply chain attack we dubbed Operation . We estimate this may have affected over 1 million computer users between June and Nov 2018.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet

    How did Kaspersky Lab technologies find three in three months? Watch as our Advanced Threats Research and Detection Team talk about how our technology successfully identified and blocked them.

    Poništi
  11. proslijedio/la je Tweet
    13. ožu 2019.

    is a new APT we discovered only recently. In addition to CVE-2019-0797 and CHAINSHOT, also uses the FinFisher/FinSpy framework.

    Prikaži ovu nit
    Poništi
  12. 13. ožu 2019.
    Poništi
  13. proslijedio/la je Tweet
    11. velj 2019.

    Me and will present our new research "Momigari: Overview of the latest Windows OS kernel exploits found in the wild" with all juicy details about CVE-2018-8453, CVE-2018-8589, CVE-2018-8611.

    Poništi
  14. proslijedio/la je Tweet
    18. sij 2019.

    Congratulations to with a great demonstration of their skill and expertise at

    Poništi
  15. proslijedio/la je Tweet
    7. pro 2018.

    Here are the slides for the "Catching multilayered zero-day attacks on MS Office" talk i gave with at

    Poništi
  16. proslijedio/la je Tweet
    12. pro 2018.

    Three major 0-days found and neutralized in three months. That's how proactive security technologies work in products

    Poništi
  17. 12. pro 2018.
    Poništi
  18. proslijedio/la je Tweet
    28. stu 2018.

    We've just released TDSS Killer 3.1.0.20 with the ability to scan your UEFI BIOS from Windows - download it here and give it a try:

    Prikaži ovu nit
    Poništi
  19. 14. stu 2018.
    Poništi
  20. proslijedio/la je Tweet
    9. stu 2018.

    Here are the slides for our with talk "Exploiting ActionScript3 Interpreter"

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·