{"id":7422,"date":"2017-04-24T07:31:07","date_gmt":"2017-04-24T15:31:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/24\/news-1213\/"},"modified":"2017-04-24T07:31:07","modified_gmt":"2017-04-24T15:31:07","slug":"news-1213","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/04\/24\/news-1213\/","title":{"rendered":"Recapping #TheSAS2017 in 10 tweets"},"content":{"rendered":"<p><strong>Credit to Author: Jeffrey Esposito| Date: Mon, 24 Apr 2017 15:09:44 +0000<\/strong><\/p>\n<p>If you&#8217;ve been following along on our blogs or our social media accounts, you probably know that we take a lot of pride in our annual conference, The SAS, hosted by Kaspersky Lab&#8217;s Global Research and Analysis Team (GReAT). The team managing the event always selects a great location and the top research from some of the brightest within our industry.<\/p>\n<p> <a href=\"https:\/\/blog.kaspersky.com\/files\/2017\/04\/sas-2017-best-tweets-featured.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.kaspersky.com\/files\/2017\/04\/sas-2017-best-tweets-featured.jpg\" alt=\"Recapping #TheSAS2017 in 10 Tweets\" width=\"1460\" height=\"960\" class=\"alignnone size-full wp-image-14727\" \/><\/a> <\/p>\n<p>This year&#8217;s event did not disappoint. The speakers not only provided thought-provoking content, but also inspired attendees to share their thoughts on social media. As the guy monitoring many of our social media channels, I had a first-hand look at how active the attendees were \u2014 well, them and the spambots that jumped on the thread with offers for 100s of Twitter followers for $5, enhancement products, and discounted tax services.<\/p>\n<p>Our editorial team wanted to see if we could recap the conference, but through tweets rather than in a lengthy blog post. After scanning through the thousands of tweets, I came up with the following to give a holistic view of the event that was #TheSAS2017.<\/p>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"1986\" \/> <\/p>\n<p>So, dear readers, do you think I missed any great tweets? Let me know via Twitter. And if tweets aren&#8217;t your thing, you can also see the event recapped in video below.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/ILDannyMoore\">@ILDannyMoore<\/a> <a href=\"https:\/\/twitter.com\/juanandres_gs\">@juanandres_gs<\/a> <a href=\"https:\/\/twitter.com\/craiu\">@craiu<\/a> MAZE story in WIRED <a href=\"https:\/\/t.co\/FJIwrd9fTH\">https:\/\/t.co\/FJIwrd9fTH<\/a><br \/>Our 35p write-up <a href=\"https:\/\/t.co\/wJcMeRl1Gn\">https:\/\/t.co\/wJcMeRl1Gn<\/a><br \/>Plus 31p Appendix B <a href=\"https:\/\/t.co\/9tyGHAM3nK\">https:\/\/t.co\/9tyGHAM3nK<\/a><a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2017?src=hash\">#TheSAS2017<\/a> <a href=\"https:\/\/t.co\/pA27Cn1iZh\">pic.twitter.com\/pA27Cn1iZh<\/a><\/p>\n<p>&mdash; Thomas Rid (@RidT) <a href=\"https:\/\/twitter.com\/RidT\/status\/848944150808547329\">April 3, 2017<\/a><\/p>\n<\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\">\n<p lang=\"en\" dir=\"ltr\">First successful dispensing with <a href=\"https:\/\/twitter.com\/hashtag\/ATM?src=hash\">#ATM<\/a> SDC bus code injection ) <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2017?src=hash\">#TheSAS2017<\/a> <a href=\"https:\/\/t.co\/dvSld7NSoZ\">pic.twitter.com\/dvSld7NSoZ<\/a><\/p>\n<p>&mdash; Sergey k1k Golovanov (@k1k_) <a href=\"https:\/\/twitter.com\/k1k_\/status\/849300684327485441\">April 4, 2017<\/a><\/p>\n<\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\">\n<p lang=\"en\" dir=\"ltr\">This SWIFT malware used perfect English\u2026 but the \u00a9 and \u00ae symbols used for the Windows ident were the Korean Unicode versions. <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2017?src=hash\">#TheSAS2017<\/a><\/p>\n<p>&mdash; Ryan Duff (@flyryan) <a href=\"https:\/\/twitter.com\/flyryan\/status\/848972425563750400\">April 3, 2017<\/a><\/p>\n<\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\">\n<p lang=\"en\" dir=\"ltr\">First rule of tracking Norks is if you are patient they will eventually use a DPRK IP address. <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2017?src=hash\">#TheSAS2017<\/a> <a href=\"https:\/\/t.co\/jRPfHpfb4o\">pic.twitter.com\/jRPfHpfb4o<\/a><\/p>\n<p>&mdash; John Hultquist (@JohnHultquist) <a href=\"https:\/\/twitter.com\/JohnHultquist\/status\/848973846078271488\">April 3, 2017<\/a><\/p>\n<\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\">\n<p lang=\"en\" dir=\"ltr\">How Pegasus (lawful intercept) gets installed on  iOS via multi-stage exploit chain. <a href=\"https:\/\/twitter.com\/ablaich\">@ablaich<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2017?src=hash\">#TheSAS2017<\/a> <a href=\"https:\/\/t.co\/vTv52gvxXC\">pic.twitter.com\/vTv52gvxXC<\/a><\/p>\n<p>&mdash; Chris Eng (@chriseng) <a href=\"https:\/\/twitter.com\/chriseng\/status\/849307660306567168\">April 4, 2017<\/a><\/p>\n<\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\">\n<p lang=\"en\" dir=\"ltr\">Social engineering used against Israeli military &#8211; <a href=\"https:\/\/twitter.com\/IdoNaor1\">@IdoNaor1<\/a> 100+ soldiers infected with malware <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2017?src=hash\">#TheSAS2017<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Israel?src=hash\">#Israel<\/a> <a href=\"https:\/\/t.co\/Ja0luLZYDl\">pic.twitter.com\/Ja0luLZYDl<\/a><\/p>\n<p>&mdash; Kaspersky Lab (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/849368309682360321\">April 4, 2017<\/a><\/p>\n<\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\">\n<p lang=\"en\" dir=\"ltr\">Researcher found 40 zero-day vulns in Samsung&#39;s Tizen OS, which runs on millions of smartTVs\/phone &#8211; <a href=\"https:\/\/t.co\/nvdWJ1ctBG\">https:\/\/t.co\/nvdWJ1ctBG<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2017?src=hash\">#TheSAS2017<\/a><\/p>\n<p>&mdash; Kim Zetter (@KimZetter) <a href=\"https:\/\/twitter.com\/KimZetter\/status\/848893842002718721\">April 3, 2017<\/a><\/p>\n<\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\">\n<p lang=\"en\" dir=\"ltr\">A Gift from GReAT: a bootleg CAM of <a href=\"https:\/\/twitter.com\/vkamluk\">@vkamluk<\/a>&#39;s legendary <a href=\"https:\/\/twitter.com\/hashtag\/YARA?src=hash\">#YARA<\/a> 20&#215;20 talk. Thank you all 4 making <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2017?src=hash\">#TheSAS2017<\/a> GReAT!<a href=\"https:\/\/t.co\/e2yqMglSVJ\">https:\/\/t.co\/e2yqMglSVJ<\/a><\/p>\n<p>&mdash; J. A. Guerrero-Saade (@juanandres_gs) <a href=\"https:\/\/twitter.com\/juanandres_gs\/status\/850350871951048704\">April 7, 2017<\/a><\/p>\n<\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\">\n<p lang=\"en\" dir=\"ltr\">Have you seen vendors doing dirty tricks in vuln disclosure? Are you a vendor that does this? Time to rethink your approach. <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2017?src=hash\">#TheSAS2017<\/a> <a href=\"https:\/\/t.co\/uRrzJg5yNd\">pic.twitter.com\/uRrzJg5yNd<\/a><\/p>\n<p>&mdash; Katie Moussouris (@k8em0) <a href=\"https:\/\/twitter.com\/k8em0\/status\/849284404337930240\">April 4, 2017<\/a><\/p>\n<\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\">\n<p lang=\"en\" dir=\"ltr\">Wanna know what you missed at <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2017?src=hash\">#TheSAS2017<\/a>? Forget what you did? Here&#39;s the recap. Enjoy!<a href=\"https:\/\/t.co\/xW4lxJ8PEQ\">https:\/\/t.co\/xW4lxJ8PEQ<\/a><\/p>\n<p>&mdash; Brian Bartholomew (@Mao_Ware) <a href=\"https:\/\/twitter.com\/Mao_Ware\/status\/854365081005682694\">April 18, 2017<\/a><\/p>\n<\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><a href=\"https:\/\/blog.kaspersky.com\/sas-2017-best-tweets\/14726\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jeffrey Esposito| Date: Mon, 24 Apr 2017 15:09:44 +0000<\/strong><\/p>\n<p>Recapping the 2017 iteration of Kaspersky Lab\u2019s annual conference, the Security Analyst Summit, with 10 Tweets.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[11856,12068,11760,11862,714,10438,454],"class_list":["post-7422","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-thesas2017","tag-event","tag-sas","tag-sas-2017","tag-security","tag-threats","tag-twitter"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7422"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7422\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7422"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}