{"id":15040,"date":"2014-12-12T21:03:35","date_gmt":"2014-12-12T21:03:35","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3422"},"modified":"2020-02-27T03:52:03","modified_gmt":"2020-02-26T16:52:03","slug":"webinar-on-apt-predictions-thanks-to-all-who-joined-us","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/webinar-on-apt-predictions-thanks-to-all-who-joined-us\/15040\/","title":{"rendered":"Webinar on APT predictions: thanks to all who joined us"},"content":{"rendered":"<p>Kaspersky Lab\u2019s webinar \u2018Emerging Threats in the APT World: Predictions for 2015\u2019 took place yesterday, and we would like to thank everyone who joined us.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>\u00a0<\/p>\n<p>APTs attracted special attention this year with a number of them being discovered by security vendors, including Kaspersky Lab. Our observations suggest that APTs will evolve next year towards further elusiveness, with attackers doing their best to conceal their activities.<\/p>\n<p>\u201cIf we can call 2014 \u2018sophisticated\u2019, then the word for 2015 will be \u2018elusive\u2019. We believe that APT groups will evolve to become stealthier and sneakier in order to better avoid exposure. This year we\u2019ve already discovered APT players using several zero-days, and we\u2019ve observed new persistence and stealth techniques. We have used this to develop and deploy several new defense mechanisms for our users,\u201d said Costin Raiu, Director of GReAT at Kaspersky Lab.<\/p>\n<p>A full recording of the webinar featuring the insight of Costin Raiu, Director of Global Research and Analysis Team (GReAT) at Kaspersky Lab is available <a href=\"https:\/\/kas.pr\/aptwebinar\" target=\"_blank\" rel=\"noopener\">here<\/a>. You can also access his presentation slides <a href=\"https:\/\/kas.pr\/aptpredictionspresentation\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<ul>\n<li>To read about new trends in the APT world, please visit the<a href=\"https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/68117\/kaspersky-security-bulletin-2014-a-look-into-the-apt-crystal-ball\/\" target=\"_blank\" rel=\"noopener\">Securelist blog<\/a>.<\/li>\n<li>To find out more about key events that have defined the threat landscape in 2014, you can read Kaspersky Lab\u2019s report in full <a href=\"http:\/\/kas.pr\/ksb\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/li>\n<li>To watch Kaspersky Lab\u2019s video \u201cGame of cyber-thrones: attacks on the corporate sector and business executives in 2014\u201d, please click\u00a0<a href=\"http:\/\/youtu.be\/eh3IdYR3hg0\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Yesterday, Kaspersky Lab hosted the &#8216;Emerging Threats in the APT World: Predictions for 2015\u2019 webinar. Special thank you to everyone who joined our discussion on how APTs will evolve in the coming year. <\/p>\n","protected":false},"author":209,"featured_media":15821,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[2256,282,2257,2246],"class_list":{"0":"post-15040","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-apt-predictions","10":"tag-cybersecurity","11":"tag-cybersecurity-webinars","12":"tag-webinar"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/webinar-on-apt-predictions-thanks-to-all-who-joined-us\/15040\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/webinar-on-apt-predictions-thanks-to-all-who-joined-us\/15040\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/webinar-on-apt-predictions-thanks-to-all-who-joined-us\/15040\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/apt-predictions\/","name":"APT predictions"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=15040"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15040\/revisions"}],"predecessor-version":[{"id":26599,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15040\/revisions\/26599"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15821"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=15040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=15040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=15040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}