Gabriel loves to play football (soccer!) and electric guitar, and hes a fan of all things blockchain technology and the NFT ecosystem. But life hasnt been easy for him: he had to leave his parents in Venezuela and immigrate to Spain, where he started working at Kaspersky in the middle of the covid lockdown. In this show more ...
interview, Gabriel tells us about his journey to cybersecurity. – Growing up in Venezuela, how was it? We often see news about the crisis in your home country… – My childhood was good; I loved sports, and played football a lot with my friends. Both of my parents are petroleum engineers. They worked for the oil industry until the political situation started affecting us — both of them lost their jobs and we had it hard for a while. I had to keep getting excellent grades in school to get scholarship; it was quite tough. After high school I decided to become an engineer like my parents, but I found that Materials Engineering was more interesting for me. Studying at a university isnt easy during a bad economic situation. However, in 2018 I received my degree in Materials Engineering from Universidad Simón Bolívar, one of the most prestigious universities in the country. – Near Moscow State University, where I often walk with my kids, theres a memorial monument to Simón Bolívar. What should I tell my kids about him? – Simón Bolívar is one of the main heroes in Latin America history. From 1500 to 1830, most countries in Latin America were part of the Spanish empire. Bolivar was the guy who liberated many countries, including Bolivia, Colombia, Ecuador, Panama, Peru, and of course Venezuela — after all he was Venezuelan! – Why did you move to Spain? – Well, in crisis times many people go to other countries, looking for a better life. In fact, my father is a son of Italian immigrants who moved to Venezuela after World War II. So Im part European, and I decided to start afresh in Europe. I chose Spain because of the language, and besides, some of my friends also migrated to Spain. – How different is your new country? Whats better, and whats strange? – Spain is beautiful. Here in Madrid Im living my life, not just surviving. And Spanish girls are very nice, especially in the south! My girlfriend is from down there (Andalusia), weve been together for three years now and were going to get married! As to strange feelings, yes, I dont feel that its my culture. Spanish and Venezuelan people both speak Spanish, but theres still a cultural barrier, and some words have different meanings. But its alright. Its great to have the feeling of developing a new life, but feeling alone throughout the process can be tricky. Its hard to lose someone close — not being able to be with them in their last moments. I sadly lost my grandma when I was already living here. I didnt say goodbye to her. And I miss being with my parents. I miss them every day. – You said you had a degree in Materials Engineering. But its quite far from cybersecurity. What was your reason to go to Kaspersky? – Ive known about Kaspersky since I bought my first laptop back in 2014. It came in a bundle with a one-year subscription for Kaspersky Internet Security, and for exactly one year my laptop worked perfectly. Then the license expired. I changed antivirus: mistake! Sure enough my laptop got messed up. I should have known better back then! While at university, I tried to study computer engineering first, for a few semesters, but I found it wasnt for me. I was more interested in physics and chemistry at that time. However, Ive been always passionate about IT. So when I finished my first internship at a plastic parts factory, I started working for a cryptocurrency company. Thats when I realized that I liked the world of business and corporate sales. So I came to Spain to study for an MBA and to combine both of my passions — business and tech. I was lucky to be selected for the internship in Kaspersky while finishing my MBA degree. – You started working at Kaspersky during lockdown in Spain. How did the restrictions influence your work? – Yes, at the beginning it was a bit awkward when youre not meeting every day with your colleagues in the office. It was comfortable in some ways, but also there was the fear that it would be difficult to collaborate and learn. I started as Sales Intern for the SMB channel in Iberia. Basically, I had to be the main sales support for all the channel and territory managers, to manage a bunch of stuff related to our CRM, to be in touch with partners, customers and distributors, to do onboarding of new partners, and to solve problems that they might have with the partner portal. Sure, covid restrictions made my work more difficult, but those restrictions also helped me develop a sense of responsibility, as well as communication skills and the ability to multitask. I learned a lot from my colleagues remotely. And when I finally met my coworkers during our event for partners in Barcelona, it was a bit funny to see them for the first time in person after working together almost a year! – What are the most common questions that people ask about Kaspersky products when you present these products to them? Did their attitudes change after the Ukrainian conflict started? – Theres a little bit of everything. There are lots of people who are interested in security technologies: they mostly have questions about product features. Many of them recognize Kaspersky as a market leader — this makes my work easier. Their main concerns are mostly the same: what if the service stops working or they suffer from some attack, and they need access to support to solve their problems. Unfortunately, now some people are just scared of the bad reputation that comes along due to the Ukrainian conflict. Some of them say they love our product but their bosses dont want to be involved with any Russian company. Its sad to hear because this kind of Russophobia makes no sense. – Did you ever think your life would be happier if you chose a different company to work for — not a Russian one — for your career? – Not once! I can say that my Russian colleagues are some of the nicest people Ive worked with. Since starting work here Ive felt understood. From the very beginning, they were always helping me learn quick so I could become more productive. Its something about the organizational culture. Theres no toxic competition — only collaboration and team work. Ive been welcomed not just to a company but to a warm family. Without a doubt its the best company Ive worked for in my experience so far. And I hope I can stay here and develop my career for many years.
With the addition of these seven vulnerabilities, the catalog now contains 654 vulnerabilities, including the date that federal agencies must apply the associated patches and security updates.
Brazil has seen an improvement in its data breach situation, with an 80% decrease in the number of cases seen in the first three months of 2022, according to new research by cybersecurity company Surfshark.
The report late on Sunday said Iran thwarted the attacks that planned to target the infrastructure of more than 100 public sector agencies. It did not elaborate on specific examples of the public sector agencies.
In a data security notice on its website, the healthcare provider disclosed that the actor was able to access a limited number of email accounts between January 26, 2021, and November 23, 2021.
Russia is known for its army of hackers, but since the start of its invasion of Ukraine, dozens of Russian organizations have been hacked, with terabytes of stolen data leaked onto the internet.
The text claims to be from “FOD”. This is the Federale Overheidsdienst Financien in Belgium. The suspect URL includes a domain registered just this month (often a red flag), in India, rather than Belgium.
Britain’s computerized army recruitment system has been closed for most of the war in Ukraine after candidate data was compromised in a possible hack, prompting alarmed officials to suspend its operations.
Security researchers have disclosed a security vulnerability in the VirusTotal platform that could have been potentially weaponized to achieve remote code execution (RCE).
In a proposed class-action lawsuit filed on Friday, the plaintiff claimed he and potentially others fell victim to a sophisticated phishing attack in which their Trezor cryptocurrency wallets were unlawfully accessed and funds siphoned.
The U.S. Department of Health and Human Services posted an alert last week warning healthcare organizations of an “exceptionally aggressive” ransomware group that is known to target the sector.
An attack on the country's Finance Ministry impacted several processes, including tax collection, the payment of public employees, and the importation and exportation of goods through Costa Rica’s customs agency.
The Emotet malware phishing campaign is up and running again after the threat actors fixed a bug preventing people from becoming infected when they opened malicious email attachments.
SecZetta shared a research that demonstrates a clear misalignment between the strategies organizations currently use and what is actually required to protect them from cyberattacks due to third-party vulnerabilities.
Federal investigators say a cyber attack on a North Dakota-based company that provides software and billing services for doctors and healthcare professionals affected more than a half million customers.
According to the INCD, Quds Day is usually a peak time for the distribution of anti-Israel messages and attacks on Israeli websites in the past few years. The event, also known as Jerusalem Day, will fall on April 29 this year.
"It looks like BAYC Instagram was hacked. Do not mint anything, click links, or link your wallet to anything," Bored Ape Yacht Club tweeted Monday morning in a warning that came too late for some of its members.
KISS improves security when your IT team avoids jargon and makes complex-but-important tasks easier to understand, but it reduces security when crooks steer clear of mistakes that would otherwise give their game away.
While the issue was patched by the virtualization services provider on April 6, 2022, the company cautioned users of confirmed exploitation of the flaw occurring in the wild a week later.
The BlackCat ransomware attack against the undisclosed organization took place in March 2022 and has been detailed by cybersecurity researchers at Forescout who investigated the incident.
The lawsuit stems from a months-long employee email system compromise, first discovered in June 2019. The vendor did not begin notifying the 114,007 patients of the impact on their personal and health data until November 2019.
IBM has updated its data management platform Db2 in order to protect users from a pair of critical vulnerabilities in older versions of Expat, a third-party library. Both flaws notched a CVSS score of 9.8.
The activity occurred while Emotet was on a “spring break,” not conducting its typical high volume threat campaigns. The threat actor has since resumed its typical activity.
Following a massive health data leak disclosed in the press concerning nearly 500,000 persons in February 2021, the CNIL has fined the company Dedalus Biologie ~$1.6 million mainly for failure to comply with its data security obligation.
Coca-Cola said it is investigating reports of a data breach after a ransomware group named Stormous claimed to have stolen internal documents from the American beverage giant.
TeamTNT hackers’ shell scripts were found disabling cloud security tools to attack AWS and Alibaba Cloud. Its payloads include credential stealers, cryptocurrency miners, persistence, and lateral movement. Organizations are suggested to continue taking the right measures to protect your systems from such threats.
Cybersecurity analysts have detected yet another info-stealer malware infection, named Prynt Stealer, offering powerful capabilities and extra keylogger and clipper modules. The developer of the stealer claims the recent version of the stealer is undetectable. Users are suggested to use a strong password with 2FA and avoid third-party download sources.
Researchers from SentinelLabs claimed that Nokoyawa is clearly a variant of Nemty (Karma) ransomware. Previously, Trend Micro had highlighted similarities in the attack chain between Nokoyawa and Hive ransomware.
Researchers released a report on BlackByte ransomware describing new variants written in Go and DotNET, with one variant written with a mix of Go and C languages. The ransomware actors were observed making changes to the registry in an attempt to escalate privileges. Organizations are suggested to stay protected by deploying robust anti-ransomware solutions.
GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant show more ...
to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. This is the LTS release.
The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The show more ...
clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
Ubuntu Security Notice 5388-2 - It was discovered that OpenJDK incorrectly verified ECDSA signatures. An attacker could use this issue to bypass the signature verification process. It was discovered that OpenJDK incorrectly limited memory when compiling a specially crafted XPath expression. An attacker could possibly show more ...
use this issue to cause a denial of service. It was discovered that OpenJDK incorrectly handled converting certain object arguments into their textual representations. An attacker could possibly use this issue to cause a denial of service.
Ubuntu Security Notice 5388-1 - It was discovered that OpenJDK incorrectly limited memory when compiling a specially crafted XPath expression. An attacker could possibly use this issue to cause a denial of service. It was discovered that OpenJDK incorrectly handled converting certain object arguments into their show more ...
textual representations. An attacker could possibly use this issue to cause a denial of service. It was discovered that OpenJDK incorrectly validated the encoded length of certain object identifiers. An attacker could possibly use this issue to cause a denial of service.
Ubuntu Security Notice 5387-1 - Douglas Mendizábal discovered that Barbican incorrectly handled access restrictions. An authenticated attacker could possibly use this issue to consume protected resources and possibly cause a denial of service.
Red Hat Security Advisory 2022-1490-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Red Hat Security Advisory 2022-1491-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Gitlab versions 14.9 prior to 14.9.2, 14.8 prior to 14.8.5, and 14.7 prior to 14.7.7 suffer from a bypass vulnerability due to having set a hardcoded password for accounts registered using an OmniAuth provider.
Ubuntu Security Notice 5376-2 - USN-5376-1 fixed vulnerabilities in Git. This update provides the corresponding updates for Ubuntu 22.04 LTS. 俞晨东 discovered that Git incorrectly handled certain repository paths in platforms with multiple users support. An attacker could possibly use this issue to run arbitrary commands.
Red Hat Security Advisory 2022-1487-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Red Hat Security Advisory 2022-1488-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant show more ...
to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.
Red Hat Security Advisory 2022-1489-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
An Iranian-linked threat actor known as Rocket Kitten has been observed actively exploiting a recently patched VMware vulnerability to gain initial access and deploy the Core Impact penetration testing tool on vulnerable systems. Tracked as CVE-2022-22954 (CVSS score: 9.8), the critical issue concerns a case of remote code execution (RCE) vulnerability affecting VMware Workspace ONE Access and
A state-backed threat actor with ties to the Democratic People's Republic of Korea (DRPK) has been attributed to a spear-phishing campaign targeting journalists covering the country with the ultimate goal of deploying a backdoor on infected Windows systems. The intrusions, said to be the work of Ricochet Chollima, resulted in the deployment of a novel malware strain called GOLDBACKDOOR, an
The threat actor behind the prolific Emotet botnet is testing new attack methods on a small scale before co-opting them into their larger volume malspam campaigns, potentially in response to Microsoft's move to disable Visual Basic for Applications (VBA) macros by default across its products. Calling the new activity a "departure" from the group's typical behavior, ProofPoint alternatively
The infamous ransomware group known as Conti has continued its onslaught against entities despite suffering a massive data leak of its own earlier this year, according to new research. Conti, attributed to a Russia-based threat actor known as Gold Ulrick, is one of the most prevalent malware strains in the ransomware landscape, accounting for 19% of all attacks during the three-month-period
Costa Rica's outgoing president, Carlos Alvarado Quesada, has said that a ransomware attack on the government's computer systems was an attempt to destabilise the country as it transitions to a new administration. Read more in my article on the Hot for Security blog.