{"id":6993,"date":"2016-02-12T17:12:30","date_gmt":"2016-02-12T17:12:30","guid":{"rendered":"https:\/\/kasperskydaily.com\/germany\/?p=6993"},"modified":"2017-09-27T15:00:30","modified_gmt":"2017-09-27T13:00:30","slug":"sas-top-tweets","status":"publish","type":"post","link":"https:\/\/www.kaspersky.de\/blog\/sas-top-tweets\/6993\/","title":{"rendered":"Top 10 Tweets von der SAS 2016"},"content":{"rendered":"<p>Die SAS 2016 ist vorbei \u2014 es lebe die SAS. Es gab viele Neuigkeiten aus den Bereichen IT-Sicherheit und Cyberkriminalit\u00e4t, darunter brandneue Informationen \u00fcber <a href=\"https:\/\/www.kaspersky.de\/blog\/poseidon-apt-boutique\/6967\/\" target=\"_blank\" rel=\"noopener\">Poseidon<\/a>, <a href=\"https:\/\/www.kaspersky.de\/blog\/adwind-rat\/6958\/\" target=\"_blank\" rel=\"noopener\">Adwind<\/a> und <a href=\"https:\/\/www.kaspersky.de\/blog\/metel-gcman-carbanak\/6945\/\" target=\"_blank\" rel=\"noopener\">Metel<\/a>. Zur\u00fcck im Alltag pr\u00e4sentieren wir eine Zusammenfassung der Konferenz mit einigen der besten Tweets, die w\u00e4hrend des Events gepostet wurden (in willk\u00fcrlicher Reihenfolge aufgef\u00fchrt). Wenn Sie einen Tweet vermissen, teilen Sie es uns gern in einem Kommentar mit.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">All set;) <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/t.co\/d4CmEhou2S\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/d4CmEhou2S<\/a><\/p>\n<p>\u2014 Dasha Diaz (@dariaski) <a href=\"https:\/\/twitter.com\/dariaski\/status\/695337544309846016?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 4, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Die Experten von unserem globalen Recherche- und Analyseteam (GReAT) konnten es kaum erwarten, auf Teneriffa anzukommen und die letzten Vorbereitungen f\u00fcr eine gro\u00dfartige Konferenz zu treffen.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Opening <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> surprise appearance by <a href=\"https:\/\/twitter.com\/RAPst4r?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@RAPst4r<\/a>, who has better stage presence than most infosec presenters. <a href=\"https:\/\/t.co\/Ax9420t4XX\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/Ax9420t4XX<\/a><\/p>\n<p>\u2014 Chris Eng (@chriseng) <a href=\"https:\/\/twitter.com\/chriseng\/status\/696639450634395648?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 8, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Positive Resonanz von Chris Eng von Veracode bez\u00fcglich der Er\u00f6ffnungspr\u00e4sentation von Reuben Paul. Wenn Sie sich die Pr\u00e4sentation anschauen und sich selbst ein Bild machen wollen, klicken Sie auf den untenstehenden Periscope-Link in Stefans Tweet.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Did you know <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> is live on Periscope? <a href=\"https:\/\/t.co\/KcmvAx4DlL\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/KcmvAx4DlL<\/a> Follow along now <a href=\"https:\/\/twitter.com\/hashtag\/netsec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#netsec<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/cybersecurity?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#cybersecurity<\/a><\/p>\n<p>\u2014 Stefan Tanase (@stefant) <a href=\"https:\/\/twitter.com\/stefant\/status\/696650226464124928?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 8, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">\u201cMagic debit card\u201d found \u2013 each time makes a cash withdraw, it\u2019s refunded immediately <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Metel?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Metel<\/a> <a href=\"https:\/\/t.co\/rh0PQbzpWw\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/rh0PQbzpWw<\/a><\/p>\n<p>\u2014 Dmitry Bestuzhev (@dimitribest) <a href=\"https:\/\/twitter.com\/dimitribest\/status\/696681319154249728?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 8, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Niemand mag schwarze Magie. Der komplette Artikel \u00fcber <a href=\"https:\/\/securelist.com\/blog\/research\/73638\/apt-style-bank-robberies-increase-with-metel-gcman-and-carbanak-2-0-attacks\/\" target=\"_blank\" rel=\"noopener\">Metel<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Hackers Steal Money from Banks via APT-Style Attacks <a href=\"https:\/\/t.co\/GbBMtrIVEl\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/GbBMtrIVEl<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a><\/p>\n<p>\u2014 SecurityWeek (@SecurityWeek) <a href=\"https:\/\/twitter.com\/SecurityWeek\/status\/696749020245553152?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 8, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Mehr \u00fcber Metel und dar\u00fcber, wie die Hacker Geld stehlen.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Poseidon APT \u2013 First boutique malware from Brazil, operating since at least 2005. <a href=\"https:\/\/twitter.com\/hashtag\/thesas2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#thesas2016<\/a> <a href=\"https:\/\/t.co\/zpGKHHpa5v\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/zpGKHHpa5v<\/a><\/p>\n<p>\u2014 Marc Rogers (@marcwrogers) <a href=\"https:\/\/twitter.com\/marcwrogers\/status\/696998709251461120?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 9, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Wie zu erwarten war, hat <a href=\"https:\/\/securelist.com\/blog\/research\/73673\/poseidon-group-a-targeted-attack-boutique-specializing-in-global-cyber-espionage\/\" target=\"_blank\" rel=\"noopener\">Poseidon<\/a> Z\u00fcndstoff f\u00fcr rege Diskussionen geliefert. Die ATP-Gruppe ist seit mindestens zehn Jahren aktiv.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Encryption games here at <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <br>Try to decrypt my own message I leave for you \ud83d\ude42 <a href=\"https:\/\/t.co\/fNUecJ97WU\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/fNUecJ97WU<\/a><\/p>\n<p>\u2014 Dmitry Bestuzhev (@dimitribest) <a href=\"https:\/\/twitter.com\/dimitribest\/status\/696408884353880064?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 7, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>K\u00f6nnen Sie Dmitrys Nachricht entschl\u00fcsseln? Ich hab es nicht geschafft \u2014 wenn Sie sich einen Reim darauf machen k\u00f6nnen, teilen Sie es uns in einem Kommentar mit.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Nice! I think this is the first time I've seen an ANALOG exploit presented, by <a href=\"https:\/\/twitter.com\/Marmusha?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Marmusha<\/a> &amp; <a href=\"https:\/\/twitter.com\/dark_k3y?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@dark_k3y<\/a> @ <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/t.co\/wnym30MP5h\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/wnym30MP5h<\/a><\/p>\n<p>\u2014 Joe Fitz (@securelyfitz) <a href=\"https:\/\/twitter.com\/securelyfitz\/status\/697035009362890752?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 9, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Versteckt im Analogen.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">\"I hate hospitals\" <a href=\"https:\/\/twitter.com\/61ack1ynx?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@61ack1ynx<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/t.co\/K7PBQjKfp5\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/K7PBQjKfp5<\/a><\/p>\n<p>\u2014 Andrey Nikishin (@andreynikishin) <a href=\"https:\/\/twitter.com\/andreynikishin\/status\/697020347628064769?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 9, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Ich bin sicher, dass jeder das Statement aus dem Tweet oben nur allzu gut nachvollziehen kann. Mehr \u00fcber den \u201eHackerangriff\u201c auf ein Krankenhaus erfahren Sie <a href=\"https:\/\/threatpost.com\/medical-device-health-care-security-continues-to-ail\/116228\/\" target=\"_blank\" rel=\"noopener nofollow\">in diesem<\/a> oder <a href=\"https:\/\/www.kaspersky.de\/blog\/hacked-hospital\/6986\/\" target=\"_blank\" rel=\"noopener\">diesem Artikel<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">3D printed homemade robot bartender at <a href=\"https:\/\/twitter.com\/hashtag\/thesas2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#thesas2016<\/a> <a href=\"https:\/\/t.co\/VJMhMc7Fxh\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/VJMhMc7Fxh<\/a><\/p>\n<p>\u2014 Dennis (@DennisF) <a href=\"https:\/\/twitter.com\/DennisF\/status\/697047843450834944?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 9, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Erst die Arbeit, dann das Vergn\u00fcgen \u2014 oder? Und wer h\u00e4tte gedacht, dass moderne Technologie derart exquisite Drinks mixen kann?<\/p>\n<p><strong>Kr\u00f6nender Abschluss mit Sonnenuntergang<\/strong><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Peace out Tenerife. <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/t.co\/1nHbnsEZPq\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/1nHbnsEZPq<\/a><\/p>\n<p>\u2014 Chris (@brokenfuses) <a href=\"https:\/\/twitter.com\/brokenfuses\/status\/697779749603713025?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 11, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><strong>Alle Fotos von der SAS 2016<\/strong><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"pt\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> photos <a href=\"https:\/\/t.co\/0XAz2i0fa2\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/0XAz2i0fa2<\/a><\/p>\n<p>\u2014 Fabio Assolini (@assolini) <a href=\"https:\/\/twitter.com\/assolini\/status\/697738750936399872?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 11, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Die SAS 2016 ist vorbei \u2014 es lebe die SAS. Ein R\u00fcckblick mit den besten Tweets von der Konferenz, um die gro\u00dfen Momente noch einmal zu erleben.<\/p>\n","protected":false},"author":636,"featured_media":6994,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2711,6,2712],"tags":[274,1047,1650,1860,1879,1878,1859,54],"class_list":{"0":"post-6993","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-news","9":"category-special-projects","10":"tag-bedrohungen","11":"tag-cybersicherheit","12":"tag-malware","13":"tag-sas-2016","14":"tag-schadsoftware","15":"tag-teneriffa","16":"tag-thesas2016","17":"tag-twitter"},"hreflang":[{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/sas-top-tweets\/6993\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/sas-top-tweets\/6694\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/sas-top-tweets\/6763\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/sas-top-tweets\/6671\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/sas-top-tweets\/7724\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/sas-top-tweets\/7485\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/sas-top-tweets\/11301\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/sas-top-tweets\/11301\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/sas-top-tweets\/11301\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.de\/blog\/tag\/bedrohungen\/","name":"Bedrohungen"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.de\/blog\/wp-json\/wp\/v2\/posts\/6993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.de\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.de\/blog\/wp-json\/wp\/v2\/comments?post=6993"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.de\/blog\/wp-json\/wp\/v2\/posts\/6993\/revisions"}],"predecessor-version":[{"id":14669,"href":"https:\/\/www.kaspersky.de\/blog\/wp-json\/wp\/v2\/posts\/6993\/revisions\/14669"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.de\/blog\/wp-json\/wp\/v2\/media\/6994"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.de\/blog\/wp-json\/wp\/v2\/media?parent=6993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.de\/blog\/wp-json\/wp\/v2\/categories?post=6993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.de\/blog\/wp-json\/wp\/v2\/tags?post=6993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}