{"id":15150,"date":"2016-07-21T14:17:34","date_gmt":"2016-07-21T14:17:34","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5797"},"modified":"2020-02-26T11:10:20","modified_gmt":"2020-02-26T16:10:20","slug":"great-ama-2","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/great-ama-2\/15150\/","title":{"rendered":"Ask us anything \u2014 really"},"content":{"rendered":"<p>The threat landscape is ever changing and our Global Research and Analysis Team (GReAT) is <a href=\"https:\/\/apt.securelist.com\/\" target=\"_blank\" rel=\"noopener\">constantly looking at new attacks<\/a> and finding ways to help protect the world from attack. No matter what time it is in the world, some of our GReAT researchers are working to expose the most sophisticated threats and keep the world safe. You see, cybercriminals don\u2019t sleep \u2014 and neither does GReAT.<\/p>\n<p>Have you ever wondered what magic GReAT members use? How they do what they do? If they use free Wi-Fi? Or have any hobbies?<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>Well now is your chance. On Wednesday, July 27, at 9:00 EDT (<a href=\"httpss:\/\/calendar.google.com\/calendar\/render?action=TEMPLATE&amp;hl=en&amp;text=%255BKaspersky+Security+Team%255D(https:\/\/www.kaspersky.com\/about\/security_experts)&amp;dates=20160727T090000\/20160727T100000&amp;location&amp;ctz=America\/New_York&amp;details=Kaspersky+Global+Rese\" target=\"_blank\" rel=\"noopener nofollow\">add to your calendar<\/a>), four members of GReAT will log into Reddit and peel back the onion a bit in an Ask Me Anything (AMA) session. The group fielding questions will include <a href=\"https:\/\/twitter.com\/craiu?lang=en\" target=\"_blank\" rel=\"noopener nofollow\">Costin Raiu<\/a>, <a href=\"https:\/\/twitter.com\/trompi\" target=\"_blank\" rel=\"noopener nofollow\">Vicente Diaz<\/a>, <a href=\"https:\/\/twitter.com\/vkamluk\" target=\"_blank\" rel=\"noopener nofollow\">Vitaly Kamluk<\/a>, and <a href=\"https:\/\/twitter.com\/ryanaraine\" target=\"_blank\" rel=\"noopener nofollow\">Ryan Naraine<\/a>.<\/p>\n<p style=\"text-align: center\">UPD: The AMA session is now live! Join us at\u00a0<a href=\"https:\/\/kas.pr\/AskGReAT\" target=\"_blank\" rel=\"noopener\">https:\/\/kas.pr\/AskGReAT<\/a>.<\/p>\n<p>The team will be answering questions for about one and a half hours and will try to get to as many as they can. We\u2019ll share the link on our company\u2019s social media accounts and will tag some of the best questions and answers using #AskGReAT.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Ask us literally anything #AskGReAT #AMA<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FJ4HS&amp;text=Ask+us+literally+anything+%23AskGReAT+%23AMA\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Until then, we\u2019ll leave you some links to frequently asked questions:<\/p>\n<ul>\n<li><a href=\"https:\/\/threatpost.com\/apt-attackers-flying-more-false-flags-than-ever\/116814\/\" target=\"_blank\" rel=\"noopener nofollow\">Why is attribution hard?<\/a><\/li>\n<li><a href=\"https:\/\/securelist.com\/blog\/research\/75040\/lurk-banker-trojan-exclusively-for-russia\/\" target=\"_blank\" rel=\"noopener\">Does Kaspersky Lab find cybercriminals in Russia?<br>\n<\/a><\/li>\n<li><a href=\"http:\/\/noransom.kaspersky.com\/\" target=\"_blank\" rel=\"noopener\">I have been infected with ransomware, how do I get my files back?<br>\n<\/a><\/li>\n<li><a href=\"https:\/\/apt.securelist.com\/\" target=\"_blank\" rel=\"noopener\">What APT has Kaspersky <\/a><a href=\"https:\/\/apt.securelist.com\/\" target=\"_blank\" rel=\"noopener\">d<\/a><a href=\"https:\/\/apt.securelist.com\/\" target=\"_blank\" rel=\"noopener\">iscovered?<br>\n<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/billion-dollar-apt-carbanak\/7519\/\" target=\"_blank\" rel=\"noopener nofollow\">Did criminals really steal a billion dollars via a hack?<\/a><\/li>\n<li><a href=\"https:\/\/securelist.com\/analysis\/publications\/75145\/pc-ransomware-in-2014-2016\/\" target=\"_blank\" rel=\"noopener\">How big <\/a><a href=\"https:\/\/securelist.com\/analysis\/publications\/75145\/pc-ransomware-in-2014-2016\/\" target=\"_blank\" rel=\"noopener\">a problem is <\/a><a href=\"https:\/\/securelist.com\/analysis\/publications\/75145\/pc-ransomware-in-2014-2016\/\" target=\"_blank\" rel=\"noopener\">r<\/a><a href=\"https:\/\/securelist.com\/analysis\/publications\/75145\/pc-ransomware-in-2014-2016\/\" target=\"_blank\" rel=\"noopener\">ansomware?<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>On July 27, members of Kaspersky Lab\u2019s GReAT will sit down on Reddit, where you can ask them absolutely anything.<\/p>\n","protected":false},"author":636,"featured_media":12643,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[1716,1718,605,352,1717,732,1586,1719,1158],"class_list":{"0":"post-15150","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-ama","10":"tag-costin-raiu","11":"tag-great","12":"tag-kaspersky-lab","13":"tag-reddit","14":"tag-research","15":"tag-ryan-naraine","16":"tag-vincente-diaz","17":"tag-vitaly-kamluk"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/great-ama-2\/15150\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/great-ama-2\/3917\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/great-ama-2\/15150\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/great-ama-2\/15150\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ama\/","name":"AMA"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15150"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15150\/revisions"}],"predecessor-version":[{"id":33718,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15150\/revisions\/33718"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/12643"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}