VB Blog

VB2019 presentation: A deep dive into iPhone exploit chains

Posted by   Virus Bulletin on   Jan 10, 2020

In a last-minute presentation at VB2019 in London, John Bambenek of the University of Illinois at Urbana-Champaign discussed details of campaigns that used advanced iOS and Android exploit chains against China’s Uighur minority. Today we release the recording of John's presentation.

Read more  

Latest VBWeb report describes current state of the web-based threat landscape

Posted by   Helen Martin on   Jan 8, 2020

Today we released the Winter 2020 VBWeb report, detailing the performance of web security products against live web threats and looking at the current state of the web-based threat landscape.

Read more  

VB2019 paper: Catch me if you can: detection of injection exploitation by validating query and API integrity

Posted by   Virus Bulletin on   Jan 6, 2020

In a paper presented at VB2019 in London, Prismo Systems researchers Abhishek Singh and Ramesh Mani discussed code injection vulnerabilities and presented a tool that could detect this vulnerability class. Today we publish their paper and the recording of their presentation.

Read more  

Virus Bulletin says a fond farewell and thank you to Martijn Grooten

Posted by   Helen Martin on   Dec 31, 2019

As VB Editor Martijn Grooten steps down from his role to move on to new challenges, the team wish him a fond farewell and the very best of luck in his future endeavours.

Read more  

VB2019 paper: Never before had Stierlitz been so close to failure (or: what is a Soviet super-spy doing in a popular bundleware for Mac?)

Posted by   Martijn Grooten on   Dec 27, 2019

Today, we publish the VB2019 paper and video by Sophos researcher Sergei Shevchenko in which he analyses a popular yet unnamed piece of macOS ‘bundleware’.

Read more  

Parting thoughts 5: bringing the good news

Posted by   Martijn Grooten on   Dec 23, 2019

In the final of a five-part series of blog posts, departing VB Editor Martijn Grooten argues for more emphasis on the good news in security, especially that which is more subtle.

Read more  

Parting thoughts 4: the big picture

Posted by   Virus Bulletin on   Dec 20, 2019

In the fourth of a five-part series of blog posts, departing VB Editor Martijn Grooten explains why security researchers should refer to other people's work.

Read more  

Parting thoughts 3: taking security seriously

Posted by   Martijn Grooten on   Dec 19, 2019

In the third of a five-part series of blog posts, departing VB Editor Martijn Grooten explains why he believes security vendors should take their products' security more seriously.

Read more  

VB2019 paper: Exploring the Chinese DDoS landscape

Posted by   Martijn Grooten on   Dec 19, 2019

China has long been a hotbed of DDoS activities, and today we publish a VB2019 paper by Intezer researcher Nacho Sanmillan who looked at Chinese threat groups engaged in performing DDoS attacks. We have also uploaded the recording of his presentation.

Read more  

Parting thoughts 2: the need for education in security

Posted by   Martijn Grooten on   Dec 18, 2019

In the second of a five-part series of blog posts, departing VB Editor Martijn Grooten explains why he believes cybersecurity professionals need to educate themselves on the complexities of the real-world situations in which security is applied.

Read more  

Search blog

PDF trojan exploits Adobe flaw

Reader/Acrobat vulnerability targeted day after patch release.
Reader/Acrobat vulnerability targeted day after patch release. A vulnerability in Adobe's popular PDF-viewing software Adobe Reader and editing suite Acrobat, first reported a… https://www.virusbulletin.com/blog/2007/10/pdf-trojan-exploits-adobe-flaw/

Storm attack strikes back

Cute kitten cards cover latest wave of malware.
Cute kitten cards cover latest wave of malware. The Storm attack has returned with yet another wave of blended attacks, with links to the drive-by download sites of the initial… https://www.virusbulletin.com/blog/2007/10/storm-attack-strikes-back/

St. Petersburg US Consulate website hacked

Malware served by official government site.
Malware served by official government site. Web-watchers at Sophos have reported spotting malware hosted on the website of the US Consulate in St. Petersburg, using obfuscated… https://www.virusbulletin.com/blog/2007/09/st-petersburg-us-consulate-website-hacked/

Yahoo!-owned ad firm serves up trojans

Infectious flash adverts displayed on major sites.
Infectious flash adverts displayed on major sites. Advertising supplied by ad firm Right Media, a company bought out by web giant Yahoo! earlier this year after an initial… https://www.virusbulletin.com/blog/2007/09/yahoo-owned-ad-firm-serves-trojans/

Storm DDoS hits anti-scam sites

419 fighters attacked - NFL and TOR latest spam hooks.
419 fighters attacked - NFL and TOR latest spam hooks. The massive botnet amassed by the 'Storm' (Zhelatin/Nuwar/Dorf/etc.) attack continues to target new victims, with the TOR… https://www.virusbulletin.com/blog/2007/09/storm-ddos-hits-anti-scam-sites/

YouTube latest Storm hook

Fake video links aim to pull in yet more victims.
Fake video links aim to pull in yet more victims. The never-ending stream of 'Storm' attacks continued over the weekend with a new tactic - the latest spammed email campaign… https://www.virusbulletin.com/blog/2007/08/youtube-latest-storm-hook/

Latest Storm barrage offers site memberships

New tactic provides logins to special-interest sites.
New tactic provides logins to special-interest sites. The 'Storm' attack has changed tactic yet again, with the latest set of spams providing login details to a wide selection of… https://www.virusbulletin.com/blog/2007/08/latest-storm-barrage-offers-site-memberships/

Monster haul of data reaped from job site

Trojan gathers 1.6 million sets of jobseeker records.
Trojan gathers 1.6 million sets of jobseeker records. Researchers at Symantec have reported discovering a server carrying 1.6 million entries from the popular jobseeking website… https://www.virusbulletin.com/blog/2007/08/monster-haul-data-reaped-job-site/

AVK tops latest AV-Test charts

Top four beat 99% in large collection scan.
Top four beat 99% in large collection scan. Testers at AV-Test.org have run 29 products over a massive collection of malware samples, with detection rates measured against 874,822… https://www.virusbulletin.com/blog/2007/08/avk-tops-latest-av-test-charts/

Storm e-card malware keeps on coming

No end to flood of fake friendly greetings.
No end to flood of fake friendly greetings. A further wave of e-cards carrying links to 'Storm' malware (various labelled Nuwar, Peacomm, Dorf, Zhelatin) has been hitting inboxes… https://www.virusbulletin.com/blog/2007/08/storm-e-card-malware-keeps-coming/

Worries of Storm forming massive botnet

DDoS danger looms as infection levels boom.
DDoS danger looms as infection levels boom. Repeated waves of the 'Storm' trojan attacks continue to be spammed out, with the latest using more eCards to hook in still more… https://www.virusbulletin.com/blog/2007/08/worries-storm-forming-massive-botnet/

Trojans and worms hiding behind games

Mario latest lure to hook victims on malware.
Mario latest lure to hook victims on malware. Social engineering techniques used to trick computer users into running malicious code on their systems concentrate around simple… https://www.virusbulletin.com/blog/2007/08/trojans-and-worms-hiding-behind-games/

Ransomware returns

Trojan hides personal data, demands money with menaces.
Trojan hides personal data, demands money with menaces. A new version of a ransomware trojan has been sighted, recalling the warnings of two years ago when similar items first… https://www.virusbulletin.com/blog/2007/07/ransomware-returns/

Trojan using webmail to send spam

Captcha systems possibly cracked to automate account creation.
Captcha systems possibly cracked to automate account creation.BitDefender has reported a new trojan attempting to bypass security measures on leading webmail systems Hotmail and… https://www.virusbulletin.com/blog/2007/07/trojan-using-webmail-send-spam/

Fourth of July targeted by trojan spam

Celebration card emails carry links to malware.
Celebration card emails carry links to malware. A further wave of greetings-card spam has been widely seeded, in the wake of considerable Storm Worm activity in the last week, with… https://www.virusbulletin.com/blog/2007/07/fourth-july-targeted-trojan-spam/

NOD32 alerts on suspect adverts

False positive reveals sneaky techniques used in ads.
False positive reveals sneaky techniques used in ads.ESET's NOD32 product was updated several times in close succession over the weekend, as false positives were introduced… https://www.virusbulletin.com/blog/2007/07/nod32-alerts-suspect-adverts/

Fake updates and phony postcards carry malware

Microsoft patch and greetings card spams bring more trojans.
Microsoft patch and greetings card spams bring more trojans. Several spam runs posing as vulnerability alerts from Microsoft have been spotted in the last week, with links to… https://www.virusbulletin.com/blog/2007/07/fake-updates-and-phony-postcards-carry-malware/

1.4 million Chinese infected over holiday week

May vacations bring trojan avalanche for gamers and filesharers.
May vacations bring trojan avalanche for gamers and filesharers. Chinese computers, in heavy use with many people off work for the Labour Day holiday week, have suffered a major… https://www.virusbulletin.com/blog/2007/05/1-4-million-chinese-infected-over-holiday-week/

Phishing moves into more new areas

Surveys, phone lines, USB sticks and call girls the latest tactics for spammers and phishers.
Surveys, phone lines, USB sticks and call girls the latest tactics for spammers and phishers. The latest social-engineering methods being put to use by phishers show no let up in… https://www.virusbulletin.com/blog/2007/05/phishing-moves-more-new-areas/

« Previous 12345 Next »

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.