VB Blog

VB2017 paper: Nine circles of Cerber

Posted by   Martijn Grooten on   Dec 15, 2017

Cerber is one of the major names in the world of ransomware, and last year, Check Point released a decryption service for the malware. Today, we publish a VB2017 paper by Check Point's Stanislav Skuratovich describing how the Cerber decryption tool worked; we have also uploaded the video of the presentation of this paper, by Or Eshed and Yaniv Balmas.

Read more  

Attack on Fox-IT shows how a DNS hijack can break multiple layers of security

Posted by   Martijn Grooten on   Dec 14, 2017

Dutch security firm Fox-IT deserves praise for being open about an attack on its client network. There are some important lessons to be learned about DNS security from its post-mortem.

Read more  

Throwback Thursday: BGP - from route hijacking to RPKI: how vulnerable is the Internet?

Posted by   Martijn Grooten on   Dec 14, 2017

For this week's Throwback Thursday, we look back at the video of a talk Level 3's Mike Benjamin gave at VB2016 in Denver, on BGP and BGP hijacks.

Read more  

Security Planner gives security advice based on your threat model

Posted by   Martijn Grooten on   Dec 13, 2017

Citizen Lab's Security Planner helps you improve your online safety, based on the specific threats you are facing.

Read more  

VB2017 video: Spora: the saga continues a.k.a. how to ruin your research in a week

Posted by   Martijn Grooten on   Dec 11, 2017

Today, we publish the video of the VB2017 presentation by Avast researcher Jakub Kroustek and his former colleague Előd Kironský, now at ESET, who told the story of Spora, one of of the most prominent ransomware families of 2017.

Read more  

VB2017 paper: Modern reconnaissance phase on APT – protection layer

Posted by   Martijn Grooten on   Dec 7, 2017

During recent research, Cisco Talos researchers observed the ways in which APT actors are evolving and how a reconnaissance phase is included in the infection vector in order to protect valuable zero-day exploits or malware frameworks. At VB2017 in Madrid, two of those researchers, Paul Rascagneres and Warren Mercer, presented a paper detailing five case studies that demonstrate how the infection vector is evolving. Today we publish both Paul and Warren's paper and the recording of their presentation.

Read more  

VB2017 paper: Peering into spam botnets

Posted by   Martijn Grooten on   Dec 1, 2017

At VB2017 in Madrid, CERT Poland researchers Maciej Kotowicz and Jarosław Jedynak presented a paper detailing their low-level analysis of five spam botnets. Today we publish their full paper.

Read more  

Throwback Thursday: Anti-malware testing undercover

Posted by   Martijn Grooten on   Nov 30, 2017

We look back at the VB2016 presentation by Righard Zwienenberg (ESET) and Luis Corrons (Panda Security), in which they discussed various issues relating to anti-malware testing.

Read more  

Virus Bulletin relaunches VB Security Jobs Market for both employers and job seekers

Posted by   Martijn Grooten on   Nov 30, 2017

As an independent body in the IT security industry, Virus Bulletin is in an ideal position to act as a global source of information both about jobs currently available in the field and about those candidates currently seeking to start or progress their career in the industry - which is why we have relaunched the VB Security Jobs Market.

Read more  

VB2017 paper: Offensive malware analysis: dissecting OSX/FruitFly.B via a custom C&C server

Posted by   Martijn Grooten on   Nov 29, 2017

At VB2017 in Madrid, macOS malware researcher Patrick Wardle presented the details of a specific piece of Mac malware, FruitFly, which he analysed through a custom C&C server - a technique that will also be of interest for researchers of malware on other platforms. Today we publish both Patrick's paper and the recording of his presentation.

Read more  

Search blog

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.
Today, VB has made all VB2021 localhost presentations available on VB's YouTube channel, so you can now watch – and share – any part of the conference freely and without… https://www.virusbulletin.com/blog/2021/11/vb2021-localhost-videos-available-youtube/

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.
VB2021 localhost - VB's second virtual, and entirely free to attend VB conference - took place last week and was a great success. If you missed it, don't worry, the… https://www.virusbulletin.com/blog/2021/10/vb2021-localhost-over-content-still-available-view/

VB2021 localhost call for papers: a great opportunity

VB2021 localhost presents an exciting opportunity to share your research with an even wider cross section of the IT security community around the world than usual, without having to take time out of your work schedule (or budget) to travel.
Earlier this week VB took the tough decision to cancel the in-person version of VB2021 in Prague. We had really hoped to be able to host an in-person event this year, but with… https://www.virusbulletin.com/blog/2021/03/vb2021-localhost-call-papers-great-opportunity/

The Bagsu banker case - presentation

At VB2019, CSIS researcher Benoît Ancel spoke about a quiet banking trojan actor that has been targeting German users since at least 2014.
Some time ago, researchers at CSIS Security Group discovered the infrastructure of a "quiet" banking trojan actor that had been targeting German users since at least 2014. At… https://www.virusbulletin.com/blog/2021/01/bagsu-banker-case-presentation/

VB2021 call for papers - now open, to all!

The call for papers for VB2021 is now open and we want to hear from you - we're planning for flexible presentation formats, so everyone is encouraged to submit, regardless of whether or not you know at this stage whether you'll be able to travel to Prague…
2020 proved to be an extraordinary – in the true sense of the word – year for everyone, and 2021 has already thrown some curveballs in the short few weeks since it began.… https://www.virusbulletin.com/blog/2021/01/vb2021-call-papers-now-open-all/

VB2020 localhost videos available on YouTube

VB has made all VB2020 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.
Today, VB has made all VB2020 localhost presentations available on VB's YouTube channel, so you can now watch – and share – any part of the conference freely and without… https://www.virusbulletin.com/blog/2021/01/vb2020-localhost-videos-available-youtube/

VB2020 localhost is over, but the content is still available to view!

VB2020 localhost - VB's first foray into the world of virtual conferences - took place last week, but you can still watch all the presentations.
VB2020 localhost - VB's first virtual, and entirely free to attend VB conference - took place last week and was a great success, with over 2,700 registered delegates from 84… https://www.virusbulletin.com/blog/2020/10/vb2020-localhost-over-theres-still-time-view-content/

New additions complete the VB2020 localhost programme

The programme for VB2020 localhost - the first virtual, and entirely free to attend VB conference - is now complete, with new additions to both the live programme and the on-demand programme.
While many kinds of economic activity have decreased during the pandemic, that is not the case for online threats: they have been as prolific as ever and continue to evolve.… https://www.virusbulletin.com/blog/2020/08/vb2020-localhost-programme-complete/

VB2020 localhost call for last minute papers: a unique opportunity

Why VB2020 localhost presents a unique opportunity for you to share your research with security experts around the globe.
Now in its 30th year, the Virus Bulletin Conference has not only evolved into the annual threat intelligence conference, but also into one of the most international security… https://www.virusbulletin.com/blog/2020/08/vb2020-localhost-call-last-minute-papers-unique-opportunity/

Announcing... VB2020 localhost

Announcing VB2020 localhost: the carbon neutral, budget neutral VB conference!
Over the last few months the VB team has been hard at work preparing for the virtual edition of VB2020 and we can now reveal... VB2020 localhost: the carbon neutral, budget… https://www.virusbulletin.com/blog/2020/07/announcing-vb2020-localhost/

VB2019 paper: APT cases exploiting vulnerabilities in region-specific software

At VB2019, JPCERT/CC's Shusei Tomonaga and Tomoaki Tani presented a paper on attacks that exploit vulnerabilities in software used only in Japan, using malware that is unique to Japan. Today we publish both their paper and the recording of their presentat…
APT cases exploiting vulnerabilities in region-specific software Read the paper (HTML) Download the paper (PDF)       Software that is endemic to a specific country… https://www.virusbulletin.com/blog/2020/05/vb2019-paper-apt-cases-exploiting-vulnerabilities-region-specific-software/

VB2020 programme announced

VB is pleased to reveal the details of an interesting and diverse programme for VB2020, the 30th Virus Bulletin International Conference.
While VB is keeping a careful eye on the global situation surrounding the COVID-19 pandemic and the various travel and health advice, the planning and arrangements for VB2020 are… https://www.virusbulletin.com/blog/2020/04/vb2020-programme-announced/

VB2019 paper: 2,000 reactions to a malware attack – accidental study

At VB2019 cybercrime journalist and researcher Adam Haertlé presented an analysis of almost 2000 unsolicited responses sent by victims of a malicious email campaign. Today we publish both his paper and the recording of his presentation.
2,000 reactions to a malware attack – accidental study Read the paper (HTML) Download the paper (PDF)   In an illuminating study – possible thanks to a unique perspective on… https://www.virusbulletin.com/blog/2020/03/vb2019-paper-2000-reactions-malware-attack-accidental-study/

VB2019 paper: Why companies need to focus on a problem they do not know they have

Often unbeknownst to network administrators, many company networks are used to download child sexual abuse material. In a paper presented at VB2019 in London, NetClean’s Richard Matti and Anna Creutz looked at this problem and what companies can do, ultim…
Why companies need to focus on a problem they do not know they have Read the paper (HTML) Download the paper (PDF)   It is one of the worst things on the Internet: child… https://www.virusbulletin.com/blog/2020/03/vb2019-paper-why-companies-need-focus/

VB2020 update - currently business as usual

Here at VB we are keeping a close eye on the global situation regarding the COVID-19 outbreak and the various travel restrictions and health advice, but in the meantime planning and arrangements for VB2020 are going ahead as usual, including the selection…
Like everyone around the world, we at Virus Bulletin have been closely following the news about the COVID-19 outbreak. Our team is spread throughout Europe (UK, Italy, Hungary and… https://www.virusbulletin.com/blog/2020/03/vb2020-current-situation/

VB2019 paper: Defeating APT10 compiler-level obfuscations

At VB2019 in London, Carbon Black researcher Takahiro Haruyama presented a paper on defeating compiler-level obfuscations used by the APT10 group. Today we publish both Takahiro's paper and the recording of his presentation.
Defeating APT10 compiler-level obfuscations Read the paper (HTML) Download the paper (PDF)   Obfuscation in malware has long frustrated analysis, and obfuscation at the… https://www.virusbulletin.com/blog/2020/03/vb2019-paper-defeating-apt10-compiler-level-obfuscations/

VB2019 paper: Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers

At VB2019 in London Michael Raggi (Proofpoint) and Ghareeb Saad (Anomali) presented a paper on the 'Royal Road' exploit builder (or weaponizer) and how the properties of RTF files can be used to track weaponizers and their users. Today we publish both the…
Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers Read the paper (HTML) Download the paper (PDF)   Malicious RTF files, exploiting… https://www.virusbulletin.com/blog/2020/03/vb2019-paper-attribution-object-using-rtf-object-dimensions-track-apt-phishing-weaponizers/

VB2019 presentation: Nexus between OT and IT threat intelligence

Operational technology, the mission critical IT in ICS, shares many similarities with traditional IT systems, but also some crucial differences. During the Threat Intelligence Practitioners’ Summit at VB2019, Dragos cyber threat intelligence analyst Selen…
Cyber attacks on industrial control systems (ICS) include the well-known stories of Stuxnet and BlackEnergy and such attacks appear to be getting more prevalent. Late last year, a… https://www.virusbulletin.com/blog/2020/03/vb2019-presentation-nexus-between-ot-and-it-threat-intelligence/

VB2019 paper: Play fuzzing machine - hunting iOS and macOS kernel vulnerabilities automatically and smartly

In a paper presented at VB2019 in London, Trend Micro researchers Lilang Wu and Moony Li explained how the hunt for vulnerabilities in MacOS and iOS operating systems can be made both smarter and more automatic. Today we publish both their paper and the r…
Apple’s MacOS and iOS operating systems are often praised for their security. Yet vulnerabilities in both operating systems are regularly being found and exploited, especially by… https://www.virusbulletin.com/blog/2020/03/vb2019-paper-play-fuzzing-machine-hunting-ios-and-macos-kernel-vulnerabilities-automatically-and-smartly/

VB2019 paper: Finding drive-by rookies using an automated active observation platform

In a last-minute paper presented at VB2019 in London, Rintaro Koike (NTT Security) and Yosuke Chubachi (Active Defense Institute, Ltd) discussed the platform they have built to automatically detect and analyse exploit kits. Today we publish the recording …
Exploit kits made a bit of a comeback in 2019, something we have also seen in our test lab. Detecting these kits isn’t trivial though, given the various anti-analysis measures… https://www.virusbulletin.com/blog/2020/03/vb2019-paper-finding-drive-rookies-using-automated-active-observation-platform/

« Previous 1234567...16 Next »

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.