VB Blog

Throwback Thursday: Cabirn Fever

Posted by   Virus Bulletin on   Jul 9, 2015

This Throwback Thursday, we turn the clock back to 2004, when the first worm to spread from mobile phone to mobile phone appeared.

Read more  

Little sympathy for breached Hacking Team

Posted by   Virus Bulletin on   Jul 8, 2015

Lists of customers, source code and zero-day vulnerabilities made public.

Read more  

Throwback Thursday: The Updating Game

Posted by   Virus Bulletin on   Jul 2, 2015

This Throwback Thursday, we turn the clock back to 1997, when automatic updates of AV software were not the norm.

Read more  

Nominations opened for second Péter Ször Award

Posted by   Virus Bulletin on   Jun 29, 2015

'Brilliant mind and a true gentleman' commemorated through annual award for technical security research.

Read more  

Latest spam filter test sees significant drop in catch rates

Posted by   Virus Bulletin on   Jun 26, 2015

Despite a drop in catch rates, 15 products earn a VBSpam award, with four earning a VBSpam+ award.

Read more  

VB2014 paper: Quantifying maliciousness in Alexa top-ranked domains

Posted by   Virus Bulletin on   Jun 26, 2015

Paul Royal looks at malware served through the most popular websites.

Read more  

Throwback Thursday: KAOS on the Superhighway?

Posted by   Virus Bulletin on   Jun 25, 2015

This Throwback Thursday, we turn the clock back to 1994, when KAOS4 was discovered on the Internet.

Read more  

Steganoprague: a VB2015 competition & puzzle

Posted by   Virus Bulletin on   Jun 24, 2015

Use your obfuscation and deobfuscation skills to win a prize during the VB2015 conference!

Read more  

Paper: Using .NET GUIDs to help hunt for malware

Posted by   Virus Bulletin on   Jun 24, 2015

Tool to extract identifiers incorporated into VirusTotal.

Read more  

NSA, GCHQ found to target anti-virus products

Posted by   Virus Bulletin on   Jun 23, 2015

Agencies looked for vulnerabilities to exploit and for submitted malware samples.

Read more  

Search blog

VB2018 preview: Unpacking the packed unpacker: reversing an Android anti-analysis library

At VB2018, Google researcher Maddie Stone will present an analysis of the multi-layered 'WeddingCake' anti-analysis library used by many Android malware families.
Seven years ago, the first VB conference paper on Android malware looked at what was then a new, but growing trend. Since then both the threat and the research community have… https://www.virusbulletin.com/blog/2018/08/vb2018-preview-unpacking-packed-unpacker-reversing-android-anti-analysis-library/

Paper: Not old enough to be forgotten: the new chic of Visual Basic 6

Marion Marschalek looks at two Miuref binaries: one packed with Visual Basic 6 and one with C++.
Marion Marschalek looks at two Miuref binaries: one packed with Visual Basic 6 and one with C++. Two months ago, Microsoft announced it had added 'Miuref' to its Malicious Software… https://www.virusbulletin.com/blog/2014/07/paper-not-old-enough-be-forgotten-new-chic-visual-basic-6/

IEEE announces Anti-Malware Support Service

'Software taggant system' and 'clean file metadata exchange' discussed at previous VB conferences.
'Software taggant system' and 'clean file metadata exchange' discussed at previous VB conferences. Wouldn't it be nice if providers of software packers included a licence key in… https://www.virusbulletin.com/blog/2014/03/ieee-announces-anti-malware-support-service/

Security experts gather in Europe

Anti-malware insights pooled at AMTSO, CARO and EICAR meetings.
Anti-malware insights pooled at AMTSO, CARO and EICAR meetings. Many of the world's leading anti-malware and security experts came together in the past week, at a string of… https://www.virusbulletin.com/blog/2008/05/security-experts-gather-europe/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.