VB Blog

Symantec, Kaspersky issue threat reports

Posted by   Virus Bulletin on   Sep 26, 2006

Trojans, vulnerabilities, spam and crime loom large.

Read more  

Trend launches bot blocking service

Posted by   Virus Bulletin on   Sep 26, 2006

Botnet-spotting system watches for bad DNS behaviour.

Read more  

More than 90% of email is spam

Posted by   Virus Bulletin on   Sep 22, 2006

Spamhaus founder estimates spam levels significantly higher than other industry monitors.

Read more  

Canadians row with Sony over DRM

Posted by   Virus Bulletin on   Sep 22, 2006

Rootkit battles still going.

Read more  

Vista issues worry vendors

Posted by   Virus Bulletin on   Sep 22, 2006

Security firms complain about monopoly tactics.

Read more  

Unofficial VML patch released

Posted by   Virus Bulletin on   Sep 22, 2006

Security task force issues stop-gap fix for IE hole.

Read more  

AV guru Jimmy Kuo heads to Microsoft

Posted by   Virus Bulletin on   Sep 20, 2006

Industry veteran joins others from McAfee.

Read more  

Spam King sued again

Posted by   Virus Bulletin on   Sep 19, 2006

Serial spammer charged with more spamming.

Read more  

Zero-day exploit targeting IE flaw

Posted by   Virus Bulletin on   Sep 19, 2006

'Extremely critical' buffer overflow used to drop spyware.

Read more  

AIM worm warning

Posted by   Virus Bulletin on   Sep 19, 2006

AOL IM users at risk from botnet-building attack.

Read more  

Search blog

New paper: A review of the evolution of Andromeda over the years

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by…
In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or… https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.