VB Blog

Lenovo laptops pre-installed with software that adds its own root CA certificate

Posted by   Virus Bulletin on   Feb 20, 2015

Shared root certificate makes for easy man-in-the-middle attacks.

Read more  

Google relaxes disclosure policy following criticism

Posted by   Virus Bulletin on   Feb 16, 2015

Grace period added for vulnerabilities that are about to be patched.

Read more  

VB2014 video: .NET malware dynamic instrumentation for automated and manual analysis

Posted by   Virus Bulletin on   Feb 13, 2015

Hexiang Hu used tool to detect Bladabindi backdoor.

Read more  

Facebook launches platform for sharing of threat intelligence

Posted by   Virus Bulletin on   Feb 12, 2015

Twitter, Yahoo! amongst early participants in 'ThreatExchange'.

Read more  

VirusTotal project aims to remediate false positives

Posted by   Virus Bulletin on   Feb 11, 2015

Security vendors to receive alerts when legitimate files are detected as malicious.

Read more  

VB2014 paper: P0wned by a barcode: stealing money from offline users

Posted by   Virus Bulletin on   Feb 10, 2015

Fabio Assolini explains how cybercriminals are targeting boletos.

Read more  

Adobe issues patch for yet another Flash Player zero-day

Posted by   Virus Bulletin on   Feb 5, 2015

CVE-2015-0313 used in the wild as long ago as December.

Read more  

VB2014 paper: We know it before you do: predicting malicious domains

Posted by   Virus Bulletin on   Feb 5, 2015

Wei Xu and his colleagues attempt to block domains before they're used for bad purposes.

Read more  

Praise for the unsung heroes of email

Posted by   Virus Bulletin on   Feb 4, 2015

Many decent performances in VB's latest comparative spam filter test.

Read more  

Low VirusTotal detection rates for new malware, do they matter?

Posted by   Virus Bulletin on   Feb 3, 2015

It is not as important as is often suggested — and doesn't mean the malware is allowed to execute.

Read more  

Search blog

New paper: A review of the evolution of Andromeda over the years

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by…
In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or… https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.