VB Blog

VB2020 presentation & paper: Advanced Pasta Threat: mapping threat actor usage of open-source offensive security tools

Posted by   Virus Bulletin on   Dec 2, 2020

At VB2020, researcher Paul Litvak revealed how he put together a comprehensive map of threat actor use of open-source offensive security tools.

Read more  

VB2020 presentation: Evolution of Excel 4.0 macro weaponization

Posted by   Virus Bulletin on   Nov 30, 2020

At VB2020 localhost James Haughom, Stefano Ortolani and Baibhav Singh gave a presentation in which they described how XL4 macros are being weaponised and the evolution of the techniques used.

Read more  

Cybersecurity Assessment Tool launched by Ford Foundation

Posted by   Virus Bulletin on   Nov 20, 2020

The Ford Foundation has launched a tool designed to help nonprofit organizations assess their own cybersecurity efforts.

Read more  

VB2020 presentation: Another threat actor day…

Posted by   Virus Bulletin on   Nov 19, 2020

At VB2020 localhost Paul Jung, of Excellium Services, detailed an incident response that he and his team faced when, in December 2019, a Belgian hospital required their help to manage a breach of their informations system.

Read more  

VB2020 presentation: Ramsay: a cyber-espionage toolkit tailored for air-gapped networks

Posted by   Virus Bulletin on   Nov 16, 2020

At VB2020 localhost, ESET researcher Ignacio Sanmillan spoke about Ramsay, a toolkit specifically designed to steal documents and operate within air-gapped networks.

Read more  

VB2020 TIPS presentation: Business Email Compromise – Scalable Attribution Powering Industry and Law Enforcement Collaboration

Posted by   Virus Bulletin on   Nov 12, 2020

As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners' Summmit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we highlight some of the talks presented in the Summit and the important contribution of threat intelligence sharing.

Read more  

VB2020 TIPS presentation: Collaborating with Competitors: A Better Strategy to Beat Adversaries

Posted by   Virus Bulletin on   Nov 3, 2020

As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners' Summmit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we highlight some of the talks presented in the Summit and the important contribution of threat intelligence sharing.

Read more  

VB2020 TIPS presentations: cybercrime in the DACH region and ransomware in LATAM

Posted by   Virus Bulletin on   Oct 27, 2020

As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners' Summmit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we highlight some of the talks presented in the Summit and the important contribution of threat intelligence sharing

Read more  

VB2020 TIPS presentation: Intelligence Sharing for Supply Chain Security

Posted by   Virus Bulletin on   Oct 21, 2020

As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners' Summmit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we highlight some of the talks presented in the Summit and the important contribution of threat intelligence sharing.

Read more  

VB2020 localhost is over, but the content is still available to view!

Posted by   Virus Bulletin on   Oct 6, 2020

VB2020 localhost - VB's first foray into the world of virtual conferences - took place last week, but you can still watch all the presentations.

Read more  

Search blog

What cybersecurity experts are talking about in 2025

The cybersecurity field moves quickly, with new research surfacing regularly and threat actors constantly shifting their approaches. We've gathered five recent research topics that caught our attention, each offering a different angle on the current threa…
The cybersecurity field moves quickly, with new research surfacing regularly and threat actors constantly shifting their approaches. Some discoveries reveal long-running campaigns… https://www.virusbulletin.com/blog/2025/06/what-cybersecurity-experts-are-talking-about-2025/

VBSpam tests to be executed under the AMTSO framework

VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework.
VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework. The Anti-Malware Testing… https://www.virusbulletin.com/blog/2024/06/vbspam-tests-be-executed-under-amtso-framework/

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.
We were very sorry to learn of the passing of Professor Ross Anderson a few days ago. Ross Anderson was Professor of Security Engineering at Cambridge University and Edinburgh… https://www.virusbulletin.com/blog/2024/04/memoriam-prof-ross-anderson/

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.
We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week. Alan Solomon was the eponymous creator of one of the world's first anti-virus… https://www.virusbulletin.com/blog/2024/02/memoriam-dr-alan-solomon/

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.
Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects Read the paper (HTML) Download the paper (PDF)   Android botnets are a formidable… https://www.virusbulletin.com/blog/2023/10/new-paper-nexus-android-banking-botnet-compromising-cc-panels-and-dissecting-mobile-appinjects/

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.
Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In a… https://www.virusbulletin.com/blog/2021/12/new-paper-collector-stealer-russian-origin-credential-and-information-extractor/

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.
Today, VB has made all VB2021 localhost presentations available on VB's YouTube channel, so you can now watch – and share – any part of the conference freely and without… https://www.virusbulletin.com/blog/2021/11/vb2021-localhost-videos-available-youtube/

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.
VB2021 localhost - VB's second virtual, and entirely free to attend VB conference - took place last week and was a great success. If you missed it, don't worry, the… https://www.virusbulletin.com/blog/2021/10/vb2021-localhost-over-content-still-available-view/

« Previous 1234567...121 Next »

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.