VB Blog

Spammers link to site containing QR code

Posted by   Virus Bulletin on   Jan 10, 2012

Curious users may scan URL and end up on pharma websites.

Read more  

January issue of VB published

Posted by   Virus Bulletin on   Jan 1, 2012

The January issue of Virus Bulletin is now available for subscribers to download.

Read more  

Spammers using Google open redirect

Posted by   Virus Bulletin on   Dec 15, 2011

Vulnerability 'not worthy of bug bounty program'.

Read more  

Compromised websites used to mine bitcoins

Posted by   Virus Bulletin on   Dec 13, 2011

In-the-browser botnet turns victims' CPU cycles into cash for the attackers.

Read more  

'Nitro attacks' continue

Posted by   Virus Bulletin on   Dec 13, 2011

PoisonIvy trojan sent attached to email warning about the same trojan.

Read more  

December issue of VB published

Posted by   Virus Bulletin on   Dec 1, 2011

The December issue of Virus Bulletin is now available for subscribers to download.

Read more  

Recently discovered Java vulnerability being added to exploit kit

Posted by   Virus Bulletin on   Nov 28, 2011

Kit 'patched' to include latest exploit; users urged to patch their software too.

Read more  

SMS trojan targets Android users in eight western countries

Posted by   Virus Bulletin on   Nov 25, 2011

Will another piece of mobile malware convince Google manager of the seriousness of the threat?

Read more  

Latest VBSpam certification results published

Posted by   Virus Bulletin on   Nov 21, 2011

Latest VBSpam results published - full report now also available.

Read more  

IETF expedites publication of RFC describing feedback loop recommendations

Posted by   Virus Bulletin on   Nov 17, 2011

Document fast-tracked to be published shortly before the sad passing of its author J.D. Falk.

Read more  

Search blog

What cybersecurity experts are talking about in 2025

The cybersecurity field moves quickly, with new research surfacing regularly and threat actors constantly shifting their approaches. We've gathered five recent research topics that caught our attention, each offering a different angle on the current threa…
The cybersecurity field moves quickly, with new research surfacing regularly and threat actors constantly shifting their approaches. Some discoveries reveal long-running campaigns… https://www.virusbulletin.com/blog/2025/06/what-cybersecurity-experts-are-talking-about-2025/

VBSpam tests to be executed under the AMTSO framework

VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework.
VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework. The Anti-Malware Testing… https://www.virusbulletin.com/blog/2024/06/vbspam-tests-be-executed-under-amtso-framework/

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.
We were very sorry to learn of the passing of Professor Ross Anderson a few days ago. Ross Anderson was Professor of Security Engineering at Cambridge University and Edinburgh… https://www.virusbulletin.com/blog/2024/04/memoriam-prof-ross-anderson/

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.
We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week. Alan Solomon was the eponymous creator of one of the world's first anti-virus… https://www.virusbulletin.com/blog/2024/02/memoriam-dr-alan-solomon/

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.
Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects Read the paper (HTML) Download the paper (PDF)   Android botnets are a formidable… https://www.virusbulletin.com/blog/2023/10/new-paper-nexus-android-banking-botnet-compromising-cc-panels-and-dissecting-mobile-appinjects/

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.
Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In a… https://www.virusbulletin.com/blog/2021/12/new-paper-collector-stealer-russian-origin-credential-and-information-extractor/

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.
Today, VB has made all VB2021 localhost presentations available on VB's YouTube channel, so you can now watch – and share – any part of the conference freely and without… https://www.virusbulletin.com/blog/2021/11/vb2021-localhost-videos-available-youtube/

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.
VB2021 localhost - VB's second virtual, and entirely free to attend VB conference - took place last week and was a great success. If you missed it, don't worry, the… https://www.virusbulletin.com/blog/2021/10/vb2021-localhost-over-content-still-available-view/

« Previous 1234567...121 Next »

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.