VB Blog

How broken is SHA-1 really?

Posted by   Martijn Grooten on   Mar 15, 2016

SHA-1 collisions may be found in the next few months, but that doesn't mean that fake SHA-1-based certificates will be created in the near future. Nevertheless, it is time for everyone, and those working in security in particular, to move away from outdated hash functions.

Read more  

VB2016 Call for Papers - Frequently Asked Questions

Posted by   Martijn Grooten on   Mar 11, 2016

Are you interested in submitting an abstract for VB2016? We've answered some frequently asked questions about the Call for Papers, which closes next week.

Read more  

Throwback Thursday: Hash Woes

Posted by   Helen Martin on   Mar 10, 2016

This Throwback Thursday we go back to 2004, when the entire crypto community was abuzz with the news that a group of Chinese researchers had demonstrated flaws in a whole set of hash functions - VB took a closer look to clarify the situation and draw lessons from the incident.

Read more  

VB2015 paper: Mobile Banking Fraud via SMS in North America: Who's Doing it and How

Posted by   Martijn Grooten on   Mar 2, 2016

Though SMS may have been claimed dead many time, it is still very much alive, and quite popular among mobile phishers. At VB2015, Adaptive Mobile researcher Cathal Mc Daid presented a paper various mobile phishing campaigns targeting North American banks.

Read more  

Throwback Thursday: Viruses on the Internet

Posted by   Helen Martin on   Feb 25, 2016

This Throwback Thursday VB heads back to 1996 when - long before the days of driveby downloads and exploit kits - VB published a report on the state of viruses on the Internet.

Read more  

RSA and BSides San Francisco

Posted by   Martijn Grooten on   Feb 24, 2016

Next week, Virus Bulletin Editor Martijn Grooten will attend the RSA conference in San Francisco, where he will give a talk entitled "How Broken Is Our Crypto Really?" He will also speak at BSides San Francisco, where he will give a talk entitled "Elliptic Curve Cryptography for Those Who are Afraid of Mathematics".

Read more  

Virus Bulletin publishes first web filter test report

Posted by   Martijn Grooten on   Feb 19, 2016

After a lot of preparation, Virus Bulletin is proud to have published the first "VBWeb" comparative web filter test report, in which products' ability to block web-based malware and drive-by downloads was tested. Fortinet's FortiGuard appliance was the first product to achieve a VBWeb certification.

Read more  

VB2015 paper: Will Android Trojans, Worms or Rootkits Survive in SEAndroid and Containerization?

Posted by   Martijn Grooten on   Feb 18, 2016

Sophos researchers Rowland Yu and William Lee look at whether recent security enhancements to Android, such as SEAndroid and containerization, will be enough to defeat future malware threats.

Read more  

First six VB2016 sponsors announced

Posted by   Martijn Grooten on   Feb 17, 2016

Virus Bulletin is excited to announce the first six sponsors for VB2016, the 26th international Virus Bulletin conference, which will take place in Denver, Colorado, USA 5-7 October 2016.

Read more  

VB2015 paper: Sizing cybercrime: incidents and accidents, hints and allegations

Posted by   Martijn Grooten on   Feb 11, 2016

Cybercrime is big. But how big is it really? In a paper presented at VB2015 and together with the presentation video published on our website today, ESET researcher Stephen Cobb looks at previous studies that attempt the size of cybercrime and asks why we need such data and what can be done better.

Read more  

Search blog

Cybersecurity Assessment Tool launched by Ford Foundation

The Ford Foundation has launched a tool designed to help nonprofit organizations assess their own cybersecurity efforts.
The Ford Foundation has launched a tool designed to help nonprofit organizations assess their own cybersecurity efforts. The Cybersecurity Assessment Tool is specifically aimed… https://www.virusbulletin.com/blog/2020/11/cybersecurity-assessment-tool-launched-ford-foundation/

VB2020 presentation: Another threat actor day…

At VB2020 localhost Paul Jung, of Excellium Services, detailed an incident response that he and his team faced when, in December 2019, a Belgian hospital required their help to manage a breach of their informations system.
Hospitals can be attractive places for hackers. With access to critical medical records and personally identifiable information, there is great opportunity to exploit patients.… https://www.virusbulletin.com/blog/2020/11/vb2020-presentation-another-threat-actor-day/

VB2020 presentation: Ramsay: a cyber-espionage toolkit tailored for air-gapped networks

At VB2020 localhost, ESET researcher Ignacio Sanmillan spoke about Ramsay, a toolkit specifically designed to steal documents and operate within air-gapped networks.
Air gapping is a network security measure commonly used in military/governmental, financial and industrial control systems networks that is applied to one or more computers in… https://www.virusbulletin.com/blog/2020/11/vb2020-presentation-ramsay-cyber-espionage-toolkit-tailored-air-gapped-networks/

VB2020 TIPS presentation: Business Email Compromise – Scalable Attribution Powering Industry and Law Enforcement Collaboration

As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners' Summmit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we highlight some of the talks presented in the Summit and the important contr…
As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners' Summit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we… https://www.virusbulletin.com/blog/2020/11/vb2020-tips-presentation-business-email-compromise-scalable-attribution-powering-industry-and-law-enforcement-collaboration/

VB2020 TIPS presentation: Collaborating with Competitors: A Better Strategy to Beat Adversaries

As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners' Summmit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we highlight some of the talks presented in the Summit and the important contr…
As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners' Summit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we… https://www.virusbulletin.com/blog/2020/11/vb2020-tips-presentation-collaborating-competitors-better-strategy-beat-adversaries/

VB2020 TIPS presentations: cybercrime in the DACH region and ransomware in LATAM

As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners' Summmit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we highlight some of the talks presented in the Summit and the important contr…
As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners' Summit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we… https://www.virusbulletin.com/blog/2020/10/vb2020-tips-presentations-cybercrime-dach-region-and-ransomware-latam/

VB2020 TIPS presentation: Intelligence Sharing for Supply Chain Security

As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners' Summmit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we highlight some of the talks presented in the Summit and the important contr…
    As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners' Summit (TIPS), put together by the Cyber Threat Alliance. In a series of… https://www.virusbulletin.com/blog/2020/10/vb2020-tips-presentation-intelligence-sharing-supply-chain-security/

VB2020 localhost is over, but the content is still available to view!

VB2020 localhost - VB's first foray into the world of virtual conferences - took place last week, but you can still watch all the presentations.
VB2020 localhost - VB's first virtual, and entirely free to attend VB conference - took place last week and was a great success, with over 2,700 registered delegates from 84… https://www.virusbulletin.com/blog/2020/10/vb2020-localhost-over-theres-still-time-view-content/

New additions complete the VB2020 localhost programme

The programme for VB2020 localhost - the first virtual, and entirely free to attend VB conference - is now complete, with new additions to both the live programme and the on-demand programme.
While many kinds of economic activity have decreased during the pandemic, that is not the case for online threats: they have been as prolific as ever and continue to evolve.… https://www.virusbulletin.com/blog/2020/08/vb2020-localhost-programme-complete/

VB2020 localhost call for last minute papers: a unique opportunity

Why VB2020 localhost presents a unique opportunity for you to share your research with security experts around the globe.
Now in its 30th year, the Virus Bulletin Conference has not only evolved into the annual threat intelligence conference, but also into one of the most international security… https://www.virusbulletin.com/blog/2020/08/vb2020-localhost-call-last-minute-papers-unique-opportunity/

VB2020 localhost call for last-minute papers now open!

The call for last-minute papers for VB2020 localhost is now open. Submit before 17 August to have your paper considered for one of the nine slots reserved for 'hot' research!
Have you analysed a brand new online threat? Are you involved in cutting edge security research? Are you tasked with securing systems and fending off attacks and developing new… https://www.virusbulletin.com/blog/2020/07/vb2020-localhost-call-last-minute-papers-now-open/

Announcing... VB2020 localhost

Announcing VB2020 localhost: the carbon neutral, budget neutral VB conference!
Over the last few months the VB team has been hard at work preparing for the virtual edition of VB2020 and we can now reveal... VB2020 localhost: the carbon neutral, budget… https://www.virusbulletin.com/blog/2020/07/announcing-vb2020-localhost/

VB2019 paper: APT cases exploiting vulnerabilities in region-specific software

At VB2019, JPCERT/CC's Shusei Tomonaga and Tomoaki Tani presented a paper on attacks that exploit vulnerabilities in software used only in Japan, using malware that is unique to Japan. Today we publish both their paper and the recording of their presentat…
APT cases exploiting vulnerabilities in region-specific software Read the paper (HTML) Download the paper (PDF)       Software that is endemic to a specific country… https://www.virusbulletin.com/blog/2020/05/vb2019-paper-apt-cases-exploiting-vulnerabilities-region-specific-software/

New paper: Detection of vulnerabilities in web applications by validating parameter integrity and data flow graphs

In a follow-up to a paper presented at VB2019, Prismo Systems researchers Abhishek Singh and Ramesh Mani detail algorithms that can be used to detect SQL injection in stored procedures, persistent cross-site scripting (XSS), and server‑side request forger…
VB2019 paper: Catch me if you can: detection of injection exploitation by validating query and API integrity Read the paper (HTML) Download the paper (PDF)   VB2019 paper:… https://www.virusbulletin.com/blog/2020/04/new-paper-detection-vulnerabilities-web-applications-validating-parameter-integrity-and-data-flow-graphs/

VB2020 programme announced

VB is pleased to reveal the details of an interesting and diverse programme for VB2020, the 30th Virus Bulletin International Conference.
While VB is keeping a careful eye on the global situation surrounding the COVID-19 pandemic and the various travel and health advice, the planning and arrangements for VB2020 are… https://www.virusbulletin.com/blog/2020/04/vb2020-programme-announced/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.