VB Blog

Parting thoughts 2: the need for education in security

Posted by   Martijn Grooten on   Dec 18, 2019

In the second of a five-part series of blog posts, departing VB Editor Martijn Grooten explains why he believes cybersecurity professionals need to educate themselves on the complexities of the real-world situations in which security is applied.

Read more  

VB2019 paper: Absolutely routed!! Why routers are the new bullseye in cyber attacks

Posted by   Martijn Grooten on   Dec 18, 2019

Today we publish the VB2019 paper by Anurag Shandilya (K7 Computing) who looked at recent malware attacks against routers, as well as the video of his presentation in London.

Read more  

Parting thoughts 1: cybersecurity as a social science

Posted by   Martijn Grooten on   Dec 17, 2019

In the first of a five-part series of blog post, departing VB Editor Martijn Grooten explains why he believes cybersecurity isn't as much as technical field as we like to believe.

Read more  

VB2020 call for papers - now open!

Posted by   Martijn Grooten on   Dec 16, 2019

Have you analysed a new online threat? Do you know a new way to defend against such threats? Are you tasked with securing systems and fending off attacks? The call for papers for VB2020 is now open and we want to hear from you!

Read more  

VB2019 paper: Operation Soft Cell - a worldwide campaign against telecommunication providers

Posted by   Martijn Grooten on   Dec 13, 2019

Today we publish the VB2019 paper by Cybereason researchers Mor Levi, Amit Serper and Assaf Dahan on Operation Soft Cell, a targeted attack against telecom providers around the world.

Read more  

VB2019 paper: A study of Machete cyber espionage operations in Latin America

Posted by   Martijn Grooten on   Dec 10, 2019

At VB2019 in London a group of researchers from the Stratosphere Lab at the Czech Technical University in Prague presented a paper in which they analysed and dissected the cyber espionage activities of an APT group in Latin America through the analysis of one of its tools, known as Machete. Today we publish their paper and the recording of their presentation.

Read more  

VB2019 paper: The push from fiction for increased surveillance, and its impact on privacy

Posted by   Helen Martin on   Dec 5, 2019

In a paper presented at VB2019 in London, researchers Miriam Cihodariu (Heimdal Security) and Andrei Bogdan Brad (Code4Romania) looked at how surveillance is represented in fiction and how these representations are shaping people's attitudes to surveillance in current legal debates. Today we publish both their paper and the recording of Miriam presenting the paper in London.

Read more  

VB2019 paper: Oops! It happened again!

Posted by   Helen Martin on   Dec 3, 2019

At VB2019 in London industry veterans Righard Zwienenberg and Eddy Willems took a detailed look at the relationship between past and current cyber threats. Today, we publish both their paper and the recording of their presentation.

Read more  

Job vacancy at VB: Security Evangelist

Posted by   Martijn Grooten on   Nov 29, 2019

Virus Bulletin is recruiting for a person to be the public face of the company

Read more  

VB2019 video: Thwarting Emotet email conversation thread hijacking with clustering

Posted by   Martijn Grooten on   Nov 29, 2019

At VB2019 in London, ZEROSPAM researchers Pierre-Luc Vaudry and Olivier Coutu discussed how email clustering could be used to detect malicious Emotet emails that hijacked existing email threads. Today we publish the recording of their presentation.

Read more  

Search blog

VB2014 paper: OPSEC for security researchers

Vicente Diaz teaches researchers the basics of OPSEC.
Vicente Diaz teaches researchers the basics of OPSEC.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video… https://www.virusbulletin.com/blog/2015/01/paper-opsec-security-researchers/

WhatsApp spam on the rise

End-to-end encryption makes spam filtering more difficult.
End-to-end encryption makes spam filtering more difficult. Spam sent through the WhatsApp messaging service is on the rise, mobile security firm AdaptiveMobile reports. This news… https://www.virusbulletin.com/blog/2015/01/whatsapp-spam-rise/

What would Cameron's 'anti-terrorism' proposals mean for the UK?

Proposals could cause serious damage to business and the economy, and are unlikely to stop terrorism.
Proposals could cause serious damage to business and the economy, and are unlikely to stop terrorism. This week, in the aftermath of the terrorist attacks on the French offices of… https://www.virusbulletin.com/blog/2015/01/what-would-cameron-s-anti-terrorism-proposals-mean-uk/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

Microsoft no longer publishes advance notifications for its Patch Tuesdays

Company unhappy with Google going full disclosure on privilege escalation vulnerability.
Company unhappy with Google going full disclosure on privilege escalation vulnerability. Tomorrow is the second Tuesday of the month and, as most people reading this blog will… https://www.virusbulletin.com/blog/2015/01/microsoft-no-longer-publishes-advance-notifications-its-patch-tuesdays/

VB2014 Paper: Attack surface analysis of Tizen devices

Irfan Asrar looks at the security of the operating system used in many IoT devices.
Irfan Asrar looks at the security of the operating system used in many IoT devices.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014… https://www.virusbulletin.com/blog/2015/01/paper-attack-surface-analysis-tizen-devices/

VB2014 paper: Unveiling the kernel: rootkit discovery using selective automated kernel memory differencing

Ahmed Zaki and Benjamin Humphrey describe a system they built for the automated detection of rootkit behaviour.
Ahmed Zaki and Benjamin Humphrey describe a system they built for the automated detection of rootkit behaviour.Since the close of the VB2014 conference in Seattle in October, we… https://www.virusbulletin.com/blog/2015/01/paper-unveiling-kernel-rootkit-discovery-using-selective-automated-kernel-memory-differencing/

New VB100 and VBSpam test results published

See which anti-malware and anti-spam solutions achieved certification.
See which anti-malware and anti-spam solutions achieved certification. Shortly before the Christmas holidays, we published a new VB100 anti-malware test report as well as a new… https://www.virusbulletin.com/blog/2015/01/new-and-vbspam-test-results-published/

Virus Bulletin wishes you a great 2015

See you in Prague - and on the Internet!
See you in Prague - and on the Internet! 2014 was an exciting year for Virus Bulletin: we made all of our content free, ran a successful and well-attended conference in Seattle,… https://www.virusbulletin.com/blog/2015/01/wishes-you-great-2015/

2015

Latest news from the anti-virus industry provided by independent anti-virus advisors, Virus Bulletin
NewsCall for Papers: VB2016 DenverVB seeks submissions for the 26th Virus Bulletin Conference. 22 December 2015VB2015 video: Making a dent in Russian mobile banking… https://www.virusbulletin.com/blog/2015/

January

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2015/01/

Conference review: Botconf 2014

Second edition of 'botnet fighting conference' another great success.
Second edition of 'botnet fighting conference' another great success. I had been looking forward to the second edition of the Botconf conference ever since I came back from the… https://www.virusbulletin.com/blog/2014/12/conference-review-botconf-2014/

Call for Papers: VB2015 Prague

VB seeks submissions for the 25th Virus Bulletin Conference.
VB seeks submissions for the 25th Virus Bulletin Conference.Virus Bulletin is seeking submissions from those wishing to present papers at VB2015, which will take place 30 September… https://www.virusbulletin.com/blog/2014/12/call-papers-prague/

Book review: Countdown to Zero Day

Kim Zetter's book on Stuxnet is a must-read for anyone interested in malware - or in 21st century geopolitics.
Kim Zetter's book on Stuxnet is a must-read for anyone interested in malware - or in 21st century geopolitics. There is a tendency among the media to call every hack 'advanced', to… https://www.virusbulletin.com/blog/2014/12/book-review-countdown-zero-day/

Virus Bulletin announces platinum sponsors for VB2015

More sponsorship opportunities available.
More sponsorship opportunities available. While the opening of VB2015 in Prague is still more than nine months away, we have already started with the preparations for what will be… https://www.virusbulletin.com/blog/2014/12/announces-platinum-sponsors/

VB2014 paper: Smart home appliance security and malware

Jeongwook Oh demonstrates how to hack a Samsung smart TV.
Jeongwook Oh demonstrates how to hack a Samsung smart TV.Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations.… https://www.virusbulletin.com/blog/2014/12/paper-smart-home-appliance-security-and-malware/

Virus Bulletin is hiring

VB seeks a Perl Developer / Security Engineer.
VB seeks a Perl Developer / Security Engineer. 2014 has been an exciting year for Virus Bulletin: we went through some personnel changes, made all of our content freely available,… https://www.virusbulletin.com/blog/2014/12/hiring/

December

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2014/12/

Conference report: VB2014

The biggest and broadest ranging Virus Bulletin conference ever was a great success.
The biggest and broadest ranging Virus Bulletin conference ever was a great success. There is a Dutch expression that says that you shouldn't trust a butcher who judges his own… https://www.virusbulletin.com/blog/2014/11/conference-report/

VB2014 paper: Labelling spam through the analysis of protocol patterns

What do your IP packet sizes say about whether you're a spammer?
What do your IP packet sizes say about whether you're a spammer?Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the… https://www.virusbulletin.com/blog/2014/11/paper-labelling-spam-through-analysis-protocol-patterns/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.