VB Blog

VB2018 preview: Anatomy of an attack: detecting and defeating CRASHOVERRIDE

Posted by   Martijn Grooten on   Sep 26, 2018

In today's blog post, we preview the VB2018 paper by Dragos Inc.'s Joe Slowik, who looks at the CRASHOVERRIDE malware, the first (publicly known) malware designed to impact electric grid operations.

Read more  

VB2018 preview: Cyber Threat Alliance

Posted by   Martijn Grooten on   Sep 25, 2018

In today's blog post we look at a report on illicit cryptocurrency mining by the Cyber Threat Alliance and also look forward to the VB2018 talk by the CTA's CEO Michael Daniel.

Read more  

VB2018 preview: hacking cars

Posted by   Martijn Grooten on   Sep 21, 2018

In recent years, car hacking has evolved from a mostly theoretical research field involving giggling researchers and scared journalists, to one that actually concerns car owners and manufacturers. On today's blog we preview two VB2018 papers, by Inbar Raz and Spencer Hsieh, that look at the subject of hacking cars.

Read more  

Where are all the ‘A’s in APT?

Posted by   Virus Bulletin on   Sep 20, 2018

In a guest blog post by VB2018 gold partner Kaspersky Lab, Costin Raiu, Director of the company's Global Research and Analysis Team, looks critically at the 'A' in APT.

Read more  

VB2018 preview: commercial spyware and its use by governments

Posted by   Martijn Grooten on   Sep 19, 2018

Today, we preview three VB2018 presentations that look at threats against civil society in general and the use of commercial spyware by governments for this purpose in particular.

Read more  

VB2018 preview: Wipers in the wild

Posted by   Martijn Grooten on   Sep 18, 2018

Today we preview the VB2018 paper by Saher Naumaan (BAE Systems Applied Intelligence) on the use of wipers in APT attacks.

Read more  

VB2018 preview: IoT botnets

Posted by   Martijn Grooten on   Sep 17, 2018

The VB2018 programme is packed with a wide range of security topics featuring speakers from all around the world. Today we preview two of them: one by Qihoo 360 researchers on tracking variants of Mirai and one by researchers from Bitdefender on the peer-to-peer Hide'n'Seek botnet.

Read more  

VB2018: last-minute talks announced

Posted by   Martijn Grooten on   Sep 10, 2018

We are excited to announce the final additions to the VB2018 programme in the form of 10 'last-minute' papers covering up-to-the-minute research and hot topics and two more invited talks.

Read more  

VB2018 preview: Since the hacking of Sony Pictures

Posted by   Martijn Grooten on   Sep 7, 2018

At VB2018, AhnLab researcher Minseok Cha will look at activities of the Lazarus Group on the Korean peninsula going back as early as April 2011.

Read more  

Book review: Click Here to Kill Everybody

Posted by   Virus Bulletin on   Sep 6, 2018

Paul Baccas reviews Bruce Schneier's latest thought-provoking book, 'Click Here to Kill Everybody'.

Read more  

Search blog

Zeus source code leaked

Banking trojan among the most advanced of its kind.
Banking trojan among the most advanced of its kind. Researchers at Danish security firm CSIS have discovered that the full source code of the Zeus crime kit has been leaked to… https://www.virusbulletin.com/blog/2011/05/zeus-source-code-leaked/

Smile, you're on a botnet!

Multi-platform Java botnet allows for remote control of webcam and microphone.
Multi-platform Java botnet allows for remote control of webcam and microphone. Researchers have discovered a multi-platform botnet running on the Java Runtime Environment (JRE)… https://www.virusbulletin.com/blog/2011/05/smile-you-re-botnet/

May issue of VB published

The May issue of Virus Bulletin is now available for subscribers to download.
The May issue of Virus Bulletin is now available for subscribers to download. The May 2011 issue of Virus Bulletin is now available for subscribers to browse online or download… https://www.virusbulletin.com/blog/2011/05/may-issue-vb-published/

May

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2011/05/

VB announces Virus Bulletin for Kindle

VB joins the e-book generation.
VB joins the e-book generation. With millions of people now using e-book readers as a convenient way to read while on the go - or simply to cut down on bookshelf space - VB is… https://www.virusbulletin.com/blog/2011/04/vb-announces-kindle/

Scammers take advantage of Epsilon data breach

Trojan hidden as security tool for affected customers.
Trojan hidden as security tool for affected customers. Scammers are currently taking advantage of the data breach that affected email security provider Epsilon recently, by… https://www.virusbulletin.com/blog/2011/04/scammers-take-advantage-epsilon-data-breach/

Department of Justice shuts down Coreflood botnet

'Stop' command sent from replaced command and control servers.
'Stop' command sent from replaced command and control servers. Earlier this week the US Department of Justice (DoJ) obtained an unprecedented temporary restraining order (TRO) that… https://www.virusbulletin.com/blog/2011/04/department-justice-shuts-down-coreflood-botnet/

First AV-Test certifications of 2011 published

22 products scored on multiple scales in quarterly test report.
22 products scored on multiple scales in quarterly test report. Testing organization AV-Test has published its latest round of anti-malware certification tests, with 22 products… https://www.virusbulletin.com/blog/2011/04/first-av-test-certifications-2011-published/

Adobe releases emergency update for Flash Player

Zero-day exploit actively being abused.
Zero-day exploit actively being abused.Adobe has announced it will release an update for its Flash Player on Friday 15 April, fixing a vulnerability that is currently being… https://www.virusbulletin.com/blog/2011/04/adobe-releases-emergency-update-flash-player/

AV-Comparatives unveils latest on-demand results

20 products rated in large-scale detection tests.
20 products rated in large-scale detection tests. Testing organization AV-Comparatives has revealed the results of its latest on-demand test. Top-rated products include Trustport,… https://www.virusbulletin.com/blog/2011/04/av-comparatives-unveils-latest-demand-results/

Ransom trojan demands Windows re-activation

Criminals make money through calls to supposedly free phone number.
Criminals make money through calls to supposedly free phone number. A new piece of ransomware has been discovered that shows the PC user a blue screen and asks them to re-activate… https://www.virusbulletin.com/blog/2011/04/ransom-trojan-demands-windows-re-activation/

RSA gives insight into anatomy of attack on its systems

Publicly available information used to spear phish employees.
Publicly available information used to spear phish employees. Security company RSA has released some information about how hackers gained access to its systems, giving a good… https://www.virusbulletin.com/blog/2011/04/rsa-gives-insight-anatomy-attack-its-systems/

Major email service provider suffers data breach

Financial institutions among affected customers.
Financial institutions among affected customers. Email service provider Epsilon, which carries out email marketing for many major companies, has admitted it has fallen victim to a… https://www.virusbulletin.com/blog/2011/04/major-email-service-provider-suffers-data-breach/

April

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2011/04/

April issue of VB published

The April issue of Virus Bulletin is now available for subscribers to download.
The April issue of Virus Bulletin is now available for subscribers to download. The April 2011 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2011/04/april-issue-vb-published/

Keylogger on Samsung laptops proves to be false alarm

AV product wrongly flags malware based on existence of directory.
AV product wrongly flags malware based on existence of directory. A number of security bloggers raised concern yesterday about the apparent presence of a keylogger on Samsung… https://www.virusbulletin.com/blog/2011/03/keylogger-samsung-laptops-proves-be-false-alarm/

South Korea proposes to make security software mandatory

Law enables government to search PCs of those who do not comply.
Law enables government to search PCs of those who do not comply. A bill, proposed by a number of South Korean MPs, would make the use of security software mandatory for computer… https://www.virusbulletin.com/blog/2011/03/south-korea-proposes-make-security-software-mandatory/

Rogue SSL certificates issued for popular websites

Certificates revoked, but browsers still need to be updated.
Certificates revoked, but browsers still need to be updated.Comodo, a major vendor of SSL certificates, has admitted to one of its affiliates' servers being hacked, leading to nine… https://www.virusbulletin.com/blog/2011/03/rogue-ssl-certificates-issued-popular-websites/

Cutwail botnet sent 1.7 trillion spam messages

Operators made several million through botnet.
Operators made several million through botnet. Researchers from The Last Line of Defense and universities in Bochum and Santa Barbara have shared some insight into the workings of… https://www.virusbulletin.com/blog/2011/03/cutwail-botnet-sent-1-7-trillion-spam-messages/

Spam levels take a nose dive as Rustock apparently taken down - update

Eerie silence from Rustock botnet. Microsoft reported to have co-ordinated take down.
Eerie silence from Rustock botnet. Microsoft reported to have co-ordinated take down. Spam levels have taken a nose dive over the last 24 hours - apparently as a result of a take… https://www.virusbulletin.com/blog/2011/03/spam-levels-take-nose-dive-rustock-apparently-taken-down-update/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.