VB Blog

VB2018 paper: From drive-by download to drive-by mining: understanding the new paradigm

Posted by   Martijn Grooten on   Oct 26, 2018

Today, we publish the VB2018 paper by Malwarebytes researcher Jérôme Segura, in which he details the shift from exploit kits to drive-by mining. We also publish the video of his VB2018 presentation.

Read more  

VB2018 presentation: The wolf in sheep's clothing - undressed

Posted by   Martijn Grooten on   Oct 22, 2018

Today, we publish the video of the VB2018 presentation by CSIS researchers Benoît Ancel and Aleksejs Kuprins, who looked at a rather dubious seller of government spyware, described by someone else operating in the same space as a "criminal of the worst kind".

Read more  

VB2018 paper: The dark side of WebAssembly

Posted by   Virus Bulletin on   Oct 17, 2018

Today, we publish the VB2018 paper by Symantec researchers Aishwarya Lonkar and Siddhesh Chandrayan on the security risks that come with WebAssembly.

Read more  

The Virus Bulletin conference returns home: VB2019 to take place in London

Posted by   Martijn Grooten on   Oct 5, 2018

In 2019, the Virus Bulletin conference is set to return home, with VB2019 taking place in London, UK.

Read more  

Guest blog: The case for increasing transparency in cybersecurity

Posted by   Virus Bulletin on   Oct 2, 2018

In a guest blog post, Kaspersky Lab's Anton Shingarev considers the case for increasing transparency in cybersecurity.

Read more  

VB2018 preview: Workshops

Posted by   Martijn Grooten on   Sep 28, 2018

Workshops make their VB Conference debut during VB2018, giving delegates the opportunity to learn the basics of kernel-level malware analysis, Android reverse-engineering and artificial intelligence.

Read more  

New article: Through the looking glass: webcam interception and protection in kernel mode

Posted by   Martijn Grooten on   Sep 27, 2018

Today we publish a short article by Ronen Slavin and Michael Maltsev, researchers at Reason Software Company, who dive into the video capturing internals on Windows, and explain how this can be used by a malicious actor to steal images recorded by a computer's webcam.

Read more  

VB2018 preview: The botnet landscape - live threats and steps for mitigation (Small Talk)

Posted by   Martijn Grooten on   Sep 27, 2018

In a Small Talk at VB2018, Spamhaus's Simon Forster will present the organization's research into the botnet landscape and will discuss with the audience topics such as how the rise of anonymzation techniques and the hosting of botnets on well-regarded cloud providers have changed the landscape.

Read more  

VB2018 Threat Intelligence Summit: survey on threat intel usage

Posted by   Virus Bulletin on   Sep 26, 2018

Virus Bulletin is proud to host the first Threat Intelligence Summit as an integral part of VB2018 next week. In a bid to help collect as much current data as possible, we'd like to ask anyone generating or consuming threat intelligence to fill in a very short survey.

Read more  

VB2018 preview: Anatomy of an attack: detecting and defeating CRASHOVERRIDE

Posted by   Martijn Grooten on   Sep 26, 2018

In today's blog post, we preview the VB2018 paper by Dragos Inc.'s Joe Slowik, who looks at the CRASHOVERRIDE malware, the first (publicly known) malware designed to impact electric grid operations.

Read more  

Search blog

Tsunami response quick among cybercriminals

Miscreants releasing scams, phishing, scareware... within a matter of hours.
Miscreants releasing scams, phishing, scareware... within a matter of hours. As most of the world reels in shock at the devastation caused by this morning's massive earthquake in… https://www.virusbulletin.com/blog/2011/03/tsunami-response-quick-among-cybercriminals/

Cybercriminals frustrated with botnet trackers

Drastic measures discussed by users of online forum.
Drastic measures discussed by users of online forum. Russian cybercriminals are willing to go to great lengths to frustrate services that hinder botnets created with the ZeuS and… https://www.virusbulletin.com/blog/2011/03/cybercriminals-frustrated-botnet-trackers/

ENISA calls for revised botnet measurements

EU agency says current measures of botnet threat are misleading.
EU agency says current measures of botnet threat are misleading. European cyber security agency, ENISA (the European Network and Information Security Agency) has called for a… https://www.virusbulletin.com/blog/2011/03/enisa-calls-revised-botnet-measurements/

Spammers exploit internationalized domain names

Non-Latin characters in URLs used to trick filters.
Non-Latin characters in URLs used to trick filters. By using internationalized domain names (IDN), spammers manage to avoid detection of URLs in their messages. IDNs were… https://www.virusbulletin.com/blog/2011/03/spammers-exploit-internationalized-domain-names/

Google acquires Zynamics

Internet giant buys into security.
Internet giant buys into security. Internet giant Google has acquired software analytics firm Zynamics, it was announced yesterday. The German company, which was founded in 2004… https://www.virusbulletin.com/blog/2011/03/google-acquires-zynamics/

March

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2011/03/

March issue of VB published

The March issue of Virus Bulletin is now available for subscribers to download.
The March issue of Virus Bulletin is now available for subscribers to download. The March 2011 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2011/03/march-issue-vb-published/

Welsh 419 scam

Email from Welsh-speaking Kuwaiti widow indicative of more targeted spam.
Email from Welsh-speaking Kuwaiti widow indicative of more targeted spam. Email users in Wales who received a recent 419 scam will have been surprised to find the message -… https://www.virusbulletin.com/blog/2011/02/welsh-419-scam/

Dutch most protected Europeans online

Bulgarians most likely to have become infected; financial losses most prevalent among Latvians.
Bulgarians most likely to have become infected; financial losses most prevalent among Latvians. For the occasion of Safer Internet Day on 8 February, Eurostat, the EU's statistical… https://www.virusbulletin.com/blog/2011/02/dutch-most-protected-europeans-online/

February

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2011/02/

Mrs Mubarak's IP addresses used by spammers

Spammers finding new ways to obtain non-blacklisted addresses.
Spammers finding new ways to obtain non-blacklisted addresses. While not necessarily related to the current unrest in Egypt - which, among other things, led to the cutting off of… https://www.virusbulletin.com/blog/2011/02/mrs-mubarak-s-ip-addresses-used-spammers/

February issue of VB published

The February issue of Virus Bulletin is now available for subscribers to download.
The February issue of Virus Bulletin is now available for subscribers to download. The February 2011 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2011/02/february-issue-vb-published/

UK government sites warned to brace against attack

GovCertUK issues warning in aftermath of arrests of Anonymous gang members.
GovCertUK issues warning in aftermath of arrests of Anonymous gang members. UK government websites have been warned that they may find themselves subject to attack following the… https://www.virusbulletin.com/blog/2011/01/uk-government-sites-warned-brace-against-attack/

Phishing for different markets

Scam emails trying to steal CO2 emission credits and World-of-Warcraft accounts.
Scam emails trying to steal CO2 emission credits and World-of-Warcraft accounts. Two unrelated phishing campaigns seen doing the rounds recently show that it's not just real money… https://www.virusbulletin.com/blog/2011/01/phishing-different-markets/

'Job application' contains malicious attachment

$150,000 lost via banking trojan.
$150,000 lost via banking trojan. An unidentified US company has learned the hard way that email attachments - even to those that appear to be solicited - may contain malware. The… https://www.virusbulletin.com/blog/2011/01/job-application-contains-malicious-attachment/

All change at the top for ESET

VB regulars Richard Marko and Andrew Lee appointed to top management roles.
VB regulars Richard Marko and Andrew Lee appointed to top management roles. Congratulations are due to Richard Marko and Andrew Lee as they take up new positions within ESET. The… https://www.virusbulletin.com/blog/2011/01/all-change-top-eset/

New peer-to-peer botnet discovered

New botnet shares fast flux DNS and other similarities with Storm and Waledac.
New botnet shares fast flux DNS and other similarities with Storm and Waledac. In the last few days of 2010, security researchers discovered a new botnet that shares many… https://www.virusbulletin.com/blog/2011/01/new-peer-peer-botnet-discovered/

January

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2011/01/

January issue of VB published

The January issue of Virus Bulletin is now available for subscribers to download.
The January issue of Virus Bulletin is now available for subscribers to download. The January 2011 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2011/01/january-issue-vb-published/

2011

Latest news from the anti-virus industry provided by independent anti-virus advisors, Virus Bulletin
NewsSpammers using Google open redirectVulnerability 'not worthy of bug bounty program'. 15 December 2011Compromised websites used to mine bitcoinsIn-the-browser botnet turns… https://www.virusbulletin.com/blog/2011/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.