VB Blog

VB2018 paper: From drive-by download to drive-by mining: understanding the new paradigm

Posted by   Martijn Grooten on   Oct 26, 2018

Today, we publish the VB2018 paper by Malwarebytes researcher Jérôme Segura, in which he details the shift from exploit kits to drive-by mining. We also publish the video of his VB2018 presentation.

Read more  

VB2018 presentation: The wolf in sheep's clothing - undressed

Posted by   Martijn Grooten on   Oct 22, 2018

Today, we publish the video of the VB2018 presentation by CSIS researchers Benoît Ancel and Aleksejs Kuprins, who looked at a rather dubious seller of government spyware, described by someone else operating in the same space as a "criminal of the worst kind".

Read more  

VB2018 paper: The dark side of WebAssembly

Posted by   Virus Bulletin on   Oct 17, 2018

Today, we publish the VB2018 paper by Symantec researchers Aishwarya Lonkar and Siddhesh Chandrayan on the security risks that come with WebAssembly.

Read more  

The Virus Bulletin conference returns home: VB2019 to take place in London

Posted by   Martijn Grooten on   Oct 5, 2018

In 2019, the Virus Bulletin conference is set to return home, with VB2019 taking place in London, UK.

Read more  

Guest blog: The case for increasing transparency in cybersecurity

Posted by   Virus Bulletin on   Oct 2, 2018

In a guest blog post, Kaspersky Lab's Anton Shingarev considers the case for increasing transparency in cybersecurity.

Read more  

VB2018 preview: Workshops

Posted by   Martijn Grooten on   Sep 28, 2018

Workshops make their VB Conference debut during VB2018, giving delegates the opportunity to learn the basics of kernel-level malware analysis, Android reverse-engineering and artificial intelligence.

Read more  

New article: Through the looking glass: webcam interception and protection in kernel mode

Posted by   Martijn Grooten on   Sep 27, 2018

Today we publish a short article by Ronen Slavin and Michael Maltsev, researchers at Reason Software Company, who dive into the video capturing internals on Windows, and explain how this can be used by a malicious actor to steal images recorded by a computer's webcam.

Read more  

VB2018 preview: The botnet landscape - live threats and steps for mitigation (Small Talk)

Posted by   Martijn Grooten on   Sep 27, 2018

In a Small Talk at VB2018, Spamhaus's Simon Forster will present the organization's research into the botnet landscape and will discuss with the audience topics such as how the rise of anonymzation techniques and the hosting of botnets on well-regarded cloud providers have changed the landscape.

Read more  

VB2018 Threat Intelligence Summit: survey on threat intel usage

Posted by   Virus Bulletin on   Sep 26, 2018

Virus Bulletin is proud to host the first Threat Intelligence Summit as an integral part of VB2018 next week. In a bid to help collect as much current data as possible, we'd like to ask anyone generating or consuming threat intelligence to fill in a very short survey.

Read more  

VB2018 preview: Anatomy of an attack: detecting and defeating CRASHOVERRIDE

Posted by   Martijn Grooten on   Sep 26, 2018

In today's blog post, we preview the VB2018 paper by Dragos Inc.'s Joe Slowik, who looks at the CRASHOVERRIDE malware, the first (publicly known) malware designed to impact electric grid operations.

Read more  

Search blog

Latest Patch Tuesday update released

Microsoft announces five 'critical' vulnerabilities need fixing.
Microsoft announces five 'critical' vulnerabilities need fixing.Microsoft has issued its monthly 'Patch Tuesday' security bulletin, with five 'critical' and three 'important'… https://www.virusbulletin.com/blog/2008/04/latest-patch-tuesday-update-released/

'Kraken' monster botnet causing controversy

As latest botnet scare debated, Storm keeps on blowing.
As latest botnet scare debated, Storm keeps on blowing. Recent reports of a massive botnet, apparently sneaking its trojans past security software and far outnumbering better-known… https://www.virusbulletin.com/blog/2008/04/kraken-monster-botnet-causing-controversy/

Google Groups and Blogspot used to serve malware

Company finds own IP address to be serving most malware.
Company finds own IP address to be serving most malware.Malware writers have created thousands of Google Groups with the sole purpose of serving malware, Sunbelt reports. On the… https://www.virusbulletin.com/blog/2008/04/google-groups-and-blogspot-used-serve-malware/

Users of online banking 'should have adequate protection'

New UK banking code says customers who keep their PCs secure will not be responsible for losses due to online theft.
New UK banking code says customers who keep their PCs secure will not be responsible for losses due to online theft. A new banking code launched earlier this week by the British'… https://www.virusbulletin.com/blog/2008/04/users-online-banking-should-have-adequate-protection/

Less than 30 per cent of smartphone users have AV installed

Experts disagree on the need for specialist mobile AV protection.
Experts disagree on the need for specialist mobile AV protection. In a poll only 19% of visitors to the VB website said they had anti-malware protection on their mobile phone.… https://www.virusbulletin.com/blog/2008/04/less-30-cent-smartphone-users-have-av-installed/

Average spam message size at record low

No decrease of bandwidth usage as number of spam messages keeps increasing.
No decrease of bandwidth usage as number of spam messages keeps increasing. The average size of spam messages has decreased to a record low of just over 2KB, security company… https://www.virusbulletin.com/blog/2008/04/average-spam-message-size-record-low/

Almost 90% of Americans feel safe online

Users' confidence does not match up with percentage of properly protected users.
Users' confidence does not match up with percentage of properly protected users. Research by StopBadware.org shows that 88% of Americans say they feel safe online, despite the… https://www.virusbulletin.com/blog/2008/04/almost-90-americans-feel-safe-online/

April Storm

April Fools' Day emails contain new variant of infamous worm.
April Fools' Day emails contain new variant of infamous worm. Security researchers report a new wave of spam emails being sent out. The emails, which use subject lines such as… https://www.virusbulletin.com/blog/2008/04/april-storm/

April issue of VB published

The April issue of Virus Bulletin is now available for subscribers to download.
The April issue of Virus Bulletin is now available for subscribers to download. The April 2008 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2008/04/april-issue-vb-published/

April

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2008/04/

From Simple Mail to Hypertext

HTTP and FTP take over from SMTP as common malware spreading methods.
HTTP and FTP take over from SMTP as common malware spreading methods.A report from F-Secure has highlighted the recent shift in malware spreading methods from email to web-based… https://www.virusbulletin.com/blog/2008/03/simple-mail-hypertext/

Access flaw exploited via Word

Microsoft's employees hunting vulnerabilities instead of Easter eggs.
Microsoft's employees hunting vulnerabilities instead of Easter eggs. A buffer overrun vulnerability in Microsoft's Jet Database Engine, the underlying database behind Microsoft… https://www.virusbulletin.com/blog/2008/03/access-flaw-exploited-word/

Microsoft acquires Komoku

Anti-rootkit software to become part of Forefront and OneCare.
Anti-rootkit software to become part of Forefront and OneCare. Just before Easter, Microsoft announced it had acquired Komoku, a Maryland-based company that builds anti-rootkit… https://www.virusbulletin.com/blog/2008/03/microsoft-acquires-komoku/

Hoax email warns about 'nasty virus'

Phony advice causes removal of site from search engines.
Phony advice causes removal of site from search engines. Over the last few days an email, written in German, has been seen circulating warning users about a 'nasty virus' that is… https://www.virusbulletin.com/blog/2008/03/hoax-email-warns-about-nasty-virus/

Legitimate program becomes trojan downloader

Website of FlashGet attacked; malicious 'update' automatically downloaded.
Website of FlashGet attacked; malicious 'update' automatically downloaded. By hacking into the website of popular Windows download manager FlashGet, cybercriminals have managed to… https://www.virusbulletin.com/blog/2008/03/legitimate-program-becomes-trojan-downloader/

More 'trusted sites' carrying iframe danger

Big wave of website infections could affect tens of thousands of sites, Trend Micro latest victim.
Big wave of website infections could affect tens of thousands of sites, Trend Micro latest victim. Earlier this week McAfee reported a major outbreak of website infections, with as… https://www.virusbulletin.com/blog/2008/03/more-trusted-sites-carrying-iframe-danger/

EU agency research advises sweeping security improvements

ISPs and developers should be held to account, says report.
ISPs and developers should be held to account, says report. A research paper commissioned by the European Network and Information Security Agency (ENISA) has called for major… https://www.virusbulletin.com/blog/2008/03/eu-agency-research-advises-sweeping-security-improvements/

AV-test.org issues latest figures

In-depth testing covers multiple factors.
In-depth testing covers multiple factors. Independent testing body AV-Test.org has released its latest set of results, with a large group of products tested against a number of… https://www.virusbulletin.com/blog/2008/03/av-test-org-issues-latest-figures/

Latest Patch Tuesday release

March's Patch Tuesday sees four 'critical' updates.
March's Patch Tuesday sees four 'critical' updates.Microsoft has released its monthly 'Patch Tuesday' security bulletin. This month the bulletin features four 'critical' updates,… https://www.virusbulletin.com/blog/2008/03/latest-patch-tuesday-release/

Latest AV-Comparatives results released

Detection test shows most products improving.
Detection test shows most products improving. Testers at AV-Comparatives have released their latest set of results, with 16 products pitted against a massive set of over 1.6… https://www.virusbulletin.com/blog/2008/03/latest-av-comparatives-results-released/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.