VB Blog

VB2018 paper: Who wasn’t responsible for Olympic Destroyer?

Posted by   Martijn Grooten on   Oct 30, 2018

Cisco Talos researchers Paul Rascagnères and Warren Mercer were among the first to write about the Olympic Destroyer, the malware that targeted the 2018 PyeongChang Winter Olympic Games. Today, we publish the paper they presented at VB2018 about the malware; we also publish the video of their VB2018 presentation.

Read more  

VB2018 paper: From drive-by download to drive-by mining: understanding the new paradigm

Posted by   Martijn Grooten on   Oct 26, 2018

Today, we publish the VB2018 paper by Malwarebytes researcher Jérôme Segura, in which he details the shift from exploit kits to drive-by mining. We also publish the video of his VB2018 presentation.

Read more  

VB2018 presentation: The wolf in sheep's clothing - undressed

Posted by   Martijn Grooten on   Oct 22, 2018

Today, we publish the video of the VB2018 presentation by CSIS researchers Benoît Ancel and Aleksejs Kuprins, who looked at a rather dubious seller of government spyware, described by someone else operating in the same space as a "criminal of the worst kind".

Read more  

VB2018 paper: The dark side of WebAssembly

Posted by   Virus Bulletin on   Oct 17, 2018

Today, we publish the VB2018 paper by Symantec researchers Aishwarya Lonkar and Siddhesh Chandrayan on the security risks that come with WebAssembly.

Read more  

The Virus Bulletin conference returns home: VB2019 to take place in London

Posted by   Martijn Grooten on   Oct 5, 2018

In 2019, the Virus Bulletin conference is set to return home, with VB2019 taking place in London, UK.

Read more  

Guest blog: The case for increasing transparency in cybersecurity

Posted by   Virus Bulletin on   Oct 2, 2018

In a guest blog post, Kaspersky Lab's Anton Shingarev considers the case for increasing transparency in cybersecurity.

Read more  

VB2018 preview: Workshops

Posted by   Martijn Grooten on   Sep 28, 2018

Workshops make their VB Conference debut during VB2018, giving delegates the opportunity to learn the basics of kernel-level malware analysis, Android reverse-engineering and artificial intelligence.

Read more  

New article: Through the looking glass: webcam interception and protection in kernel mode

Posted by   Martijn Grooten on   Sep 27, 2018

Today we publish a short article by Ronen Slavin and Michael Maltsev, researchers at Reason Software Company, who dive into the video capturing internals on Windows, and explain how this can be used by a malicious actor to steal images recorded by a computer's webcam.

Read more  

VB2018 preview: The botnet landscape - live threats and steps for mitigation (Small Talk)

Posted by   Martijn Grooten on   Sep 27, 2018

In a Small Talk at VB2018, Spamhaus's Simon Forster will present the organization's research into the botnet landscape and will discuss with the audience topics such as how the rise of anonymzation techniques and the hosting of botnets on well-regarded cloud providers have changed the landscape.

Read more  

VB2018 Threat Intelligence Summit: survey on threat intel usage

Posted by   Virus Bulletin on   Sep 26, 2018

Virus Bulletin is proud to host the first Threat Intelligence Summit as an integral part of VB2018 next week. In a bid to help collect as much current data as possible, we'd like to ask anyone generating or consuming threat intelligence to fill in a very short survey.

Read more  

Search blog

May issue of VB published

The May issue of Virus Bulletin is now available for subscribers to download.
The May issue of Virus Bulletin is now available for subscribers to download. The May 2012 issue of Virus Bulletin is now available for subscribers to browse online or download… https://www.virusbulletin.com/blog/2012/05/may-issue-vb-published/

Significant rise in malicious spam and phishing

Over one quarter of malicious emails contain eight-year-old malware.
Over one quarter of malicious emails contain eight-year-old malware. Email security firm eleven has reported a significant rise in both malicious emails and phishing emails in the… https://www.virusbulletin.com/blog/2012/04/significant-rise-malicious-spam-and-phishing/

Researchers find many popular sites serving drive-by downloads

10 million people exposed to malware served by 25,000 most visited sites alone.
10 million people exposed to malware served by 25,000 most visited sites alone. Researchers at Barracuda Labs have found that 58 among the 25,000 most popular websites were serving… https://www.virusbulletin.com/blog/2012/04/researchers-find-many-popular-sites-serving-drive-downloads/

Android malware hides inside JPG image

New LeNa variant no longer depends on rooted devices.
New LeNa variant no longer depends on rooted devices. Researchers at Lookout have discovered a new version of the 'LeNa' trojan for Android that does not require user interaction… https://www.virusbulletin.com/blog/2012/04/android-malware-hides-inside-jpg-image/

April

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2012/04/

April issue of VB published

The April issue of Virus Bulletin is now available for subscribers to download.
The April issue of Virus Bulletin is now available for subscribers to download. The April 2012 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2012/04/april-issue-vb-published/

Microsoft Word for Mac exploit used in targeted attacks

Tibetan NGOs targeted.
Tibetan NGOs targeted. Researchers at Alienvault have discovered a targeted attack against Tibetan NGOs that uses a three-year-old vulnerability in Microsoft Office for Mac.… https://www.virusbulletin.com/blog/2012/03/microsoft-word-mac-exploit-used-targeted-attacks/

AV-Test issues latest results summary

Bi-monthly stats released for 31 consumer and business products.
Bi-monthly stats released for 31 consumer and business products. Independent testing body Av-Test.org has published its latest round of results, covering some 23 consumer products… https://www.virusbulletin.com/blog/2012/03/av-test-issues-latest-results-summary/

Spam catch rates drop in latest VBSpam test

Catch rates significantly lower than in previous months.
Catch rates significantly lower than in previous months. In the latest VBSpam comparative test, 20 solutions achieved a VBSpam award, but the majority displayed significantly lower… https://www.virusbulletin.com/blog/2012/03/spam-catch-rates-drop-latest-vbspam-test/

March issue of VB published

The March issue of Virus Bulletin is now available for subscribers to download.
The March issue of Virus Bulletin is now available for subscribers to download. The March 2012 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2012/03/march-issue-vb-published/

March

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2012/03/

'Unsubscribe' URL in junk fax leads to malware

Trojan downloader behind .co.cc URL.
Trojan downloader behind .co.cc URL. Researchers at Vircom have discovered a junk fax with an 'unsubscribe' URL which contained a trojan downloader. Junk faxes (also known as 'fax… https://www.virusbulletin.com/blog/2012/02/unsubscribe-url-junk-fax-leads-malware/

New Zeus/SpyEye botnet does away with command-and-control servers

Increasing use of UDP to avoid communication tracking.
Increasing use of UDP to avoid communication tracking. Researchers at Symantec have discovered a new parallel build of Zeus (also known as Zbot) and SpyEye that appears to be… https://www.virusbulletin.com/blog/2012/02/new-zeus-spyeye-botnet-does-away-command-and-control-servers/

200-fold increase in HTML-attachment spam

Cutwail botnet likely behind campaign that sends users to Phoenix exploit kit.
Cutwail botnet likely behind campaign that sends users to Phoenix exploit kit. Researchers at M86 have reported a significant increase in the amount of spam sent with malicious… https://www.virusbulletin.com/blog/2012/02/200-fold-increase-html-attachment-spam/

'Hotmail and Gmail have best spam filter' says Cascade spam test

Comparative test did not take false positives into account.
Comparative test did not take false positives into account. Researchers from Cascade Insights performed a comparative spam filtering test on the three major webmail providers and… https://www.virusbulletin.com/blog/2012/02/hotmail-and-gmail-have-best-spam-filter-says-cascade-spam-test/

February issue of VB published

The February issue of Virus Bulletin is now available for subscribers to download.
The February issue of Virus Bulletin is now available for subscribers to download. The February 2012 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2012/02/february-issue-vb-published/

February

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2012/02/

Hacktivists hijack DNS of popular websites

Security at registrars may be weak link.
Security at registrars may be weak link. A hacktivist group has managed to redirect the traffic of two popular websites by hijacking their DNS settings, researchers at Internet… https://www.virusbulletin.com/blog/2012/01/hacktivists-hijack-dns-popular-websites/

New RFC describes best practices for running DNS-based lists

DNSBL users advised to avoid those lists that charge for delisting.
DNSBL users advised to avoid those lists that charge for delisting. A new RFC document has been published that describes the best operational practices for the use of DNS-based… https://www.virusbulletin.com/blog/2012/01/new-rfc-describes-best-practices-running-dns-based-lists/

Vulnerability turns McAfee's anti-malware solution into open relay

Flaw allows for spam to be sent through customers' PCs.
Flaw allows for spam to be sent through customers' PCs. A vulnerability discovered in McAfee's SaaS for Total Protection, the company's hosted anti-malware solution, effectively… https://www.virusbulletin.com/blog/2012/01/vulnerability-turns-mcafee-s-anti-malware-solution-open-relay/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.