Posted by Virus Bulletin on Oct 22, 2019
The debate on responsible disclosure is about as old as IT security itself. In a guest post for Virus Bulletin Robert Neumann suggests we need to reconsider a one-size-fits-all solution and instead look for a well-respected independent organization to handle security issues.
Posted by Martijn Grooten on Oct 21, 2019
OpSec mistakes are what lead to many malware discoveries, and in the case of the Geost Android botnet the mistake was a really interesting one. Today we publish the VB2019 paper by Sebastian García, Maria Jose Erquiaga and Anna Shirokova on the Geost botnet, as well as the recording of Sebastian and Anna presenting their research in London.
Posted by Virus Bulletin on Oct 14, 2019
VB2019 Platinum partner Reason Cybersecurity presents a threat analysis report on the Save Yourself malware.
Posted by Virus Bulletin on Oct 4, 2019
In a guest blog post VB2019 Platinum partner Reason Cybersecurity looks to the future of threat intelligence.
Posted by Virus Bulletin on Sep 25, 2019
In a guest blog post VB2019 Silver partner Intezer outlines the importance of paying attention to Linux threats.
Posted by Martijn Grooten on Sep 18, 2019
On Monday, the infamous Emotet malware resumed its spam campaign to spread the latest version of the malware. As before, the malware successfully bypasses many email security products.
Posted by Virus Bulletin on Sep 16, 2019
Security researcher Paul Baccas reviews Eddy Willems' book 'Cyberdanger'.
Posted by Martijn Grooten on Sep 13, 2019
In the mini-summit, which forms part of VB2019 (the 29th Virus Bulletin International Conference), eight sessions will focus on all aspects of threat intelligence collecting, using and sharing.
Posted by Virus Bulletin on Sep 12, 2019
In a guest blog post by VB2019 Silver partner TotalAV, Matthew Curd, the software’s Technical Expert, considers the changes in the cybersecurity landscape.
Posted by Virus Bulletin on Sep 4, 2019
Over the last few years SE Labs has tested more than 50 different security products against over 5,000 targeted attacks. In this guest blog post Stefan Dumitrascu, Chief Technical Officer at SE Labs, looks at the different attack tools available, how effective they are at helping attackers bypass anti-malware products, and how security vendors have been handling this type of threat for over a year.