Programme for VB2019 Threat Intelligence Practitioners' Summit announced
In the mini-summit, which forms part of VB2019 (the 29th Virus Bulletin International Conference), eight sessions will focus on all aspects of threat intelligence collecting, using and sharing. Read...
View ArticleBook review: Cyberdanger: Understanding and Guarding Against Cybercrime
Security researcher Paul Baccas reviews Eddy Willems' book 'Cyberdanger'. Read more
View ArticleNew Emotet spam campaign continues to bypass email security products
On Monday, the infamous Emotet malware resumed its spam campaign to spread the latest version of the malware. As before, the malware successfully bypasses many email security products. Read more
View ArticleGuest blog: Why we should be paying more attention to Linux threats
In a guest blog post VB2019 Silver partner Intezer outlines the importance of paying attention to Linux threats. Read more
View ArticleGuest blog: Threat intelligence – a unifying force of the future
In a guest blog post VB2019 Platinum partner Reason Cybersecurity looks to the future of threat intelligence. Read more
View ArticleAnalysis of malware responsible for sextortion spam that mines for Monero on...
VB2019 Platinum partner Reason Cybersecurity presents a threat analysis report on the Save Yourself malware. Read more
View ArticleVB2019 paper: Geost botnet. The story of the discovery of a new Android...
OpSec mistakes are what lead to many malware discoveries, and in the case of the Geost Android botnet the mistake was a really interesting one. Today we publish the VB2019 paper by Sebastian García,...
View ArticleResponsible madness?
The debate on responsible disclosure is about as old as IT security itself. In a guest post for Virus Bulletin Robert Neumann suggests we need to reconsider a one-size-fits-all solution and instead...
View ArticleVB2019 papers: Emotet and Ryuk
Today we publish VB2019 papers by Luca Nagy (Sophos) on Emotet and Gabriela Nicolao and Luciano Martins (Deloitte) on Ryuk, as well as the corresponding videos of their presentations. Read more
View ArticleVB tests the web security products that play an important role in fending off...
The web continues to be a major infection vector for malware and credential-stealing threats. In the VBWeb tests, we measure products' ability to block such threats and certify products that perform a...
View ArticleVB2019 videos: partner presentations
Today, we publish the videos of the VB2019 partner presentations by Michael Maltsev (Reason Cybersecurity) on webcam interception and protection, and by Jean-Ian Boutin and Anton Cherepanov (ESET) on...
View ArticleVB2019 paper: Inside Magecart: the history behind the covert card-skimming...
Today we publish the VB2019 paper by RiskIQ researcher Yonathan Klijnsma, who looked at the Magecart web-skimming attacks. Read more
View ArticleStalkerware poses particular challenges to anti-virus products
Malware used in domestic abuse situations is a growing threat, and the standard way for anti-virus products to handle such malware may not be good enough. But that doesn't mean there isn't an...
View ArticleVB2019 paper: We need to talk - opening a discussion about ethics in infosec
Those working in the field of infosec are often faced with ethical dilemmas that are impossible to avoid. Today, we publish a VB2019 paper by Kaspersky researcher Ivan Kwiatkowski looking at ethics in...
View ArticleEmotet continues to bypass many email security products
Having returned from a summer hiatus, Emotet is back targeting inboxes and, as seen in the VBSpam test lab, doing a better job than most other malicious campaigns at bypassing email security products....
View ArticlePaper: Dexofuzzy: Android malware similarity clustering method using opcode...
We publish a paper by researchers from ESTsecurity in South Korea, who describe a fuzzy hashing algorithm for clustering Android malware datasets. Read more
View ArticleGerman Dridex spam campaign is unfashionably large
VB has analysed a malicious spam campaign targeting German-speaking users with obfuscated Excel malware that would likely download Dridex but that mostly stood out through its size. Read more
View ArticleVB2019 paper: DNS on fire
In a paper presented at VB2019, Cisco Talos researchers Warren Mercer and Paul Rascagneres looked at two recent attacks against DNS infrastructure: DNSpionage and Sea Turtle. Today we publish their...
View ArticleVB2019 video: Discretion in APT: recent APT attack on crypto exchange employees
At VB2019 in London, LINE's HeungSoo Kang explained how cryptocurrency exchanges had been attacked using Firefox zero-days. Today, we publish the video of his presentation. Read more
View ArticleVB2019 paper: Domestic Kitten: an Iranian surveillance program
At VB2019 in London, Check Point researchers Aseel Kayal and Lotem Finkelstein presented a paper detailing an Iranian operation they named 'Domestic Kitten' that used Android apps for targeted...
View Article
More Pages to Explore .....