VB2018 preview: Cyber Threat Alliance

Posted by   Martijn Grooten on   Sep 25, 2018

Last week, the Cyber Threat Alliance (CTA) published a report on the illicit mining of cryptocurrencies. The report is notable for two reasons: first because it is exceptionally good in its analysis of the problem, and secondly (and perhaps not unrelated) because researchers from no fewer than eight security companies contributed to the report.

Though the security industry is one in which competition can be fierce, there is a surprising amount of cooperation among researchers who work for competing firms, both informally and in formal organizations like the CTA. At Virus Bulletin, we support such cooperation and are proud that our conference has become one of the main events at which the links necessary for such cooperation are built.

It is thus very fitting that the CTA's CEO, Michael Daniel, will deliver a talk on why threat intelligence sharing actually makes your company more competitive. Between 2012 and 2017, Michael served as Special Assistant to President Obama and thus he knows all too well how much there is to lose if we don't work together to fight today's digital threats.

There are more than 50 other talks on the VB2018 programme. All aspects of threat intelligence will be covered in the first Threat Intelligence Summit, which takes place on Friday 5 October. Those with a special interest in illicit cryptocurrency mining should make sure they attend the presentation by Malwarebytes researcher Jérôme Segura on drive-by mining.

VB2018 takes place next week, but tickets are still available, so book yours now!

VB2018-withdate-325w.jpg

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2018 paper: Analysing compiled binaries using logic

Constraint programming is a lesser-known technique that is becoming increasingly popular among malware analysts. In a paper presented at VB2018 Thaís Moreira Hamasaki presented an overview of the technique and explained how it can be applied to the…

Virus Bulletin encourages experienced speakers and newcomers alike to submit proposals for VB2019

With a little less than a month before the deadline of the call for papers for VB2019, Virus Bulletin encourages submissions from experienced speakers and newcomers alike.

VB2018 paper: Internet balkanization: why are we raising borders online?

At VB2018 in Montreal, Ixia researcher Stefan Tanase presented a thought-provoking paper on the current state of the Internet and the worrying tendency towards raising borders and restricting the flow of information. Today we publish both his paper…

The malspam security products miss: banking and email phishing, Emotet and Bushaloader

The set-up of the VBSpam test lab gives us a unique insight into the kinds of emails that are more likely to bypass email filters. This week we look at the malspam that was missed: banking and email phishing, Emotet and Bushaloader.

VB2018 paper: Where have all the good hires gone?

The cybersecurity skills gap has been described as one of the biggest challenges facing IT leaders today. At VB2018 in Montreal, ESET's Lysa Myers outlined some of the things the industry can do to help address the problem. Today we publish Lysa's…

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.