VB Blog

VB2019 paper: Fantastic Information and Where to Find it: A guidebook to open-source OT reconnaissance

Posted by   Martijn Grooten on   Nov 22, 2019

A VB2019 paper by FireEye researcher Daniel Kapellmann Zafra explained how open source intelligence (OSINT) can be used to learn crucial details of the inner workings of many a system. Today we publish Daniel's paper and the recording of his presentation.

Read more  

VB2019 paper: Different ways to cook a crab: GandCrab Ransomware-as-a-Service (RaaS) analysed in depth

Posted by   Martijn Grooten on   Nov 21, 2019

Though active for not much longer than a year, GandCrab had been one of the most successful ransomware operations. In a paper presented at VB2019 in London, McAfee researchers John Fokker and Alexandre Mundo looked at the malware code, its evolution and the affiliate scheme behind it. Today we publish both their paper and the recording of their presentation.

Read more  

VB2019 paper: Domestic Kitten: an Iranian surveillance program

Posted by   Martijn Grooten on   Nov 18, 2019

At VB2019 in London, Check Point researchers Aseel Kayal and Lotem Finkelstein presented a paper detailing an Iranian operation they named 'Domestic Kitten' that used Android apps for targeted surveillance. Today we publish their paper and the video of their presentation.

Read more  

VB2019 video: Discretion in APT: recent APT attack on crypto exchange employees

Posted by   Martijn Grooten on   Nov 18, 2019

At VB2019 in London, LINE's HeungSoo Kang explained how cryptocurrency exchanges had been attacked using Firefox zero-days. Today, we publish the video of his presentation.

Read more  

VB2019 paper: DNS on fire

Posted by   Martijn Grooten on   Nov 7, 2019

In a paper presented at VB2019, Cisco Talos researchers Warren Mercer and Paul Rascagneres looked at two recent attacks against DNS infrastructure: DNSpionage and Sea Turtle. Today we publish their paper and the recording of their presentation.

Read more  

German Dridex spam campaign is unfashionably large

Posted by   Martijn Grooten on   Nov 6, 2019

VB has analysed a malicious spam campaign targeting German-speaking users with obfuscated Excel malware that would likely download Dridex but that mostly stood out through its size.

Read more  

Paper: Dexofuzzy: Android malware similarity clustering method using opcode sequence

Posted by   Martijn Grooten on   Nov 5, 2019

We publish a paper by researchers from ESTsecurity in South Korea, who describe a fuzzy hashing algorithm for clustering Android malware datasets.

Read more  

Emotet continues to bypass many email security products

Posted by   Martijn Grooten on   Nov 4, 2019

Having returned from a summer hiatus, Emotet is back targeting inboxes and, as seen in the VBSpam test lab, doing a better job than most other malicious campaigns at bypassing email security products.

Read more  

VB2019 paper: We need to talk - opening a discussion about ethics in infosec

Posted by   Martijn Grooten on   Nov 1, 2019

Those working in the field of infosec are often faced with ethical dilemmas that are impossible to avoid. Today, we publish a VB2019 paper by Kaspersky researcher Ivan Kwiatkowski looking at ethics in infosec as well as the recording of Ivan's presentation.

Read more  

Stalkerware poses particular challenges to anti-virus products

Posted by   Martijn Grooten on   Oct 31, 2019

Malware used in domestic abuse situations is a growing threat, and the standard way for anti-virus products to handle such malware may not be good enough. But that doesn't mean there isn't an important role for anti-virus to play.

Read more  

Search blog

VB2013 speaker spotlight

We speak to VB2013 presenters Lysa Myers and David Harley about their research interests and what they aim to bring to the conference.
We speak to VB2013 presenters Lysa Myers and David Harley about their research interests and what they aim to bring to the conference. The VB2013 conference takes place this autumn… https://www.virusbulletin.com/blog/2013/06/speaker-spotlight-harley-myers/

VB2014 - location, location, location

Cat escapes bag as details of VB2014 conference are announced.
Cat escapes bag as details of VB2014 conference are announced. Keeping shtum about the dates and details for VB2014 - the 24th Virus Bulletin International Conference - has not… https://www.virusbulletin.com/blog/2013/01/location-location-location/

VBConnect: the Virus Bulletin conference goes social

New tool aims to enhance conference networking opportunities.
New tool aims to enhance conference networking opportunities. For many in the security industry, the Virus Bulletin conference is the highlight of their busy events calendar, and… https://www.virusbulletin.com/blog/2012/06/vbconnect-conference-goes-social/

Call for last-minute technical papers

Submissions invited for technical 'turbo' talks at VB Geneva.
Submissions invited for technical 'turbo' talks at VB Geneva. Virus Bulletin is seeking submissions from those wishing to present last-minute technical papers at VB2009. The VB… https://www.virusbulletin.com/blog/2009/07/call-last-minute-technical-papers/

Security experts pool ideas at European conferences

Research and expertise shared at CARO and AMTSO meetings.
Research and expertise shared at CARO and AMTSO meetings. Last week saw two major gatherings of top security and anti-malware experts from across the globe, as the third annual… https://www.virusbulletin.com/blog/2009/05/security-experts-pool-ideas-european-conferences/

VB2009 conference programme announced

Schedule for Geneva security conference announced after record submissions.
Schedule for Geneva security conference announced after record submissions. Following a record number of submissions, the VB2009 conference committee is pleased to announce the… https://www.virusbulletin.com/blog/2009/04/conference-programme-announced/

VB2008 photos online

VB delegates at work, rest and play in Ottawa.
VB delegates at work, rest and play in Ottawa. A selection of photographs from the VB2008 conference in Ottawa is now available to browse online. The photographs can be searched by… https://www.virusbulletin.com/blog/2008/10/photos-online/

Last-minute papers announced for VB2008

Schedule for hot-topic technical 'turbo' talks announced.
Schedule for hot-topic technical 'turbo' talks announced. VB has unveiled the schedule for a series of up-to-the-minute technical presentations at the VB2008 conference which takes… https://www.virusbulletin.com/blog/2008/09/last-minute-papers-announced/

AVAR 2007 opens in Seoul

Asian and global malware experts gather to discuss latest trends
Asian and global malware experts gather to discuss latest trends The annual conference of the Association of anti Virus Asia Researchers (AVAR) has convened in the comfortable… https://www.virusbulletin.com/blog/2007/11/avar-2007-opens-seoul/

« Previous 1...10111213141516 Next »

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.