VB Blog

VB2019 presentation: A deep dive into iPhone exploit chains

Posted by   Virus Bulletin on   Jan 10, 2020

In a last-minute presentation at VB2019 in London, John Bambenek of the University of Illinois at Urbana-Champaign discussed details of campaigns that used advanced iOS and Android exploit chains against China’s Uighur minority. Today we release the recording of John's presentation.

Read more  

Latest VBWeb report describes current state of the web-based threat landscape

Posted by   Helen Martin on   Jan 8, 2020

Today we released the Winter 2020 VBWeb report, detailing the performance of web security products against live web threats and looking at the current state of the web-based threat landscape.

Read more  

VB2019 paper: Catch me if you can: detection of injection exploitation by validating query and API integrity

Posted by   Virus Bulletin on   Jan 6, 2020

In a paper presented at VB2019 in London, Prismo Systems researchers Abhishek Singh and Ramesh Mani discussed code injection vulnerabilities and presented a tool that could detect this vulnerability class. Today we publish their paper and the recording of their presentation.

Read more  

Virus Bulletin says a fond farewell and thank you to Martijn Grooten

Posted by   Helen Martin on   Dec 31, 2019

As VB Editor Martijn Grooten steps down from his role to move on to new challenges, the team wish him a fond farewell and the very best of luck in his future endeavours.

Read more  

VB2019 paper: Never before had Stierlitz been so close to failure (or: what is a Soviet super-spy doing in a popular bundleware for Mac?)

Posted by   Martijn Grooten on   Dec 27, 2019

Today, we publish the VB2019 paper and video by Sophos researcher Sergei Shevchenko in which he analyses a popular yet unnamed piece of macOS ‘bundleware’.

Read more  

Parting thoughts 5: bringing the good news

Posted by   Martijn Grooten on   Dec 23, 2019

In the final of a five-part series of blog posts, departing VB Editor Martijn Grooten argues for more emphasis on the good news in security, especially that which is more subtle.

Read more  

Parting thoughts 4: the big picture

Posted by   Virus Bulletin on   Dec 20, 2019

In the fourth of a five-part series of blog posts, departing VB Editor Martijn Grooten explains why security researchers should refer to other people's work.

Read more  

Parting thoughts 3: taking security seriously

Posted by   Martijn Grooten on   Dec 19, 2019

In the third of a five-part series of blog posts, departing VB Editor Martijn Grooten explains why he believes security vendors should take their products' security more seriously.

Read more  

VB2019 paper: Exploring the Chinese DDoS landscape

Posted by   Martijn Grooten on   Dec 19, 2019

China has long been a hotbed of DDoS activities, and today we publish a VB2019 paper by Intezer researcher Nacho Sanmillan who looked at Chinese threat groups engaged in performing DDoS attacks. We have also uploaded the recording of his presentation.

Read more  

Parting thoughts 2: the need for education in security

Posted by   Martijn Grooten on   Dec 18, 2019

In the second of a five-part series of blog posts, departing VB Editor Martijn Grooten explains why he believes cybersecurity professionals need to educate themselves on the complexities of the real-world situations in which security is applied.

Read more  

Search blog

VB100 for Windows Server 2008 results published

Latest VB100 results published - full report now also available.
Latest VB100 results published - full report now also available. The results of the VB100 comparative review on Windows Server 2008 R2 have been announced. This month's test… https://www.virusbulletin.com/blog/2011/06/windows-server-2008-results-published/

Outlook spam phishes for SMTP credentials

Login details would give spammers access to legitimate mail servers.
Login details would give spammers access to legitimate mail servers. A phishing scam has been identified that targets users of Microsoft Outlook and tries to obtain SMTP login… https://www.virusbulletin.com/blog/2011/06/outlook-spam-phishes-smtp-credentials/

DroidKungFu command and control server may be mobile device

Android trojan makes use of root exploit.
Android trojan makes use of root exploit. Researchers at Fortinet have discovered a command and control server for the 'DroidKungFu' Android trojan that appears to be a mobile… https://www.virusbulletin.com/blog/2011/06/droidkungfu-command-and-control-server-may-be-mobile-device/

Exploit kit targets customers of air travel websites

SpyEye configuration intercepts personal data submitted to legitimate websites.
SpyEye configuration intercepts personal data submitted to legitimate websites. Security researchers have uncovered a version of the 'SpyEye' trojan that steals credit card and… https://www.virusbulletin.com/blog/2011/06/exploit-kit-targets-customers-air-travel-websites/

Botnet rented for online extortion

Man who threatened World Cup bookmakers with DDoS attack convicted.
Man who threatened World Cup bookmakers with DDoS attack convicted. A German man who hired a botnet and used it to threaten bookmakers with DDoS attacks during the 2010 FIFA World… https://www.virusbulletin.com/blog/2011/06/botnet-rented-online-extortion/

Sophos red flags Google Analytics

Popular analytics tool mistakenly flagged as 'high risk'.
Popular analytics tool mistakenly flagged as 'high risk'. Security firm Sophos had an embarrassing moment this morning when its scanner flagged Google Analytics as malicious.… https://www.virusbulletin.com/blog/2011/06/sophos-red-flags-google-analytics/

US court: passwords reasonable security for online banking

Security question considered second authentication factor.
Security question considered second authentication factor. A US court has declared that a combination of passwords and 'security questions' is an ample way for banks to protect… https://www.virusbulletin.com/blog/2011/06/us-court-passwords-reasonable-security-online-banking/

Malicious PHP script hides bad stuff inside 'white-space'

Spaces and tabs used to encode into binary.
Spaces and tabs used to encode into binary. Researchers at Kaspersky have discovered a malicious PHP script that uses an inventive way to obfuscate its malicious behaviour. The… https://www.virusbulletin.com/blog/2011/06/malicious-php-script-hides-bad-stuff-inside-white-space/

Banking malware hosted on Amazon's cloud servers

Trojan targets mostly Brazilian banks.
Trojan targets mostly Brazilian banks. Researchers have discovered malware hosted on Amazon Web Services that steals victims' bank account data. Acting as a rootkit, the malware… https://www.virusbulletin.com/blog/2011/06/banking-malware-hosted-amazon-s-cloud-servers/

Facebook scam serving malware

Attack targeting Windows and Mac users in US and UK.
Attack targeting Windows and Mac users in US and UK. A Facebook scam that is doing the rounds at the moment - claiming to contain a 'freaky video' related to the ongoing case… https://www.virusbulletin.com/blog/2011/06/facebook-scam-serving-malware/

June issue of VB published

The June issue of Virus Bulletin is now available for subscribers to download.
The June issue of Virus Bulletin is now available for subscribers to download. The June 2011 issue of Virus Bulletin is now available for subscribers to browse online or download… https://www.virusbulletin.com/blog/2011/06/june-issue-vb-published/

June

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2011/06/

95% of spam monetized through three banks

Financial infrastructure possible bottleneck for spammers.
Financial infrastructure possible bottleneck for spammers. In a recently published paper, researchers from the University of California found that 95 per cent of spamvertised… https://www.virusbulletin.com/blog/2011/05/95-spam-monetized-through-three-banks/

Spammers use unicode trick to manipulate file names

Windows executable appears to be Word document.
Windows executable appears to be Word document. An unicode trick that reverses the order of some characters has been used by spammers to disguise malicious attachments as harmless… https://www.virusbulletin.com/blog/2011/05/spammers-use-unicode-trick-manipulate-file-names/

Zeus source code leaked

Banking trojan among the most advanced of its kind.
Banking trojan among the most advanced of its kind. Researchers at Danish security firm CSIS have discovered that the full source code of the Zeus crime kit has been leaked to… https://www.virusbulletin.com/blog/2011/05/zeus-source-code-leaked/

Canada new hotbed for cybercriminal activity

Country's IP addresses less likely to be scrutinized.
Country's IP addresses less likely to be scrutinized. Security firm Websense has reported a significant increase in cybercrime originating in Canada. Hitherto, Canada and… https://www.virusbulletin.com/blog/2011/05/canada-new-hotbed-cybercriminal-activity/

Smile, you're on a botnet!

Multi-platform Java botnet allows for remote control of webcam and microphone.
Multi-platform Java botnet allows for remote control of webcam and microphone. Researchers have discovered a multi-platform botnet running on the Java Runtime Environment (JRE)… https://www.virusbulletin.com/blog/2011/05/smile-you-re-botnet/

May issue of VB published

The May issue of Virus Bulletin is now available for subscribers to download.
The May issue of Virus Bulletin is now available for subscribers to download. The May 2011 issue of Virus Bulletin is now available for subscribers to browse online or download… https://www.virusbulletin.com/blog/2011/05/may-issue-vb-published/

May

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2011/05/

VB announces Virus Bulletin for Kindle

VB joins the e-book generation.
VB joins the e-book generation. With millions of people now using e-book readers as a convenient way to read while on the go - or simply to cut down on bookshelf space - VB is… https://www.virusbulletin.com/blog/2011/04/vb-announces-kindle/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.