VB Blog

VB2019 presentation: Attor: spy platform with curious GSM fingerprinting

Posted by   Virus Bulletin on   Feb 11, 2020

Attor is a newly discovered cyber-espionage platform, use of which dates back to at least 2014 and which focuses on diplomatic missions and governmental institutions. Details of Attor were presented at VB2019 in London by ESET researcher Zuzana Hromcová. Today we release the recording of Zuzana's presentation.

Read more  

Why we encourage newcomers and seasoned presenters alike to submit a paper for VB2020

Posted by   Virus Bulletin on   Feb 6, 2020

With the call for papers for VB2020 currently open, we explain why, whether you've never presented before or you're a conference circuit veteran, if you have some interesting research to share with the community we want to hear from you!

Read more  

VB2019 paper: The cake is a lie! Uncovering the secret world of malware-like cheats in video games

Posted by   Helen Martin on   Feb 5, 2020

At VB2019 in London, Kaspersky researcher Santiago Pontiroli presented a paper on the growing illegal economy around video game cheats and its parallels with the malware industry. Today we publish both Santiago's paper and the recording of his presentation.

Read more  

VB2019 paper: Rich headers: leveraging the mysterious artifact of the PE format

Posted by   Virus Bulletin on   Jan 31, 2020

In a paper presented at VB2019 in London, ESET researchers Peter Kálnai and Michal Poslušný discussed the subject of rich headers and how it can be useful in malware research. Today we publish both their paper and the recording of their presentation.

Read more  

VB2019 paper: Medical IoT for diabetes and cybercrime

Posted by   Helen Martin on   Jan 28, 2020

At VB2019 in London, Fortinet researcher Axelle Apvrille presented a paper co-written with Aamir Lakhani that looked at the threats faced by those who use medical IoT devices to help manage their diabetes. Today we publish the researchers' paper, as well as the recording of Axelle's presentation.

Read more  

VB2019 paper: Spoofing in the reeds with Rietspoof

Posted by   Virus Bulletin on   Jan 24, 2020

In a VB2019 paper Avast researchers Jan Sirmer, Luigino Camastra and Adolf Středa revealed full details of the Rietspoof malware. Today we publish their paper and the recording of the presentation given by Jan and Luigino in London.

Read more  

New paper: Behind the scenes of GandCrab's operation

Posted by   Helen Martin on   Jan 20, 2020

The GandCrab ransomware regularly updated itself to newer versions to stay ahead of decryptors released by security researchers, and regularly included taunts, jokes and references to security organizations in its code. In a new paper, the AhnLab Security Analysis Team reveal the full details of the battle that went on between GandCrab and AhnLab.

Read more  

VB2019 paper: King of the hill: nation-state counterintelligence for victim deconfliction

Posted by   Virus Bulletin on   Jan 16, 2020

At VB2019 Juan Andres Guerrero-Saade looked at nation-state actors using threat intelligence for victim deconfliction. Today we publish both his paper and the recording of his presentation.

Read more  

The VB2020 call for papers - how it works

Posted by   Virus Bulletin on   Jan 14, 2020

With the VB2020 Call for Papers now open, we explain how the selection procedure works, which may help you during your abstract submission.

Read more  

VB2019 presentation: Targeted attacks through ISPs

Posted by   Virus Bulletin on   Jan 13, 2020

In 2019 we saw a rise in the number of targeted malware infections spread via ISPs and service providers. In a last-minute paper presented at VB2019 in London, Kaspersky researcher Denis Legezo discussed the details of a number of such cases. Today we release the recording of Denis' presentation.

Read more  

Search blog

VBSpam tests to be executed under the AMTSO framework

VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework.
VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework. The Anti-Malware Testing… https://www.virusbulletin.com/blog/2024/06/vbspam-tests-be-executed-under-amtso-framework/

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.
We were very sorry to learn of the passing of Professor Ross Anderson a few days ago. Ross Anderson was Professor of Security Engineering at Cambridge University and Edinburgh… https://www.virusbulletin.com/blog/2024/04/memoriam-prof-ross-anderson/

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.
We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week. Alan Solomon was the eponymous creator of one of the world's first anti-virus… https://www.virusbulletin.com/blog/2024/02/memoriam-dr-alan-solomon/

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.
Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects Read the paper (HTML) Download the paper (PDF)   Android botnets are a formidable… https://www.virusbulletin.com/blog/2023/10/new-paper-nexus-android-banking-botnet-compromising-cc-panels-and-dissecting-mobile-appinjects/

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.
Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In a… https://www.virusbulletin.com/blog/2021/12/new-paper-collector-stealer-russian-origin-credential-and-information-extractor/

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.
Today, VB has made all VB2021 localhost presentations available on VB's YouTube channel, so you can now watch – and share – any part of the conference freely and without… https://www.virusbulletin.com/blog/2021/11/vb2021-localhost-videos-available-youtube/

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.
VB2021 localhost - VB's second virtual, and entirely free to attend VB conference - took place last week and was a great success. If you missed it, don't worry, the… https://www.virusbulletin.com/blog/2021/10/vb2021-localhost-over-content-still-available-view/

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!
Have you analysed a brand new online threat? Are you involved in cutting edge security research? Are you tasked with securing systems and fending off attacks and developing new… https://www.virusbulletin.com/blog/2021/08/vb2021-localhost-call-last-minute-papers/

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.
Office documents have over many decades been used to launch malware, often through macros, embedded content or exploits. Researcher Kurt Natvig wanted to understand whether… https://www.virusbulletin.com/blog/2021/04/new-article-run-your-malicious-vba-macros-anywhere/

« Previous 1234567...120 Next »

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.