Blog keyword search

VB2016 paper: Debugging and monitoring malware network activities with Haka

In their VB2016 paper, Stormshield researchers Benoît Ancel and Mehdi Talbi introduced Haka, an open-source language to monitor, debug and control malicious network traffic. Both their paper and the video recording of their presentation are now available …
Anyone who has ever analysed malware through its network communications will knows that this often involves ad-hoc scripts in languages like Python or Perl to decode the traffic.… https://www.virusbulletin.com/blog/2017/04/vb2016-paper-debugging-and-monitoring-malware-network-activities-haka/

VB2016 paper: Open Source Malware Lab

At VB2016, ThreatConnect Director of Research Innovation Robert Simmons presented a paper on setting up an open source malware lab. Today, we share the accompanying paper and video.
Security experts aren't necessarily known for being skilled at predicting the future, but if there's one prediction they are guaranteed to get right, it's that there will be a lot… https://www.virusbulletin.com/blog/2017/01/vb2016-paper-open-source-malware-lab/

VB2016 preview: Detecting Man-in-the-Middle Attacks With Canary Requests

At VB2016, Cylance researcher Brian Wallace will reveal a multi-platform tool that runs on the endpoint and uses various techniques to detect ongoing man-in-the-middle attacks.
While man-in-the-middle attacks are relatively rare (especially among those not attending hacker conferences), it is quite common for computer users to be in a situation where an… https://www.virusbulletin.com/blog/2016/september/vb2016-preview-detecting-man-middle-attacks-canary-requests/

Paper: All Your Meetings Are Belong to Us: Remote Code Execution in Apache OpenMeetings

Security researcher Andreas Lindh recently found a vulnerability in Apache OpenMeetings that could allow remote code execution on a vulnerable server. Andreas reported the vulnerability to the OpenMeetings developers and, once it had been patched, he wrot…
The rise of bug bounties in recent years has created an incentive for hackers to hunt for vulnerabilities in a lot of software and services. But what about those software projects… https://www.virusbulletin.com/blog/2016/03/paper-all-your-meetings-are-belong-us-remote-code-execution-apache-openmeetings/

Sourcefire turns down $186 million takeover bid

Unsolicited offer from Barracuda Networks rejected.
Unsolicited offer from Barracuda Networks rejected.Sourcefire, the open source specialists behind the popular Snort intrusion prevention system and backer of the ClamAV open-source… https://www.virusbulletin.com/blog/2008/06/sourcefire-turns-down-186-million-takeover-bid/

Trend vs. ClamAV patent row hots up

Free software advocates call for boycott of Trend.
Free software advocates call for boycott of Trend. With legal proceedings ongoing between Trend Micro and gateway appliance specialist Barracuda Networks, concerning Barracuda's… https://www.virusbulletin.com/blog/2008/02/trend-vs-clamav-patent-row-hots/

Barracuda battles Trend Micro patent claims

Trend demands licensing for gateway virus scanning idea.
Trend demands licensing for gateway virus scanning idea.Barracuda Networks has announced it is fighting a legal battle against Trend Micro, who has claimed US patent rights to the… https://www.virusbulletin.com/blog/2008/01/barracuda-battles-trend-micro-patent-claims/

ClamAV taken over by Sourcefire

Snort maker buys into open-source AV.
Snort maker buys into open-source AV. Open-source anti-virus product ClamAV has been acquired by Sourcefire, the US-based company behind leading open-source intrusion detection… https://www.virusbulletin.com/blog/2007/08/clamav-taken-over-sourcefire/

AV testing practices questioned

Professional and amateur tests criticised.
Professional and amateur tests criticised. Last week, IT industry commentator and renowned anti-anti-virus writer Robin Bloor released a typically inflammatory article implying… https://www.virusbulletin.com/blog/2007/08/av-testing-practices-questioned/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.