Virus Bulletin newsletter

The Virus Bulletin newsletter is a weekly round-up presenting an overview of the best threat intelligence sources from around the web, with a focus on technical analyses of threats and attacks.



Enter your email address to subscribe to the newsletter. (You will receive an email to confirm your subscription; you will not be subscribed until you have clicked on the link in the email.)


14 January 2019: WeddingCake and Zen Android malware, Ryuk, DNSpionage, Zebrocy, Singapore data breach, ChinaZ, Hide'N'Seek, etc.

7 January 2019: APT actors, attacks against North Korean defectors, Ryuk ransomware, Vidar, phishing with letter-swapping font, Goblin Panda, MobSTSPY, etc.

24 December 2018: APT10, 2FA phishing, Shamoon and APT33, CVE-2018-8653, Underminer exploit kit, Ryuk, WindTail macOS malware, etc.

17 December 2018: exploit builders, APT-C-23, CVE-2018-8611, Shamoon, Virut, Operation Sharpshooter, Charming Kitten, Sofacy, bomb hoax spam, etc.

10 December 2018: Necurs, Hide'N'Seek, Mirai, Kelihos, STOLEN PENCIL, Magecart, ForSSHe, DarthMiner, etc.

3 December 2018: SamSam, Pegasus, exploit kits, 3ve takedown, Backswap, DNSpionage, MuddyWater, Bladabindi, etc.

26 November 2018: Lazarus, Cozy Bear, Fancy Bear, OceanLotus, Magecart, IoT botnets, OilRig, FIN7, etc.



Do you have any suggestions for the newsletter? Don't hesitate to contact us. The newsletter is compiled by VB Editor Martijn Grooten.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.