An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
Intel introduced a new set of CPUs in 2009 that included hardware support for the Advanced Encryption Standard (AES) in the instruction set. These have not attracted much interest from virus writers - until now. Peter Ferrie describes the W32/Brotinn…
Read moreRaul Alvarez looks into the execution path of malware that resembles a piece of shellcode inside a help file.
Read moreThe topic of cybersecurity and international cooperation usually involves difficult discussions about cross border jurisdiction issues, the need for cooperation between very different actors, and privacy. Wout de Natris considers the issues and asks:…
Read moreKurt Baumgartner (Kaspersky Lab)
‘The general level of insight into network infiltration around the globe is becoming more informed.' Kurt Baumgartner, Kaspersky Lab.
Read moreAbhishek Singh looks at some of the techniques that are commonly used by malware to bypass analysis in a virtualized environment.
Read moreDavid Harley (ESET)
While some are claiming that AV is so far past its best before date that it should only be used when given away free, David Harley asks on what basis this judgement has been made, and whether the reality is that anti-virus is simply no longer the…
Read moreReport finds knowledge of procedures and information flows is crucial.
Read moreDutch government attempts to encourage responsible disclosure of vulnerabilities.
Read moreLoucif Kharouni (Trend Micro)
Recently, there has been a change in the toolkit/exploit kit landscape, with bad guys dedicating more time and resources to securing their creations and the servers on which their software will be installed. Loucif Kharouni explains why we need to…
Read more