Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Six flags over Texas

The last week of September saw a sizeable portion of the world's anti-malware experts decamp to Dallas. Helen Martin reports on the 22nd Virus Bulletin International Conference.

Read more  

VGrep: the rose revived

VB relaunches VGrep tool.

Read more  

EU’s biggest cyber test a success

European banks, information security agencies and governments participate in Europe’s biggest cyber security test.

Read more  

Unpacking x64 PE+ binaries part 3: IDA, graphs and binary instrumentation

In the first two parts of this tutorial series Aleksander Czarnowski has demonstrated some useful manual tricks that are helpful in unpacking x64 binaries. In this third article he describes one more manual unpacking approach then moves on to some…

Read more  

Inside a Black Hole: Part 1

Gabor Szappanos (Sophos)

The most actively deployed exploit kit over the past year has without doubt been the Blackhole exploit kit. Gabor Szappanos attempts to fill in the (black)holes in our knowledge about this threat. In this article he covers how the server-side code…

Read more  

Cridex botnet preview

Neo Tan (Fortinet)

Carmen Liang and Neo Tan focus on a detailed analysis of the Cridex banking trojan's injection routine, communication protocol, encryption scheme and working mechanism in order to shed light on the development path of the three most recent…

Read more  

Operation Desolation

Paul Baccas (Sophos)

Paul Baccas reviews a short story by Windows systems internals expert and Microsoft Technical Fellow, Mark Russinovich: Operation Desolation.

Read more  

Filename: BUGGY.COD.E

Raul Alvarez takes a close look at a recently discovered piece of malware that infects documents and executable files at the same time.

Read more  

Trojan Horse

Paul Baccas (Sophos)

Paul Baccas reviews Mark Russinovich's latest malware-themed thriller, Trojan Horse.

Read more  

Code injection via return-oriented programming

Code injection first became popular in game cheats, where it was used to change the program’s course of execution. Wayne Low looks at a piece of malware that takes advantage of the Windows messages flaw to perform code injection.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.