Virus Buletin Board

The latest Blog posts from the VB team
Updated: 56 min 7 sec ago

VB2017 paper: Walking in your enemy's shadow: when fourth-party collection becomes attribution hell

7 hours 26 min ago
We publish the VB2017 paper and video by Kaspersky Lab researchers Juan Andres Guerrero-Saade and Costin Raiu, in which they look at fourth-party collection (spies spying on other spies' campaigns) and its implications for attribution.

Read more
Categories: Data nyheter

Didn't come to VB2017? Tell us why!

Wed, 10/11/2017 - 19:25
Virus Bulletin is a company - and a conference - with a mission: to further the research in and facilitate the fight against digital threats. To help us in this mission, we want to hear from those who didn't come to Madrid. What was your impression of the conference? What did you think of this year's programme? And why couldn't you come to Madrid?

Read more
Categories: Data nyheter

Montreal will host VB2018

Tue, 10/10/2017 - 10:12
Last week, we announced the full details of VB2018, which will take place 3-5 October 2018 at the Fairmont The Queen Elizabeth hotel in Montreal, Quebec, Canada.

Read more
Categories: Data nyheter

VB2017 preview: Beyond lexical and PDNS (guest blog)

Thu, 10/05/2017 - 09:55
In a special guest blog post, VB2017 Silver sponsor Cisco Umbrella writes about a paper that researchers Dhia Mahjoub and David Rodriguez will present at the conference this Friday.

Read more
Categories: Data nyheter

Avast to present technical details of CCleaner hack at VB2017

Mon, 10/02/2017 - 13:01
The recently discovered malicious CCleaner version has become one of the biggest security stories of 2017. Two researchers from Avast, the company that had recently acquired CCleaner developer Piriform, will share the results of their investigations at VB2017 in Madrid this week.

Read more
Categories: Data nyheter

VB2017 preview: Walking in your enemy's shadow: when fourth-party collection becomes attribution hell

Mon, 10/02/2017 - 10:10
We preview the VB2017 paper by Kaspersky Lab researchers Juan Andrés Guerrero-Saade and Costin Raiu on fourth-party collection and its implications for attack attribution.

Read more
Categories: Data nyheter

VB2017 preview: Offensive malware analysis: dissecting OSX/FruitFly.B via a custom C&C server

Fri, 09/29/2017 - 11:23
We preview Patrick Wardle's VB2017 paper, in which the Synack researcher analyses the mysterious OSX/FruitFly malware by setting up a custom C&C server.

Read more
Categories: Data nyheter

VB2017 - information for press

Thu, 09/28/2017 - 14:35
More than 50 security industry experts will present conference papers to their peers at VB2017 next week, and there are several papers on the programme with a certain newsworthiness. There is still time for cybersecurity journalists to apply for a press pass.

Read more
Categories: Data nyheter

VB2017 preview: BPH exposed - RBN never left they just adapted and evolved. Did you?

Mon, 09/25/2017 - 11:40
We preview the VB2017 paper by Dhia Mahjoub (OpenDNS) and Jason Passwaters (Intel471) who combine an actor-centric and a network-centric approach to analysing bulletproof hosting operations.

Read more
Categories: Data nyheter

Test your technical and mental limits in the VB2017 foosball tournament

Fri, 09/22/2017 - 09:50
As has become tradition, VB2017 will once again see a security industry table football tournament. Register your team now for some great fun and adrenaline-filled matches in between sessions in Madrid!

Read more
Categories: Data nyheter

The case against running Windows XP is more subtle than we think it is

Thu, 09/21/2017 - 19:27
Greater Manchester Police is one of many organizations still running Windows XP on some of its systems. This is bad practice, but the case against running XP is far more subtle than we often pretend it is.

Read more
Categories: Data nyheter

Hot FinSpy research completes VB2017 programme

Thu, 09/21/2017 - 18:35
Researchers from ESET have found a new way in which the FinSpy/FinFisher 'government spyware' can infect users, details of which they will present at VB2017 in Madrid.

Read more
Categories: Data nyheter

Transparency is essential when monitoring your users' activities

Wed, 09/20/2017 - 09:30
Activity monitoring by security products in general, and HTTPS traffic inspection in particular, are sensitive issues in the security community. There is a time and a place for them, VB's Martijn Grooten argues, but only when they are done right.

Read more
Categories: Data nyheter

VB2017 preview: Android reverse engineering tools: not the usual suspects

Tue, 09/19/2017 - 16:13
We preview the VB2017 paper by Fortinet researcher Axelle Apvrille, in which she looks at some less obvious tools for reverse engineering Android malware.

Read more
Categories: Data nyheter

Malicious CCleaner update points to a major weakness in our infrastructure

Mon, 09/18/2017 - 12:14
Researchers from Cisco Talos have found that a recent version of the widely used CCleaner tool installed malware on the machine.

Read more
Categories: Data nyheter

Despite the profitability of ransomware there is a good reason why mining malware is thriving

Fri, 09/15/2017 - 12:10
Though ransomware is far more profitable than using a compromised PC to mine bitcoins, the global distribution of malware means that there are many botnets for which mining is the most efficient way to extract money out of a PC.

Read more
Categories: Data nyheter

VB2017 preview: Crypton - exposing malware's deepest secrets

Thu, 09/14/2017 - 16:19
We preview the VB2017 paper by Julia Karpin and Anna Dorfman (F5 networks), in which they present a tool to decrypt encrypted parts of malware.

Read more
Categories: Data nyheter

VB2017 preview: Hacktivism and website defacement: motivations, capabilities and potential threats

Wed, 09/13/2017 - 16:33
We preview the VB2017 paper by Marco Romagna and Niek Jan van den Hout (The Hague University of Applied Sciences), in which they thoroughly analyse the motivations and modus operandy of hacktivists.

Read more
Categories: Data nyheter

Three questions to ask about security product bypasses

Wed, 09/13/2017 - 10:35
Proof-of-concepts for bypasses of security products always sound scary, but how seriously should we take them? VB Editor Martijn Grooten lists three questions one should ask about any such bypass to determine how serious a threat it represents.

Read more
Categories: Data nyheter

VB2017: WHOIS and EICAR Small Talks added

Tue, 09/12/2017 - 11:59
Today, we announce two more 'Small Talks' for the VB2017 programme. In one of them, Neil Schwarzman will discuss the consequences of the GDPR for WHOIS and abuse research, while the other will be hosted by three members of EICAR, who will discuss its work on a trustworthiness strategy and minimum standard.

Read more
Categories: Data nyheter

Pages

KONTAKTA OSS

Tel: 0930-318 13

SMS: 076-815 18 06

email: nash@nashnet.nu

Contact

Custom Search