Notice

Virus Bulletin's blog

The latest Blog posts from the VB team
  1. VB2018 paper: The modality of mortality in domain names
    Domains play a crucial role in most cyber attacks, from the very advanced to the very mundane. Today, we publish a VB2018 paper by Paul Vixie (Farsight Security) who undertook the first systematic study into the lifetimes of newly registered domains.

    Read more
  2. VB2018 paper: Analysing compiled binaries using logic
    Constraint programming is a lesser-known technique that is becoming increasingly popular among malware analysts. In a paper presented at VB2018 Thaís Moreira Hamasaki presented an overview of the technique and explained how it can be applied to the analysis of (potentially) malicious binaries. Today, we publish both Thaís' paper and the video of her presentation.

    Read more
  3. Virus Bulletin encourages experienced speakers and newcomers alike to submit proposals for VB2019
    With a little less than a month before the deadline of the call for papers for VB2019, Virus Bulletin encourages submissions from experienced speakers and newcomers alike.

    Read more
  4. VB2018 paper: Internet balkanization: why are we raising borders online?
    At VB2018 in Montreal, Ixia researcher Stefan Tanase presented a thought-provoking paper on the current state of the Internet and the worrying tendency towards raising borders and restricting the flow of information. Today we publish both his paper and the recording of his presentation.

    Read more
  5. The malspam security products miss: banking and email phishing, Emotet and Bushaloader
    The set-up of the VBSpam test lab gives us a unique insight into the kinds of emails that are more likely to bypass email filters. This week we look at the malspam that was missed: banking and email phishing, Emotet and Bushaloader.

    Read more
  6. VB2018 paper: Where have all the good hires gone?
    The cybersecurity skills gap has been described as one of the biggest challenges facing IT leaders today. At VB2018 in Montreal, ESET's Lysa Myers outlined some of the things the industry can do to help address the problem. Today we publish Lysa's paper and the recording of her presentation.

    Read more
  7. Preview: Nullcon 2019
    We look forward the Nullcon 2019 conference in Goa, India, at which VB Editor Martijn Grooten will give a talk on the state of malware.

    Read more
  8. From Amazon to Emotet: a look at those phishing and malware emails that bypassed email security products
    We see a lot of spam in the VBSpam test lab, and we also see how well such emails are being blocked by email security products. Recently some of the emails that bypassed security products included a broken Amazon phishing campaign, a large fake UPS campaign and malicious emails carrying Emotet and Lokibot.

    Read more
  9. VB2018 paper: Little Brother is watching – we know all your secrets!
    At VB2018 in Montreal, researchers from Fraunhofer SIT looked at privacy vulnerabilities in legitimate Android family-tracking apps that leaked location data. Today, we publish both their paper and the video of their presentation.

    Read more
  10. Threat intelligence teams should consider recruiting journalists
    Threat intelligence teams would do well to recruit journalists, whose experience is crucial in today's threat landscape.

    Read more