Notice

Virus Bulletin's blog

The latest Blog posts from the VB team
  1. VB2018 preview: Unpacking the packed unpacker: reversing an Android anti-analysis library
    At VB2018, Google researcher Maddie Stone will present an analysis of the multi-layered 'WeddingCake' anti-analysis library used by many Android malware families.

    Read more
  2. VB2018 preview: From drive-by download to drive-by mining
    At VB2018, Malwarebytes researcher Jérôme Segura will discuss the rise of drive-by cryptocurrency mining, explaining how it works and putting it in the broader context of changes in the cybercrime landscape.

    Read more
  3. Red Eyes threat group targets North Korean defectors
    A research paper by AhnLab researcher Minseok Cha looks at the activities of the Red Eyes threat group (also known as Group 123 and APT 37), whose targets include North Korean defectors, as well as journalists and human rights defenders focused on North Korea.

    Read more
  4. VB announces Threat Intelligence Summit to take place during VB2018
    We are very excited to announce a special summit, as part of VB2018, that will be dedicated to all aspects of threat intelligence.

    Read more
  5. VB2018 Small Talk: An industry approach for unwanted software criteria and clean requirements
    An industry approach for defining and detecting unwanted software to be presented and discussed at the Virus Bulletin conference.

    Read more
  6. VB2018 call for last-minute papers opened
    The call for last-minute papers for VB2018 is now open. Submit before 2 September to have your abstract considered for one of the nine slots reserved for 'hot' research.

    Read more
  7. VB2017 paper and update: Browser attack points still abused by banking trojans
    At VB2017, ESET researchers Peter Kálnai and Michal Poslušný looked at how banking malware interacts with browsers. Today we publish their paper, share the video of their presentation, and also publish a guest blog post from Peter, in which he summarises the recent developments in this space.

    Read more
  8. New paper: Does malware based on Spectre exist?
    It is likely that, by now, everyone in computer science has at least heard of the Spectre attack, and many excellent explanations of the attack already exist. But what is the likelihood of finding Spectre being exploited on Android smartphones?

    Read more
  9. More VB2018 partners announced
    We are excited to announce several more companies that have partnered with VB2018.

    Read more
  10. Malware authors' continued use of stolen certificates isn't all bad news
    A new malware campaign that uses two stolen code-signing certificates shows that such certificates continue to be popular among malware authors. But there is a positive side to malware authors' use of stolen certificates.

    Read more