Notice

Virus Bulletin's blog

The latest Blog posts from the VB team
  1. VB2018 paper: The dark side of WebAssembly
    Today, we publish the VB2018 paper by Symantec researchers Aishwarya Lonkar and Siddhesh Chandrayan on the security risks that come with WebAssembly.

    Read more
  2. The Virus Bulletin conference returns home: VB2019 to take place in London
    In 2019, the Virus Bulletin conference is set to return home, with VB2019 taking place in London, UK.

    Read more
  3. Guest blog: The case for increasing transparency in cybersecurity
    In a guest blog post, Kaspersky Lab's Anton Shingarev considers the case for increasing transparency in cybersecurity.

    Read more
  4. VB2018 preview: Workshops
    Workshops make their VB Conference debut during VB2018, giving delegates the opportunity to learn the basics of kernel-level malware analysis, Android reverse-engineering and artificial intelligence.

    Read more
  5. New article: Through the looking glass: webcam interception and protection in kernel mode
    Today we publish a short article by Ronen Slavin and Michael Maltsev, researchers at Reason Software Company, who dive into the video capturing internals on Windows, and explain how this can be used by a malicious actor to steal images recorded by a computer's webcam.

    Read more
  6. VB2018 preview: The botnet landscape - live threats and steps for mitigation (Small Talk)
    In a Small Talk at VB2018, Spamhaus's Simon Forster will present the organization's research into the botnet landscape and will discuss with the audience topics such as how the rise of anonymzation techniques and the hosting of botnets on well-regarded cloud providers have changed the landscape.

    Read more
  7. VB2018 Threat Intelligence Summit: survey on threat intel usage
    Virus Bulletin is proud to host the first Threat Intelligence Summit as an integral part of VB2018 next week. In a bid to help collect as much current data as possible, we'd like to ask anyone generating or consuming threat intelligence to fill in a very short survey.

    Read more
  8. VB2018 preview: Anatomy of an attack: detecting and defeating CRASHOVERRIDE
    In today's blog post, we preview the VB2018 paper by Dragos Inc.'s Joe Slowik, who looks at the CRASHOVERRIDE malware, the first (publicly known) malware designed to impact electric grid operations.

    Read more
  9. VB2018 preview: Cyber Threat Alliance
    In today's blog post we look at a report on illicit cryptocurrency mining by the Cyber Threat Alliance and also look forward to the VB2018 talk by the CTA's CEO Michael Daniel.

    Read more
  10. VB2018 preview: hacking cars
    In recent years, car hacking has evolved from a mostly theoretical research field involving giggling researchers and scared journalists, to one that actually concerns car owners and manufacturers. On today's blog we preview two VB2018 papers, by Inbar Raz and Spencer Hsieh, that look at the subject of hacking cars.

    Read more