Category: Virus Bulletin’s blog

VB2021 localhost videos available on YouTube

This article has been indexed from Virus Bulletin’s blog VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch – and share – any part of the conference freely and without registration.…

New additions complete the VB2020 localhost programme

Read the original article: New additions complete the VB2020 localhost programme The programme for VB2020 localhost – the first virtual, and entirely free to attend VB conference – is now complete, with new additions to both the live programme and…

New additions complete the VB2020 localhost programme

Read the original article: New additions complete the VB2020 localhost programme The programme for VB2020 localhost – the first virtual, and entirely free to attend VB conference – is now complete, with new additions to both the live programme and…

VB2020 localhost call for last-minute papers opened!

Read the original article: VB2020 localhost call for last-minute papers opened! The call for last-minute papers for VB2020 localhost is now open. Submit before 17 August to have your paper considered for one of the nine slots reserved for ‘hot’…

Announcing… VB2020 localhost

Read the original article: Announcing… VB2020 localhost Announcing VB2020 localhost: the carbon neutral, budget neutral VB conference! Read more   Advertise on IT Security News. Read the original article: Announcing… VB2020 localhost

VB2020 programme announced

Read the original article: VB2020 programme announced VB is pleased to reveal the details of an interesting and diverse programme for VB2020, the 30th Virus Bulletin International Conference. Read more   Advertise on IT Security News. Read the original article:…

VB2020 programme announced

Read the original article: VB2020 programme announced VB is pleased to reveal the details of an interesting and diverse programme for VB2020, the 30th Virus Bulletin International Conference. Read more   Advertise on IT Security News. Read the original article:…

VB2020 update – currently business as usual

Here at VB we are keeping a close eye on the global situation regarding the COVID-19 outbreak and the various travel restrictions and health advice, but in the meantime planning and arrangements for VB2020 are going ahead as usual, including…

VB2020 update – currently business as usual

Here at VB we are keeping a close eye on the global situation regarding the COVID-19 outbreak and the various travel restrictions and health advice, but in the meantime planning and arrangements for VB2020 are going ahead as usual, including…

VB2019 paper: Defeating APT10 compiler-level obfuscations

At VB2019 in London, Carbon Black researcher Takahiro Haruyama presented a paper on defeating compiler-level obfuscations used by the APT10 group. Today we publish both Takahiro’s paper and the recording of his presentation. Read more   Advertise on IT Security…

VB2019 presentation: Nexus between OT and IT threat intelligence

Operational technology, the mission critical IT in ICS, shares many similarities with traditional IT systems, but also some crucial differences. During the Threat Intelligence Practitioners’ Summit at VB2019, Dragos cyber threat intelligence analyst Selena Larson gave a keynote on these…

New paper: LokiBot: dissecting the C&C panel deployments

First advertised as an information stealer and keylogger when it appeared in underground forums in 2015, LokiBot has added various capabilities over the years and has affected many users worldwide. In a new paper researcher Aditya Sood analyses the URL…

New paper: LokiBot: dissecting the C&C panel deployments

First advertised as an information stealer and keylogger when it appeared in underground forums in 2015, LokiBot has added various capabilities over the years and has affected many users worldwide. In a new paper researcher Aditya Sood analyses the URL…

VB2019 paper: Medical IoT for diabetes and cybercrime

At VB2019 in London, Fortinet researcher Axelle Apvrille presented a paper co-written with Aamir Lakhani that looked at the threats faced by those who use medical IoT devices to help manage their diabetes. Today we publish the researchers’ paper, as…

VB2019 paper: Medical IoT for diabetes and cybercrime

At VB2019 in London, Fortinet researcher Axelle Apvrille presented a paper co-written with Aamir Lakhani that looked at the threats faced by those who use medical IoT devices to help manage their diabetes. Today we publish the researchers’ paper, as…

VB2019 paper: Spoofing in the reeds with Rietspoof

In a VB2019 paper Avast researchers Jan Sirmer, Luigino Camastra and Adolf Středa revealed full details of the Rietspoof malware. Today we publish their paper and the recording of the presentation given by Jan and Luigino in London. Read more…

New paper: Behind the scenes of GandCrab’s operation

The GandCrab ransomware regularly updated itself to newer versions to stay ahead of decryptors released by security researchers, and regularly included taunts, jokes and references to security organizations in its code. In a new paper, the AhnLab Security Analysis Team…

New paper: Behind the scenes of GandCrab’s operation

The GandCrab ransomware regularly updated itself to newer versions to stay ahead of decryptors released by security researchers, and regularly included taunts, jokes and references to security organizations in its code. In a new paper, the AhnLab Security Analysis Team…

The VB2020 call for papers – how it works

With the VB2020 Call for Papers now open, we explain how the selection procedure works, which may help you during your abstract submission. Read more   Advertise on IT Security News. Read the complete article: The VB2020 call for papers…

VB2019 presentation: Targeted attacks through ISPs

In 2019 we saw a rise in the number of targeted malware infections spread via ISPs and service providers. In a last-minute paper presented at VB2019 in London, Kaspersky researcher Denis Legezo discussed the details of a number of such…

VB2019 presentation: A deep dive into iPhone exploit chains

In a last-minute presentation at VB2019 in London, John Bambenek of the University of Illinois at Urbana-Champaign discussed details of campaigns that used advanced iOS and Android exploit chains against China’s Uighur minority. Today we release the recording of John’s…