Category: blog

  • The Virus Bulletin conference returns home: VB2019 to take place in London

    In July 1989, the first ever Virus Bulletin magazine was published from its home in Oxfordshire, UK – a monthly publication focusing on the emerging threat of computer viruses. Two years later, the inaugural Virus Bulletin Conference took place on the Channel Island of Jersey. In the year in which Virus Bulletin celebrates its 30th birthday,…

  • Guest blog: The case for increasing transparency in cybersecurity

    In a guest blog post by VB2018 gold partner Kaspersky Lab, Anton Shingarev, Vice President, Public Affairs, considers the case for increasing transparency in cybersecurity. The gap between national security and cybersecurity has never been narrower. Ransomware has crippled the ability of local governments and hospitals to provide crucial services. Nation-state malware has disabled portions…

  • Guest blog: The case for increasing transparency in cybersecurity

    In a guest blog post by VB2018 gold partner Kaspersky Lab, Anton Shingarev, Vice President, Public Affairs, considers the case for increasing transparency in cybersecurity. The gap between national security and cybersecurity has never been narrower. Ransomware has crippled the ability of local governments and hospitals to provide crucial services. Nation-state malware has disabled portions…

  • VB2018 preview: Workshops

    The Virus Bulletin Conference is first and foremost a place to learn: about new threats, about the tools used to detect and fight them, and to learn about (and get to know) the people that matter in the fast-changing world of threat intelligence and research. This year, you can also learn about some essential techniques…

  • VB2018 preview: Workshops

    The Virus Bulletin Conference is first and foremost a place to learn: about new threats, about the tools used to detect and fight them, and to learn about (and get to know) the people that matter in the fast-changing world of threat intelligence and research. This year, you can also learn about some essential techniques…

  • New article: Through the looking glass: webcam interception and protection in kernel mode

    Today we publish a short article by Ronen Slavin and Michael Maltsev, researchers at Reason Software , one of the partners of VB2018 . In the article, Ronen and Michael dive into the video capturing internals on Windows , and explain how this can be used by a malicious actor to steal images recorded by…

  • VB2018 preview: The botnet landscape – live threats and steps for mitigation (Small Talk)

    Whether they’re used to send spam, to perform DDoS attacks, or as a proxy network for other kinds of nefarious activities, botnets remain a prominent tool for cybercriminals, and thus a main focus for security researchers. One of the organizations that is at the forefront of such research is Spamhaus : its employees and volunteers…

  • New article: Through the looking glass: webcam interception and protection in kernel mode

    Today we publish a short article by Ronen Slavin and Michael Maltsev, researchers at Reason Software , one of the partners of VB2018 . In the article, Ronen and Michael dive into the video capturing internals on Windows , and explain how this can be used by a malicious actor to steal images recorded by…

  • VB2018 preview: The botnet landscape – live threats and steps for mitigation (Small Talk)

    Whether they’re used to send spam, to perform DDoS attacks, or as a proxy network for other kinds of nefarious activities, botnets remain a prominent tool for cybercriminals, and thus a main focus for security researchers. One of the organizations that is at the forefront of such research is Spamhaus : its employees and volunteers…

  • VB2018 Threat Intelligence Summit: survey on threat intel usage

    Virus Bulletin is proud to host the first Threat Intelligence Summit as an integral part of VB2018 , which is to take place next week in Montreal, Canada. The Summit is open to anyone attending VB2018 and focuses on all aspects of generating and consuming threat intelligence. The Summit will begin with a keynote from…