Mindblown: a blog about philosophy.

  • VB2019 paper: Geost botnet. The story of the discovery of a new Android banking trojan from an OpSec error

    OpSec mistakes are what lead to many malware discoveries, but in the case of the Geost Android botnet the mistake was a really interesting one: its operators were using another botnet, HtBot, to manage infected devices, not realising that researchers were analysing some HtBot-infected hosts. This led researchers Sebastian García, Maria Jose Erquiaga and Anna…

  • Analysis of malware responsible for sextortion spam that mines for Monero on the side

    Reason Cybersecurity was one of the Platinum partners of VB2019 . After a guest blog post published earlier this month, their researchers have written an analysis of malware they call ‘Save Yourself’. The malware is responsible for sending a large number of spam emails part of a sextortion campaign, where the goal is to trick…

  • Guest blog: Threat intelligence – a unifying force of the future

    In a guest blog post VB2019 Platinum partner Reason Cybersecurity looks to the future of threat intelligence. The advent of the Internet and Internet-enabled technologies not only ushered in the era of cyberattacks, but it also influenced the development of complex systems that are frustratingly and increasingly difficult to secure and protect against these attacks.…

  • Guest blog: Why we should be paying more attention to Linux threats

    In a guest blog post VB2019 Silver partner Intezer outlines the importance of paying more attention to Linux threats. In a previous blog post written for the Retail and Hospitality Information Sharing and Analysis Center (RH-ISAC), we discussed the emergence of Linux -based threats. This threat ecosystem is heavily concentrated with financially driven cryptominers and…

  • New Emotet spam campaign continues to bypass email security products

    Following the resumption of activity by Emotet’s C&C servers in August, it was only a matter of time before the botnet started sending out spam again. This did indeed happen on Monday morning. Many, though not all, of the emails Emotet sent out this week used a trick that the malware has used before :…

  • Book review: Cyberdanger: Understanding and Guarding Against Cybercrime

    Security researcher Paul Baccas reviews ‘Cyberdanger: Understanding and Guarding Against Cybercrime’ by Eddy Willems Title: Cyberdanger: Understanding and Guarding Against Cybercrime Author: Eddy Willems Publisher: Springer ISBN-10: 3030045307 ISBN-13: 978-3030045302 This was a difficult book to review for two reasons – first, because I know Eddy from the conference circuit, and second, because it was…

  • Programme for VB2019 Threat Intelligence Practitioners’ Summit announced

    In its almost 30-year history, the Virus Bulletin Conference has evolved to become perhaps the most international threat intelligence event of the year. This is yet again reflected on this year’s conference programme, which features speakers from around the globe who will come to London to discuss the latest threats and the tools to analyse…

  • Guest blog: TotalAV uncovers the world’s first ransomware

    In a guest blog post by VB2019 Silver partner TotalAV , Matthew Curd, the software’s Technical Expert, considers the changes in the cybersecurity landscape. Rediscovered in an old storage box amongst a collection of old magazines, a five-and-a-quarter-inch floppy was brought into the Protected.net office in late June – dated 1989. The disk, older than…

  • Guest blog: Targeted attacks with public tools

    Over the last few years, SE Labs has tested more than 50 different security products against over 5,000 targeted attacks. In this guest blog post Stefan Dumitrascu, Chief Technical Officer at SE Labs, looks at the different attack tools available, how effective they are at helping attackers bypass anti-malware products, and how security vendors have…

  • VB2019 preview: Small Talks

    Those who attend security conferences know the importance of ‘hallcon’: the conversations that take place in the corridors in between sessions or sometimes between people who have sneaked out of the talks. Hallcon has long been an important part of the Virus Bulletin Conference and four years ago we formalised this by setting up a…

Got any book recommendations?