Tag: conference

  • The VB2019 CFP – how the selection procedure works

    Last week, we opened the call for papers for VB2019 , which is to take place 2-4 October in London, UK. The deadline for the call for papers is Sunday 17 March . We are often asked how the selection procedure works, and since we believe transparency, and since an explanation of what we are…

  • VB2018 paper: From Hacking Team to hacked team to…?

    It is good practice not to mock or laugh at hacking victims. But when the victim is a company that itself is in the business of hacking and has a habit of selling its products and services to governments with dubious human rights records, few could help but smile at the irony. This was the…

  • VB2018 paper: From Hacking Team to hacked team to…?

    It is good practice not to mock or laugh at hacking victims. But when the victim is a company that itself is in the business of hacking and has a habit of selling its products and services to governments with dubious human rights records, few could help but smile at the irony. This was the…

  • VB2019 call for papers – now open!

    The call for papers for VB2019 , the 29th Virus Bulletin International Conference, which will take place in London, UK, 2-4 October 2019, is now open! We welcome submissions on all aspects of digital security, from the very technical to the more general, whether you are an experienced speaker or a first-time presenter, and whether…

  • VB2019 call for papers – now open!

    The call for papers for VB2019 , the 29th Virus Bulletin International Conference, which will take place in London, UK, 2-4 October 2019, is now open! We welcome submissions on all aspects of digital security, from the very technical to the more general, whether you are an experienced speaker or a first-time presenter, and whether…

  • VB2018 paper: Draw me like one of your French APTs – expanding our descriptive palette for cyber threat actors

    IT security research stumbled into the world of nation-state intelligence operations more or less by accident. In a now classic VB2015 paper , Juan Andres Guerrero-Saade discussed this shift from security research to intelligence brokerage and what this implied. Juan Andres has been a regular speaker at the VB conference since then, and has given…

  • VB2018 paper: Draw me like one of your French APTs – expanding our descriptive palette for cyber threat actors

    IT security research stumbled into the world of nation-state intelligence operations more or less by accident. In a now classic VB2015 paper , Juan Andres Guerrero-Saade discussed this shift from security research to intelligence brokerage and what this implied. Juan Andres has been a regular speaker at the VB conference since then, and has given…

  • VB2018 paper: Office bugs on the rise

    A large portion of today’s malware infections use malicious Office documents as a first-stage payload. Typically, the user is tricked into enabling macros or disabling some security protection, after which the next-stage payload is downloaded and executed. However, a different kind of Office malware targets outdated versions of Microsoft Office , which continue to be…

  • VB2018 paper: Office bugs on the rise

    A large portion of today’s malware infections use malicious Office documents as a first-stage payload. Typically, the user is tricked into enabling macros or disabling some security protection, after which the next-stage payload is downloaded and executed. However, a different kind of Office malware targets outdated versions of Microsoft Office , which continue to be…

  • VB2018 video: The Big Bang Theory by APT-C-23

    The APT-C-23 group, which targets users in the Middle East and in particular in the State of Palestine, was named and first reported on by 360 in a Chinese language blog post in early 2013. Its campaigns have since been written about by many security vendors, including Palo Alto and Cisco Talos . Check Point…