Tag: conference
-
VB2018 video: Adware is just malware with a legal department – how we reverse engineered OSX/Pirrit, received legal threats, and survived
OSX/Pirrit was first analysed in 2016 by Cybereason ‘s Amit Serper in a guest blog post for the Objective See blog. It is an interesting and technically thorough analysis of a piece of adware that, as is not uncommon, uses techniques borrowed from malware. Pirrit appears as an unsigned executable inside an app bundle, source:…
-
VB2018 paper: Anatomy of an attack: detecting and defeating CRASHOVERRIDE
At VB2017 in Madrid, ESET researchers Anton Cherepanov and Robert Lipovsky presented a last-minute paper on Industroyer, a malware framework that was responsible for the December 2016 blackout in Ukraine. The attack was perhaps less noteworthy for what it achieved (a relatively short blackout) than for the potential it signalled. Such was the premise of…
-
VB2018 paper: Anatomy of an attack: detecting and defeating CRASHOVERRIDE
At VB2017 in Madrid, ESET researchers Anton Cherepanov and Robert Lipovsky presented a last-minute paper on Industroyer, a malware framework that was responsible for the December 2016 blackout in Ukraine. The attack was perhaps less noteworthy for what it achieved (a relatively short blackout) than for the potential it signalled. Such was the premise of…
-
VB2018 presentation: Levelling up: why sharing threat intelligence makes you more competitive
Here at VB we often talk about the importance of sharing intelligence, and many of us coming into the industry for the first time have been genuinely surprised by the willingness to share information among competitors. Yet even within this relatively open industry, there are still barriers to sharing threat intelligence data, be they technical,…
-
VB2018 presentation: Levelling up: why sharing threat intelligence makes you more competitive
Here at VB we often talk about the importance of sharing intelligence, and many of us coming into the industry for the first time have been genuinely surprised by the willingness to share information among competitors. Yet even within this relatively open industry, there are still barriers to sharing threat intelligence data, be they technical,…
-
VB2018 paper: The modality of mortality in domain names
The current generation of security professionals is probably more familiar with the way DNS works than they are with phone books, which are still often used as an analogy to explain DNS. Domains play a crucial role in most cyber attacks, from the very advanced to the very mundane; being able to take down or…
-
VB2018 paper: The modality of mortality in domain names
The current generation of security professionals is probably more familiar with the way DNS works than they are with phone books, which are still often used as an analogy to explain DNS. Domains play a crucial role in most cyber attacks, from the very advanced to the very mundane; being able to take down or…
-
VB2018 paper: Analysing compiled binaries using logic
Static analysis of malware is usually “done by a person (a security analyst) who will stare at one binary code for hours, searching for patterns – the signatures,” writes Thaís Moreira Hamasaki in her VB2018 paper. To make the analysis process faster and more effective, analysts tend to use various tools and techniques. One lesser…
-
VB2018 paper: Analysing compiled binaries using logic
Static analysis of malware is usually “done by a person (a security analyst) who will stare at one binary code for hours, searching for patterns – the signatures,” writes Thaís Moreira Hamasaki in her VB2018 paper. To make the analysis process faster and more effective, analysts tend to use various tools and techniques. One lesser…
-
Virus Bulletin encourages experienced speakers and newcomers alike to submit proposals for VB2019
There is a little less than a month left until the deadline (17 March) of the call for papers for VB2019 , the 29th Virus Bulletin International Conference. Over almost three decades, the Virus Bulletin Conference has built a reputation as a conference that produces solid content. Some take this to mean that we are…