Tag: guest blog

  • Responsible madness?

    The debate on responsible disclosure is about as old as IT security itself. In a guest post for Virus Bulletin Robert Neumann suggests we need to reconsider a one-size-fits-all solution and instead look for a well-respected independent organization to handle security issues. (All views expressed in this article are the author’s own and do not…

  • Guest blog: Threat intelligence – a unifying force of the future

    In a guest blog post VB2019 Platinum partner Reason Cybersecurity looks to the future of threat intelligence. The advent of the Internet and Internet-enabled technologies not only ushered in the era of cyberattacks, but it also influenced the development of complex systems that are frustratingly and increasingly difficult to secure and protect against these attacks.…

  • Guest blog: Why we should be paying more attention to Linux threats

    In a guest blog post VB2019 Silver partner Intezer outlines the importance of paying more attention to Linux threats. In a previous blog post written for the Retail and Hospitality Information Sharing and Analysis Center (RH-ISAC), we discussed the emergence of Linux -based threats. This threat ecosystem is heavily concentrated with financially driven cryptominers and…

  • Guest blog: TotalAV uncovers the world’s first ransomware

    In a guest blog post by VB2019 Silver partner TotalAV , Matthew Curd, the software’s Technical Expert, considers the changes in the cybersecurity landscape. Rediscovered in an old storage box amongst a collection of old magazines, a five-and-a-quarter-inch floppy was brought into the Protected.net office in late June – dated 1989. The disk, older than…

  • Guest blog: Targeted attacks with public tools

    Over the last few years, SE Labs has tested more than 50 different security products against over 5,000 targeted attacks. In this guest blog post Stefan Dumitrascu, Chief Technical Officer at SE Labs, looks at the different attack tools available, how effective they are at helping attackers bypass anti-malware products, and how security vendors have…

  • Guest blog: Nemucod ransomware analysis

    In the run up to VB2016 , we invited the sponsors of the conference to write guest posts for our blog. In the third of this series, Webroot’s Jesse Lopez writes about the Nemucod ransomware. Note: some security vendors refer to the downloader component alone (which has been seen to download other kinds of malware as well) as ‘Nemucod’.…

  • Guest blog: Nemucod ransomware analysis

    In the run up to VB2016 , we invited the sponsors of the conference to write guest posts for our blog. In the third of this series, Webroot’s Jesse Lopez writes about the Nemucod ransomware. Note: some security vendors refer to the downloader component alone (which has been seen to download other kinds of malware as well) as ‘Nemucod’.…

  • Guest blog: Espionage toolkit uncovered targeting Central and Eastern Europe

    In the run up to VB2016 , we invited the conference sponsors to write guest posts for our blog. In the first of this series, ESET writes about the SBDH toolkit. Over the course of the last year, ESET has detected and analysed several instances of malware used for targeted espionage – dubbed the SBDH…

  • Guest blog: Espionage toolkit uncovered targeting Central and Eastern Europe

    In the run up to VB2016 , we invited the conference sponsors to write guest posts for our blog. In the first of this series, ESET writes about the SBDH toolkit. Over the course of the last year, ESET has detected and analysed several instances of malware used for targeted espionage – dubbed the SBDH…