Tag: vb2017

  • VB2017 video: Turning Trickbot: decoding an encrypted command-and-control channel

    Trickbot, first reported a year ago by Malwarebytes researcher Jérôme Segura as the successor of Dyre/Dyreza, has become perhaps the most important banking trojan of 2017. It is known for its regular updates, with its use of SMB for lateral movement particularly noteworthy. Symantec ‘s Director of Threat Research Andrew Brandt is one of many…

  • VB2017 video: Turning Trickbot: decoding an encrypted command-and-control channel

    Trickbot, first reported a year ago by Malwarebytes researcher Jérôme Segura as the successor of Dyre/Dyreza, has become perhaps the most important banking trojan of 2017. It is known for its regular updates, with its use of SMB for lateral movement particularly noteworthy. Symantec ‘s Director of Threat Research Andrew Brandt is one of many…

  • Paper: FAME – Friendly Malware Analysis Framework

    As someone who spends most of his time talking to people who work for security vendors, I am always impressed by the amount of security research that takes place in the real world, at companies and organizations large enough to have teams dedicated to analysing the threats they are facing. One such company is the…

  • Paper: FAME – Friendly Malware Analysis Framework

    As someone who spends most of his time talking to people who work for security vendors, I am always impressed by the amount of security research that takes place in the real world, at companies and organizations large enough to have teams dedicated to analysing the threats they are facing. One such company is the…

  • VB2017 paper: Crypton – exposing malware’s deepest secrets

    Computer scientists are notorious for a specific kind of laziness: the kind of laziness that makes them work really hard in order to avoid some other, often more boring, hard work. Crypton , a tool developed by F5 Networks researchers Julia Karpin and Anna Dorfman, is a great example of that: it aims to speed…

  • VB2017 paper: Crypton – exposing malware’s deepest secrets

    Computer scientists are notorious for a specific kind of laziness: the kind of laziness that makes them work really hard in order to avoid some other, often more boring, hard work. Crypton , a tool developed by F5 Networks researchers Julia Karpin and Anna Dorfman, is a great example of that: it aims to speed…

  • Gábor Szappanos wins fourth Péter Szőr Award

    Every year, during the Virus Bulletin Conference gala dinner, we celebrate the life and works of Péter Szőr, the brilliant security researcher who passed away so sadly in 2013. We do so by recognizing a great piece of technical security research with the Péter Szőr Award. This year, we received many nominations, which we narrowed down…

  • Gábor Szappanos wins fourth Péter Szőr Award

    Every year, during the Virus Bulletin Conference gala dinner, we celebrate the life and works of Péter Szőr, the brilliant security researcher who passed away so sadly in 2013. We do so by recognizing a great piece of technical security research with the Péter Szőr Award. This year, we received many nominations, which we narrowed down…

  • Didn’t come to VB2017? Tell us why!

    Last week, hundreds of security researchers from around the world gathered in Madrid for VB2017 , the 27th Virus Bulletin International Conference. Every year, we ask those attending the conference to fill in a survey to help us understand what they liked and what they didn’t like about the event, and to hear their suggestions…

  • Didn’t come to VB2017? Tell us why!

    Last week, hundreds of security researchers from around the world gathered in Madrid for VB2017 , the 27th Virus Bulletin International Conference. Every year, we ask those attending the conference to fill in a survey to help us understand what they liked and what they didn’t like about the event, and to hear their suggestions…