Tag: vb2018

  • VB2018 presentation: The wolf in sheep’s clothing – undressed

    In recent years, we have seen a trend of commercial spyware being sold to governments. This is a very controversial subject, not least because of the frequent use of this spyware against opposition targets. However, there is general agreement that the malware tends in most cases to be well written. There are exceptions though. At…

  • VB2018 presentation: The wolf in sheep’s clothing – undressed

    In recent years, we have seen a trend of commercial spyware being sold to governments. This is a very controversial subject, not least because of the frequent use of this spyware against opposition targets. However, there is general agreement that the malware tends in most cases to be well written. There are exceptions though. At…

  • VB2018 paper: The dark side of WebAssembly

    With this year’s very successful Virus Bulletin Conference (VB2018) now behind us, we plan to continue the tradition of publishing most of the papers and videos of the presentations. We start with ‘The Dark Side of WebAssembly’, a paper by Symantec researchers Aishwarya Lonkar and Siddhesh Chandrayan that was part of the conference proceedings but,…

  • VB2018 paper: The dark side of WebAssembly

    With this year’s very successful Virus Bulletin Conference (VB2018) now behind us, we plan to continue the tradition of publishing most of the papers and videos of the presentations. We start with ‘The Dark Side of WebAssembly’, a paper by Symantec researchers Aishwarya Lonkar and Siddhesh Chandrayan that was part of the conference proceedings but,…

  • VB2018 preview: Workshops

    The Virus Bulletin Conference is first and foremost a place to learn: about new threats, about the tools used to detect and fight them, and to learn about (and get to know) the people that matter in the fast-changing world of threat intelligence and research. This year, you can also learn about some essential techniques…

  • VB2018 preview: Workshops

    The Virus Bulletin Conference is first and foremost a place to learn: about new threats, about the tools used to detect and fight them, and to learn about (and get to know) the people that matter in the fast-changing world of threat intelligence and research. This year, you can also learn about some essential techniques…

  • New article: Through the looking glass: webcam interception and protection in kernel mode

    Today we publish a short article by Ronen Slavin and Michael Maltsev, researchers at Reason Software , one of the partners of VB2018 . In the article, Ronen and Michael dive into the video capturing internals on Windows , and explain how this can be used by a malicious actor to steal images recorded by…

  • VB2018 preview: The botnet landscape – live threats and steps for mitigation (Small Talk)

    Whether they’re used to send spam, to perform DDoS attacks, or as a proxy network for other kinds of nefarious activities, botnets remain a prominent tool for cybercriminals, and thus a main focus for security researchers. One of the organizations that is at the forefront of such research is Spamhaus : its employees and volunteers…

  • New article: Through the looking glass: webcam interception and protection in kernel mode

    Today we publish a short article by Ronen Slavin and Michael Maltsev, researchers at Reason Software , one of the partners of VB2018 . In the article, Ronen and Michael dive into the video capturing internals on Windows , and explain how this can be used by a malicious actor to steal images recorded by…

  • VB2018 preview: The botnet landscape – live threats and steps for mitigation (Small Talk)

    Whether they’re used to send spam, to perform DDoS attacks, or as a proxy network for other kinds of nefarious activities, botnets remain a prominent tool for cybercriminals, and thus a main focus for security researchers. One of the organizations that is at the forefront of such research is Spamhaus : its employees and volunteers…