Tag: vb2018

  • VB2018 preview: Anatomy of an attack: detecting and defeating CRASHOVERRIDE

    One of the many highlights of last year’s Virus Bulletin Conference was a last-minute paper by ESET researchers Anton Cherepanov and Robert Lipovsky on Industroyer, ‘the first ever malware specifically designed to attack power grids’ and which was behind a December 2016 blackout in Ukraine. This year, the VB2018 conference programme includes a paper by…

  • VB2018 preview: Anatomy of an attack: detecting and defeating CRASHOVERRIDE

    One of the many highlights of last year’s Virus Bulletin Conference was a last-minute paper by ESET researchers Anton Cherepanov and Robert Lipovsky on Industroyer, ‘the first ever malware specifically designed to attack power grids’ and which was behind a December 2016 blackout in Ukraine. This year, the VB2018 conference programme includes a paper by…

  • VB2018 preview: Cyber Threat Alliance

    Last week, the Cyber Threat Alliance (CTA) published a report on the illicit mining of cryptocurrencies. The report is notable for two reasons: first because it is exceptionally good in its analysis of the problem, and secondly (and perhaps not unrelated) because researchers from no fewer than eight security companies contributed to the report. Though the…

  • VB2018 preview: Cyber Threat Alliance

    Last week, the Cyber Threat Alliance (CTA) published a report on the illicit mining of cryptocurrencies. The report is notable for two reasons: first because it is exceptionally good in its analysis of the problem, and secondly (and perhaps not unrelated) because researchers from no fewer than eight security companies contributed to the report. Though the…

  • VB2018 preview: hacking cars

    In recent years, car hacking has evolved from a mostly theoretical research field involving giggling researchers and scared journalists , to one that actually concerns car owners and manufacturers. It is fitting, then, that at VB2018 next month, two papers will be presented on the subject of car hacking. Inbar Raz, Security Architect at Argus…

  • VB2018 preview: hacking cars

    In recent years, car hacking has evolved from a mostly theoretical research field involving giggling researchers and scared journalists , to one that actually concerns car owners and manufacturers. It is fitting, then, that at VB2018 next month, two papers will be presented on the subject of car hacking. Inbar Raz, Security Architect at Argus…

  • Where are all the ‘A’s in APT?

    In a guest blog post by VB2018 gold partner Kaspersky Lab, Costin Raiu, Director of the company’s Global Research and Analysis Team, looks critically at the ‘A’ in APT. A little bit of history In 1994, when I started working in the AV ‘industry’, I remember the excitement of finding and taking apart a sophisticated…

  • Where are all the ‘A’s in APT?

    In a guest blog post by VB2018 gold partner Kaspersky Lab, Costin Raiu, Director of the company’s Global Research and Analysis Team, looks critically at the ‘A’ in APT. A little bit of history In 1994, when I started working in the AV ‘industry’, I remember the excitement of finding and taking apart a sophisticated…

  • VB2018 preview: commercial spyware and its use by governments

    Yesterday, a new report by Citizen Lab looked at NSO Group ‘s Pegasus spyware and its global use. The report is worth a read, for the political implications of the findings, for the interesting methodology used, as well as for the section on the ethics of DNS cache probing. I have long been a fan…

  • VB2018 preview: commercial spyware and its use by governments

    Yesterday, a new report by Citizen Lab looked at NSO Group ‘s Pegasus spyware and its global use. The report is worth a read, for the political implications of the findings, for the interesting methodology used, as well as for the section on the ethics of DNS cache probing. I have long been a fan…