Tag: vb2018

  • VB2018 preview: Wipers in the wild

    Some of the earliest computer viruses deleted data and sometimes even rendered computers unusable. But as malware increasingly became a tool used for criminal or (geo)political purposes, its focus shifted to stealing data and using the resources of the compromised machines. However, there has recently been a trend of APT campaigns including a ‘wiper’ functionality…

  • VB2018 preview: Wipers in the wild

    Some of the earliest computer viruses deleted data and sometimes even rendered computers unusable. But as malware increasingly became a tool used for criminal or (geo)political purposes, its focus shifted to stealing data and using the resources of the compromised machines. However, there has recently been a trend of APT campaigns including a ‘wiper’ functionality…

  • VB2018 preview: IoT botnets

    For a long time IoT-botnets were just one of those things security professionals warned about. Then, with the appearance of Mirai in 2016, they became a reality. Mirai’s success in performing DDoS attacks, combined with the leak of the botnet’s source code, has led to a great many descendants, some of which stay closer to…

  • VB2018 preview: IoT botnets

    For a long time IoT-botnets were just one of those things security professionals warned about. Then, with the appearance of Mirai in 2016, they became a reality. Mirai’s success in performing DDoS attacks, combined with the leak of the botnet’s source code, has led to a great many descendants, some of which stay closer to…

  • VB2018: last-minute talks announced

    With a little over three weeks to go until the start of VB2018 , 28th Virus Bulletin Conference, we are excited to announce ten last-minute talks that cover hot research. Nation-state & cyber espionage attacks Nation-state attacks and cyber espionage continue to be hot topics in cybersecurity, and this is reflected in several last-minute papers.…

  • VB2018: last-minute talks announced

    With a little over three weeks to go until the start of VB2018 , 28th Virus Bulletin Conference, we are excited to announce ten last-minute talks that cover hot research. Nation-state & cyber espionage attacks Nation-state attacks and cyber espionage continue to be hot topics in cybersecurity, and this is reflected in several last-minute papers.…

  • VB2018 preview: Since the hacking of Sony Pictures

    Yesterday, the US Justice Department brought charges against an alleged hacker for the North Korean government. The man, Park Jin Hyok, is accused of being connected with the 2014 Sony Pictures Entertainment hack, as well as the 2017 WannaCry worm and various hacks of banks through the SWIFT system. Though charges against individuals linked to…

  • VB2018 preview: Since the hacking of Sony Pictures

    Yesterday, the US Justice Department brought charges against an alleged hacker for the North Korean government. The man, Park Jin Hyok, is accused of being connected with the 2014 Sony Pictures Entertainment hack, as well as the 2017 WannaCry worm and various hacks of banks through the SWIFT system. Though charges against individuals linked to…

  • Virus Bulletin announces programme of the first International Threat Intelligence Summit

    Today, we are excited to announce the programme of the first International Threat Intelligence Summit, which will form an integral part of the VB2018 conference programme. Most of the people attending Virus Bulletin conferences work in roles that involve threat intelligence, whether it is to generate such data, to share with others, or to use…

  • Virus Bulletin announces programme of the first International Threat Intelligence Summit

    Today, we are excited to announce the programme of the first International Threat Intelligence Summit, which will form an integral part of the VB2018 conference programme. Most of the people attending Virus Bulletin conferences work in roles that involve threat intelligence, whether it is to generate such data, to share with others, or to use…