- Analysis of malware responsible for sextortion spam that mines for Monero on the side
VB2019 Platinum partner Reason Cybersecurity presents a threat analysis report on the Save Yourself malware.
- Guest blog: Threat intelligence – a unifying force of the future
In a guest blog post VB2019 Platinum partner Reason Cybersecurity looks to the future of threat intelligence.
- Guest blog: Why we should be paying more attention to Linux threats
In a guest blog post VB2019 Silver partner Intezer outlines the importance of paying attention to Linux threats.
- New Emotet spam campaign continues to bypass email security products
On Monday, the infamous Emotet malware resumed its spam campaign to spread the latest version of the malware. As before, the malware successfully bypasses many email security products.
- Book review: Cyberdanger: Understanding and Guarding Against Cybercrime
Security researcher Paul Baccas reviews Eddy Willems' book 'Cyberdanger'.
- Programme for VB2019 Threat Intelligence Practitioners' Summit announced
In the mini-summit, which forms part of VB2019 (the 29th Virus Bulletin International Conference), eight sessions will focus on all aspects of threat intelligence collecting, using and sharing.
- Guest blog: TotalAV uncovers the world’s first ransomware
In a guest blog post by VB2019 Silver partner TotalAV, Matthew Curd, the software’s Technical Expert, considers the changes in the cybersecurity landscape.
- Guest blog: Targeted attacks with public tools
Over the last few years SE Labs has tested more than 50 different security products against over 5,000 targeted attacks. In this guest blog post Stefan Dumitrascu, Chief Technical Officer at SE Labs, looks at the different attack tools available, how effective they are at helping attackers bypass anti-malware products, and how security vendors have been handling this type of threat for over a year.
- VB2019 preview: Small Talks
We preview the five Small Talks on the VB2019 programme in which important topics are discussed in a less formal atmosphere.
- VB2019 preview: Problem child: common patterns in malicious parent-child relationships
We preview the VB2019 paper by Endgame researcher Bobby Filar, who created a graph-based framework designed to detect malicious use of legitimate binaries through parent-child relationships.