VB2026 Seville 30 Sept - 2 Oct
We are thrilled to officially announce that VB2026 will take place in the vibrant city of Seville, Spain, from 30 September to 2 October 2026.
More details coming soon on the venue, call for papers, sponsorship opportunities, and how to join us.
Can't wait to see you there!
01.10.2025 13:41 โ ๐ 4 ๐ 2 ๐ฌ 0 ๐ 0
In a new Bulletin article, Dr Sarah Gordon calls for a shift not just in how AI systems are secured, but in how we design them, as well as acknowledgement of emotional simulation as a distinct attack vector. www.virusbulletin.com/virusbulleti...
20.08.2025 12:57 โ ๐ 1 ๐ 1 ๐ฌ 0 ๐ 0
Mind map of SocGholish (Operated by TA56) infection chains. The details are complex but explained in more detail on our blog post.
Our team @silentpush just dropped a definitive look at SocGholish (operated by TA569) and the initial access broker ecosystem they are facilitating. Big thanks to past researchers who have worked on SocGholish! We've got details about our visibility @ www.silentpush.com/blog/socghol... ๐๐ป
06.08.2025 19:49 โ ๐ 11 ๐ 5 ๐ฌ 0 ๐ 1
Weaponized PDF leading to rogue ScreenConnect download
Compromised travel agency in Sri Lanka ๐ฑ๐ฐ spreading fake Royal Air Maroc โ๏ธ๐ฒ๐ฆemails with a weaponized PDF ๐ that leads to a rogue ConnectWise ScreenConnect download ๐ฅ
โก๏ธ hunting.abuse.ch/hunt/6890d35...
Payload delivery URL + botnet C2 are hosted at 51.89.204 .89 (StarkRDP ๐ฉ๐ช)
04.08.2025 16:08 โ ๐ 2 ๐ 2 ๐ฌ 0 ๐ 0
CISA has released Thorium, a malware analysis platform
www.cisa.gov/resources-to...
Also on GitHub: github.com/cisagov/thor...
31.07.2025 18:11 โ ๐ 23 ๐ 6 ๐ฌ 1 ๐ 0
Fake gaming website leading to LummaStealer download
We've observed an interesting infection chain โ๏ธ in the wild, starting with #LummaStealer spread through a fake gaming website and resulting in #Latrodectus and #SectopRat ๐ชฒ๐๐
See below for more...
31.07.2025 11:54 โ ๐ 5 ๐ 3 ๐ฌ 1 ๐ 0
Top 5 Reasons Security Companies Are Sending Their Teams to VB2025
Leading security companies are sending their teams to #VB2025, and not without reason.
Research-first content, real-world relevance, and networking that actually helps.
๐ Berlin | 24โ26 Sept
See the top 5 reasons in our blog post ๐ tinyurl.com/26n6t6ye
25.07.2025 12:23 โ ๐ 1 ๐ 1 ๐ฌ 0 ๐ 0
2025-07-15 (Tuesday): Some different IOCs from the #SmartApeSG #ClickFix page today.
warpdrive[.]top <-- domain used for SmartAgeSG injected script and to display ClickFix page.
sos-atlanta[.]com <-- domain from script injected into clipboard and to retrieve #NetSupportRAT malware package
15.07.2025 19:18 โ ๐ 5 ๐ 3 ๐ฌ 0 ๐ 0
A programming fact that still amazes me is that the HTTP header which containers the referring url is called "referer", because the developer spelt "referrer" wrong and the spell checker didn't catch it, so it made it into the official standards and they just never changed it lmao
11.07.2025 05:45 โ ๐ 226 ๐ 28 ๐ฌ 13 ๐ 1
After years of dominance in #ESETโs top #infostealer statistics, the era of #AgentTesla has come to an end. It finished H1 2025 in fourth place, its numbers having decreased by 57%. The reason? It is no longer under active development. 1/4
09.07.2025 12:11 โ ๐ 6 ๐ 6 ๐ฌ 1 ๐ 0
I'm thrilled to be speaking at #VB2025 this September in Berlin! My talk will focus on TAG-124, a widespread traffic distribution system, and its role in the cybercriminal ecosystem, with a particular emphasis on its link to ransomware operations! ๐ tinyurl.com/3hurr52m
16.06.2025 07:14 โ ๐ 20 ๐ 5 ๐ฌ 0 ๐ 0
-CoinMarketCap hacked via animated logo
-White House rejects NSA & CyberCom nomination
-FCC probes US Cyber Trust Mark program
-Cyberattack disrupts Russian animal processing industry
-Iran hacks Albania's capital Tirana
Podcast: risky.biz/RBNEWS441/
Newsletter: news.risky.biz/risky-bullet...
23.06.2025 07:48 โ ๐ 14 ๐ 7 ๐ฌ 2 ๐ 1
HTML source of page from legitimate but compromised site showing SmartApeSG injected script.
Example of a ClickFix-style page caused by the injected SmartApeSG script. A victim must click to get the popup and follow the instructions to paste and run the malicious script.
Traffic from an infection filtered in Wireshark. This shows the NetSupport RAT C2 traffic and StealC v2 traffic.
2025-06-18 (Wed): #SmartApeSG --> #ClickFix lure --> #NetSupportRAT --> #StealCv2
A #pcap of the traffic, the malware/artifacts, and some IOCs are available at www.malware-traffic-analysis.net/2025/06/18/i....
Today's the 12th anniversary of my blog, so I made this post a bit more old school.
19.06.2025 04:23 โ ๐ 11 ๐ 5 ๐ฌ 1 ๐ 0
Thank you Martijn!
19.06.2025 07:23 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
We published the VBSpam Q2 2025 report: All tested solutions demonstrated robust performance, achieving spam catch rates exceeding 90%, underscoring the general maturity of spam detection capabilities.
18.06.2025 10:03 โ ๐ 3 ๐ 2 ๐ฌ 1 ๐ 1
An archive.org snapshot of the LosPollos push monetization affiliate network. The LosPollos ad network incorporates many elements and references from the hit series โBreaking Bad,โ mirroring the fictional โLos Pollos Hermanosโ restaurant chain that served as a money laundering operation for a violent methamphetamine cartel. The LosPollos advertising website invokes characters and themes from the hit show Breaking Bad. In the center is a lego version of the meth cook and main co-star Jesse, standing in front of a what appears to be a meth lab. The logo for LosPollos (upper left) is the image of Gustavo Fring, the fictional chicken restaurant chain owner in the show.
New, by me: A Dark Adtech Empire Fed by Fake CAPTCHAs
Late last year, security researchers made a startling discovery: Kremlin-backed disinformation campaigns were bypassing moderation on social media platforms by leveraging the same malicious advertising [โฆ]
[Original post on infosec.exchange]
12.06.2025 23:52 โ ๐ 10 ๐ 33 ๐ฌ 0 ๐ 0
Official site of the DNS4EU project
Join DNS4EU, an EU initiative providing secure, private, and reliable DNS services for users across Europe. Safeguard your online experience with DNS solutions that prioritise privacy, data protection...
For those of you looking for privacy and security focused European DNA provider then you should look at the @enisa_eu@respublicae.eu supported DNS4EU service that has been recently launched.
#cybersecurity #EU #Privacy #DataSovereignty
www.joindns4.eu
09.06.2025 13:15 โ ๐ 7 ๐ 3 ๐ฌ 0 ๐ 0
View of the Botconf 2025 conference with a large blue screen at the top. Mostly empty seats for now, 5 people can be seen.
These were the last technical tests before the beginning of #Botconf2025...
and we have started with a live broadcast at https://www.youtube.com/BotconfTV
21.05.2025 09:33 โ ๐ 3 ๐ 3 ๐ฌ 0 ๐ 0
And hashtag#Botconf2025 is back online with the second day of our main conference. You can follow many talks live by reaching this link
https://youtube.com/playlist?list=PL8fFmUArVzKjMgBjO4EQ-O_7U8ok3C-06
22.05.2025 07:12 โ ๐ 2 ๐ 5 ๐ฌ 0 ๐ 0
Diagram showing a high-level overview of how hijacked cloud resource domains are used for malicious activities by Hazy Hawk.
Inflobox researchers Jacques Portal & Renรฉe Burton look into Hazy Hawk, an actor that hijacks abandoned cloud resources of high-profile organizations. The hijacked domains are used to host large numbers of URLs that send users to scams & malware via different TDSs. blogs.infoblox.com/threat-intel...
21.05.2025 10:48 โ ๐ 1 ๐ 1 ๐ฌ 0 ๐ 0
Have you ever wanted to read a 215-page report on Doppelganger, the Russian disinformation group? Now's your chance!
mpf.se/psychologica...
18.05.2025 09:57 โ ๐ 156 ๐ 55 ๐ฌ 5 ๐ 4
๐จ The wait is over โ the full program of briefings for the Honeynet Project Workshop 2025 in Prague is now live! ๐
๐ NTK, Prague
๐ June 2โ4, 2025
๐ Register today: prague2025.honeynet.org/program/
#honeynet2025 #cybersecurity #infosec #deception #cyberdeception #TI #TTPs #Malware
14.05.2025 12:59 โ ๐ 5 ๐ 5 ๐ฌ 0 ๐ 0
Did you know?
The VB2025 venue is only a 5-min walk from the Brandenburg Gate.
See you there!
VB2025 Berlin 24-26 Sept 2025
Join us in the heart of Berlin for #VB2025!
The JW Marriott offers premium space, top networking, and is
steps from Tiergarten & the Brandenburg Gate.
More info coming soon!
๐๏ธ 24โ26 Sept 2025
๐JW Marriott Berlin
โก๏ธ tinyurl.com/y95v38wz
#Cybersecurity #Berlin
16.04.2025 13:00 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0
Logo VIGINUM + Analyse du mode opรฉratoire informationnel russe Storm-1516
VIGINUM publie un rapport sur les activitรฉs de Storm-1516, un mode opรฉratoire informationnel russe susceptible dโaffecter le dรฉbat public francophone et europรฉen.
Ce rapport s'appuie sur l'analyse de 77 opรฉrations informationnelles conduites par Storm-1516 โก๏ธ www.sgdsn.gouv.fr/publications...
07.05.2025 08:22 โ ๐ 96 ๐ 67 ๐ฌ 2 ๐ 24
Thank you!
07.05.2025 09:05 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
VB2025 programme is live
Three days. Many voices. One Berlin.
VB2025 Berlin 24-26 September 2025
The wait is over: The VB2025 programme is here.
Three days of bold ideas, sharp minds, and real-world security insight.
๐ Tickets? Coming very soon.
๐๏ธ 24โ26 September 2025
๐JW Marriott Hotel, Berlin
๐ www.virusbulletin.com/conference/v...
#VB2025 #Cybersecurity #Infosec #Berlin
02.05.2025 13:37 โ ๐ 4 ๐ 2 ๐ฌ 0 ๐ 0
YouTube video by MalwareAnalysisForHedgehogs
Malware Analysis - Virut, a polymorphic file infector
๐ฆ ๐นNew Video: Analysis of Virut - Part I
โก๏ธ self-modifying code
โก๏ธ Ghidra markup decryption stub
โก๏ธ API resolving
โก๏ธ unpacking
#MalwareAnalysisForHedgehogs
www.youtube.com/watch?v=250B...
30.04.2025 14:04 โ ๐ 3 ๐ 2 ๐ฌ 0 ๐ 0
๐ LโANSSI et ses partenaires du Centre de Coordination des Crises #Cyber ont observรฉ le ciblage et la compromission dโentitรฉs franรงaises par le mode opรฉratoire dโattaque (MOA) APT28, attribuรฉ publiquement par lโUnion Europรฉenne ร la Russie.
๐ร lire ici : www.cert.ssi.gouv.fr/cti/CERTFR-2...
29.04.2025 13:10 โ ๐ 30 ๐ 29 ๐ฌ 1 ๐ 1
Flow chart showing the Morphing Meerkat attack chain.
An Infoblox report looks into a DNS technique used to tailor content to victims. A phishing kit developed by the Morphing Meerkat actor creatively employs DNS mail exchange (MX) records to dynamically serve fake, tailored login pages, spoofing over 100 brands. blogs.infoblox.com/threat-intel...
03.04.2025 09:54 โ ๐ 4 ๐ 1 ๐ฌ 0 ๐ 0
Independent EU-focused NGO whose mission is to raise awareness on #disinformation & contribute to a better information landscape.
We pioneered algorithm analysis and deploy expert skills to probe the digital space and its actors.
https://checkfirst.network
The Internet's Observatory: Tracking cybersecurity and digital governance โข connectivity and democracy โข tools and policy for change โข https://netblocks.org
โงโห โ
Indie Comfy VTuber
โนห. Employed Threat Intel Researcher
โกโงโห SynthV-P-wannabe
๐จ: @jamama666.bsky.social / @MomoiroKohi / @justNovaj
๐๏ธ: #artsyaz
๐ฆ: x.com/azakasekai_
https://links.azaka.fun
Senior security researcher and reverse engineer @Intezer
Security Researcher at FFRI Security, Inc.
Working on macOS security
Small farmer, ex-farm worker, crop scientist. Here to talk food, farms, & money.
patreon.com/farmtotaber
This account is owned by Spamhaus Project but it is not currently active. Check out our LinkedIn, Twitter and Mastodon feeds to stay up-to-date.
We are the National Cyber Security Centre โ part of the UKโs intelligence & cyber agency GCHQ. We help to make the UK the safest place to live and work online.
Threat Researcher @ Proofpoint | Views are my own.
Hunt & Response @ Huntress
Author of Constructing Defense
๐จ๐ฆ
Director, Global Field CISO at Sophos, frequent speaker and press go to. Said opinions are mine, not the company.
Co-host of the Security Take(s) Two [โฆ]
[bridged from https://securitycafe.ca/@chetwisniewski on the fediverse by https://fed.brid.gy/ ]
Malware Stuff @ Proofpoint
Researcher for cybersecurity policy + emerging tech, @swp-berlin.org.
Current main focus: Managing military software supply chains risk.
Also: Cyber diplomacy.
Author of "Building Bridges in Cyber Diplomacy" (2024). She/her.
NorthSec โ A community-run cybersecurity event offering world-class talks, trainings & a 48-hour, on-site capture-the-flag competition. Every May in Montrรฉal since 2013 ๐จ๐ฆ Publications en franรงais et en anglais.
https://nsec.io/
Weโre determined to make organizations secure against cyber threats and confident in their readiness.
We are the Threat Intelligence and Malware Analysis team of
@sentinelone.com
https://sentinellabs.com
https://labscon.io
macOS Detection Engineer at SentinelOne.
Offensive Security, Malware, Reverse Engineering and Apple Security.
Opinions are my own.
https://syrion.me
now available as a browser extension