Source: virusbulletin.com

Necurs update reminds us that the botnet cannot be ignored

Necurs update reminds us that the botnet cannot be ignored

EternalBlue: a prominent threat actor of 2017–2018

EternalBlue: a prominent threat actor of 2017–2018

Patch early, patch often, but don't blindly trust every 'patch'

Patch early, patch often, but don't blindly trust every 'patch'

The life story of an IPT – Inept Persistent Threat actor

The life story of an IPT – Inept Persistent Threat actor

Using Mailchimp makes malware campaigns a little bit more successful

Using Mailchimp makes malware campaigns a little bit more successful

There are lessons to be learned from government websites serving cryptocurrency miners

There are lessons to be learned from government websites serving cryptocurrency miners

New paper: A review of the evolution of Andromeda over the years

New paper: A review of the evolution of Andromeda over the years

Firefox 59 to make it a lot harder to use data URIs in phishing attacks

Firefox 59 to make it a lot harder to use data URIs in phishing attacks

Ebury and Mayhem server malware families still active

Ebury and Mayhem server malware families still active

Crypton – exposing malware's deepest secrets

Crypton – exposing malware's deepest secrets

Transparency is essential when monitoring your users' activities

Transparency is essential when monitoring your users' activities

Three questions to ask about security product bypasses

Three questions to ask about security product bypasses

ROPEMAKER email exploit is of limited practical use

ROPEMAKER email exploit is of limited practical use

Let's not help attackers by spreading fear, uncertainty and doubt

Let's not help attackers by spreading fear, uncertainty and doubt

Microsoft Office Vulnerabilities: Is CVE-2017-0199 the New CVE-2012-0158?

Microsoft Office Vulnerabilities: Is CVE-2017-0199 the New CVE-2012-0158?

Spam: A Shadow History of the Internet. Reviewing the Book

Spam: A Shadow History of the Internet. Reviewing the Book