35 years of Virus Bulletin Conferences 🌐

What’s your VB count?
Where did your journey start?

Next stop: Seville | 14–16 October 2026 πŸ‡ͺπŸ‡Έ
➑️ https://www.virusbulletin.com/conference/vb2026/

#VirusBulletin #VB2026 #VBConference #CyberSecurity #InfoSec

Having recently returned from a trip to #Germany, where I spoke at #VirusBulletin, I have become more familiar with the appearance of some German government operated websites.

The Bundeszentralamt fΓΌr Steuern (or BZSt), Germany's federal tax authority, is also represented in these #TaxScam #phishing pages.

Bizarrely, #LoggerEIO have decided to clone the template of one of the US-themed versions of the #smishing page which prominently features a banner image of a US form #1040 #tax return, and the corner of a $20 bill, neither of which (I suspect) the #BZSt use for tax filing in that country.

Whoopsie! Or, as my German friends might say, Hoppla!

/4

#smishing #phishing #netcraft #NetcraftConfirmsIt #Oops

I look forward to seeing you all in #Berlin for #VirusBulletin #VB2025 on Thursday, where I will be giving a talk about #phishing, #quishing, #smishing, and making a modest proposal about how cooperation and a bit of working together could make this a crime that is impossible to accomplish.

Been a while since I posted here. I've been trying to spend time off of social media because, even here in this less-toxic social space, it seems like an activity that does not bring me joy, but fills me with dread.

https://www.virusbulletin.com/conference/vb2025/abstracts/tips-smashing-smishing-quashing-quishing/

Virus Bulletin :: TIPS: Smashing smishing by quashing quishing

VB2025 TIPS presentation: Smashing smishing by quashing quishing, Andrew Brandt

Reviewing 2022 KA SAT incident & implications for distributed communication environments by @jfslowik

https://www.youtube.com/watch?v=0a-qza6YSZA

#virusbulletin #virus #malware #kasat #sandworm

Reviewing 2022 KA SAT incident & implications for distributed communication environments -Joe Slowik

YouTube

For those who don't know (which is most of you), this project has been the intense focus of my work, taking up a huge amount of my time, energy, and investigative effort for the past 14 months - while still helping others at Sophos publish their research; running an election campaign where I was a candidate for school board; speaking at Blue Hat, @defcon #Saintcon, #VirusBulletin and other conferences; guest lecturing to classes at CU Boulder; volunteering my time canvassing for political candidates; serving as a docent at the @mediaarchaeologylab; working as a poll worker during the current US election cycle; and starting up the Elect More Hackers (electmorehackers.com) organization.

Whew. It's actually kind of daunting just to read that. I also sometimes sleep and eat.

@SophosXOps has been, at its core, an institution that values radical transparency, and this story (and the earlier research investigations into the Operation Pacific Rim threat actors and incidents) demonstrates Sophos' commitment to truth and journalistic integrity, following a story wherever it leads.

I hope our publication today starts a larger conversation and collaboration within the cybersecurity industry - inside and outside the Cyber Threat Alliance, which Sophos actively supports and where I am proud to represent my employer - to work together to thwart the ambitions of nation-state threat actors such as the perpetrators of Operation Pacific Rim, in order to protect the privacy and safety of everyone, everywhere.

#PacificRim #OperationPacificRim #malware #china #hacking #hacks #infosec #firewalls #intrusiondetection

https://www.sophos.com/en-us/content/pacific-rim

Sophos' Pacific Rim: Defense Against Nation-state Hackers

Discover Sophos' Pacific Rim defense against nation-state / Chinese hackers Volt Typhoon, APT31, and APT41 targeting critical infrastructure.

SOPHOS
Virus Bulletin Final Highlights

Yesterday was the third and final day of the 34th Virus Bulletin Conference in Dublin, Ireland. It was a great three-day conference packed with very insightful talks.

I had an amazing time at my first in-person @VirusBulletin conference in Dublin. Great, inspiring talks and really friendly and interesting attendees!

Now on the way back to Copenhagen via Amsterdam with my pockets full of stroopwafels! πŸ˜‹

#virusbulletin

Here is a summary of some of my favorite talks during the second day at Virus Bulletin. And there is another full day of talks tomorrow, exciting! #VB2024 #VirusBulletin #Cybersecurity

https://www.linkedin.com/pulse/virus-bulletin-2024-day-ii-veronica-valeros-vl5zf/

Virus Bulletin 2024 - Day II

The second day of the 34th edition of the Virus Bulletin Conference in Dublin was packed with great talks! It was one of those days when it was actually hard to decide which room to go to, as many good talks were happening simultaneously. Here are only four talks from today, and please know that I a

My @SophosXOps colleagues Gabor Szappanos and Steeve Gaudreault are starting their presentation about an investigation into a #malware that used Sophos information in its properties sheet, in the Green room at #VB2024 #VirusBulletin
Next week I will be at @VirusBulletin Dublin spreading the word about UPNP dangers with my paper "Open By Default"
If you are there come over and say hello :)
https://www.virusbulletin.com/conference/vb2024/abstracts/open-default-hidden-cost-convenience-network-security/
#VB2024 #VirusBulletin #Dublin
Virus Bulletin :: Open by default: the hidden cost of convenience in network security

VB2024 paper: Open by default: the hidden cost of convenience in network security, Aurelio Picon