<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>virus bulletin &#8211; Martijn Grooten</title>
	<atom:link href="/tag/virus-bulletin/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Lapsed Ordinary</description>
	<lastBuildDate>Tue, 10 Jul 2018 12:00:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Malware authors&#039; continued use of stolen certificates isn&#039;t all bad news</title>
		<link>/2018/07/10/malware-authors-continued-use-of-stolen-certificates-isnt-all-bad-news/</link>
					<comments>/2018/07/10/malware-authors-continued-use-of-stolen-certificates-isnt-all-bad-news/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Tue, 10 Jul 2018 12:00:55 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[blacktech]]></category>
		<category><![CDATA[certificate]]></category>
		<category><![CDATA[code-signing]]></category>
		<category><![CDATA[eset]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[plead]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=484</guid>

					<description><![CDATA[A new malware campaign that uses two stolen code-signing certificates shows that such certificates continue to be popular among malware authors. But there is a positive side to malware authors&#8217; use of stolen certificates. More on Virus Bulletin’s blog.]]></description>
										<content:encoded><![CDATA[<p>A new malware campaign that uses two stolen code-signing certificates shows that such certificates continue to be popular among malware authors. But there is a positive side to malware authors&#8217; use of stolen certificates.<br />
More on <a href="https://www.virusbulletin.com/blog/2018/07/malware-authors-continued-use-stolen-certificates-not-only-bad-news/">Virus Bulletin’s blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/07/10/malware-authors-continued-use-of-stolen-certificates-isnt-all-bad-news/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Necurs update reminds us that the botnet cannot be ignored</title>
		<link>/2018/07/06/necurs-update-reminds-us-that-the-botnet-cannot-be-ignored/</link>
					<comments>/2018/07/06/necurs-update-reminds-us-that-the-botnet-cannot-be-ignored/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Fri, 06 Jul 2018 12:00:47 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[c&c]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[necurs]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[trend micro]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=479</guid>

					<description><![CDATA[The operators of the Necurs botnet, best known for being one of the most prolific spam botnets of the past few years, have pushed out updates to its client, which provide some important lessons about why malware infections matter. More on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>The operators of the Necurs botnet, best known for being one of the most prolific spam botnets of the past few years, have pushed out updates to its client, which provide some important lessons about why malware infections matter.<br />
More on Virus Bulletin&#8217;s <a href="https://virusbulletin.com/blog/2018/07/necurs-update-reminds-us-botnet-cannot-be-ignored/">blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/07/06/necurs-update-reminds-us-that-the-botnet-cannot-be-ignored/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>We cannot ignore the increased use of IoT in domestic abuse cases</title>
		<link>/2018/06/26/we-cannot-ignore-the-increased-use-of-iot-in-domestic-abuse-cases/</link>
					<comments>/2018/06/26/we-cannot-ignore-the-increased-use-of-iot-in-domestic-abuse-cases/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Tue, 26 Jun 2018 09:39:09 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[domestic abuse]]></category>
		<category><![CDATA[internet of things]]></category>
		<category><![CDATA[iot]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=448</guid>

					<description><![CDATA[The New York Times reports that smart home devices are increasingly used in cases of domestic abuse. Read more on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>The New York Times reports that smart home devices are increasingly used in cases of domestic abuse.<br />
Read more on <a href="https://www.virusbulletin.com/blog/2018/06/we-cannot-ignore-increased-use-iot-domestic-abuse-cases/">Virus Bulletin&#8217;s blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/06/26/we-cannot-ignore-the-increased-use-of-iot-in-domestic-abuse-cases/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Subtle change could see a reduction in installation of malicious Chrome extensions</title>
		<link>/2018/06/13/subtle-change-could-see-a-reduction-in-installation-of-malicious-chrome-extensions/</link>
					<comments>/2018/06/13/subtle-change-could-see-a-reduction-in-installation-of-malicious-chrome-extensions/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Wed, 13 Jun 2018 09:37:02 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[browser]]></category>
		<category><![CDATA[chrome]]></category>
		<category><![CDATA[extension]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=444</guid>

					<description><![CDATA[Google has made a subtle change to its Chrome browser, banning the inline installation of new extensions, thus making it harder for malware authors to trick users into unwittingly installing malicious extensions. Read more on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>Google has made a subtle change to its Chrome browser, banning the inline installation of new extensions, thus making it harder for malware authors to trick users into unwittingly installing malicious extensions.<br />
Read more on <a href="https://www.virusbulletin.com/blog/2018/06/subtle-change-could-see-reduction-installation-malicious-chrome-extensions/">Virus Bulletin&#8217;s blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/06/13/subtle-change-could-see-a-reduction-in-installation-of-malicious-chrome-extensions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Expired domain led to SpamCannibal&#039;s blacklist eating the whole world</title>
		<link>/2018/05/31/expired-domain-led-to-spamcannibals-blacklist-eating-the-whole-world/</link>
					<comments>/2018/05/31/expired-domain-led-to-spamcannibals-blacklist-eating-the-whole-world/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Thu, 31 May 2018 09:36:05 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[blacklist]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[dnsbl]]></category>
		<category><![CDATA[spamcannibal]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=442</guid>

					<description><![CDATA[The domain of the little-used SpamCannibal DNS blacklist had expired, resulting in it effectively listing every single IP address. Read more on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>The domain of the little-used SpamCannibal DNS blacklist had expired, resulting in it effectively listing every single IP address.<br />
Read more on <a href="https://www.virusbulletin.com/blog/2018/05/expired-domain-led-spamcannibal-blacklisting-whole-world/">Virus Bulletin&#8217;s blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/05/31/expired-domain-led-to-spamcannibals-blacklist-eating-the-whole-world/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MnuBot banking trojan communicates via SQL server</title>
		<link>/2018/05/30/mnubot-banking-trojan-communicates-via-sql-server/</link>
					<comments>/2018/05/30/mnubot-banking-trojan-communicates-via-sql-server/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Wed, 30 May 2018 09:34:55 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[banking]]></category>
		<category><![CDATA[brazil]]></category>
		<category><![CDATA[ibm]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[mnubot]]></category>
		<category><![CDATA[sql server]]></category>
		<category><![CDATA[trojan]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<category><![CDATA[x-force]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=440</guid>

					<description><![CDATA[Researchers at IBM X-Force have discovered MnuBot, a banking trojan targeting users in Brazil, which is noteworthy for using SQL Server for command and control communication. Read more on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>Researchers at IBM X-Force have discovered MnuBot, a banking trojan targeting users in Brazil, which is noteworthy for using SQL Server for command and control communication.<br />
Read more on <a href="https://www.virusbulletin.com/blog/2018/05/mnubot-banking-trojan-communicates-sql-server/">Virus Bulletin&#8217;s blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/05/30/mnubot-banking-trojan-communicates-via-sql-server/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>XMRig used in new macOS cryptominer</title>
		<link>/2018/05/23/xmrig-used-in-new-macos-cryptominer/</link>
					<comments>/2018/05/23/xmrig-used-in-new-macos-cryptominer/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Wed, 23 May 2018 09:34:35 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[macos]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[monero]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=438</guid>

					<description><![CDATA[A new piece of cryptocurrency-mining malware on macOS has been found to use the popular XMRig miner. Read more on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>A new piece of cryptocurrency-mining malware on macOS has been found to use the popular XMRig miner.<br />
Read more on <a href="https://www.virusbulletin.com/blog/2018/05/xmrig-used-new-macos-cryptominer/">Virus Bulletin&#8217;s blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/05/23/xmrig-used-in-new-macos-cryptominer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Tendency for DDoS attacks to become less volumetric fits in a wider trend</title>
		<link>/2018/05/22/tendency-for-ddos-attacks-to-become-less-volumetric-fits-in-a-wider-trend/</link>
					<comments>/2018/05/22/tendency-for-ddos-attacks-to-become-less-volumetric-fits-in-a-wider-trend/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Tue, 22 May 2018 09:30:09 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[http]]></category>
		<category><![CDATA[layer 7]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=436</guid>

					<description><![CDATA[CDN provider Cloudflare reports an increase in DDoS attacks targeting layer 7 and focusing on exhausting server resources rather than sending large volumes of data. This fits in a wider trend. Read more on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>CDN provider Cloudflare reports an increase in DDoS attacks targeting layer 7 and focusing on exhausting server resources rather than sending large volumes of data. This fits in a wider trend.<br />
Read more on <a href="https://www.virusbulletin.com/blog/2018/05/tendency-ddos-attacks-become-less-volumetric-fits-wider-trend/">Virus Bulletin&#8217;s blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/05/22/tendency-for-ddos-attacks-to-become-less-volumetric-fits-in-a-wider-trend/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>We are more ready for IPv6 email than we may think</title>
		<link>/2018/05/21/we-are-more-ready-for-ipv6-email-than-we-may-think/</link>
					<comments>/2018/05/21/we-are-more-ready-for-ipv6-email-than-we-may-think/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Mon, 21 May 2018 09:38:11 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[dnsbl]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[ipv6]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=446</guid>

					<description><![CDATA[Though IPv6 is gradually replacing IPv4 on the Internet&#8217;s network layer, email is lagging behind, the difficulty in blocking spam sent over IPv6 cited as a reason not to move. But would we really have such a hard time blocking spam sent over IPv6? Read more on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>Though IPv6 is gradually replacing IPv4 on the Internet&#8217;s network layer, email is lagging behind, the difficulty in blocking spam sent over IPv6 cited as a reason not to move. But would we really have such a hard time blocking spam sent over IPv6?<br />
Read more on <a href="https://www.virusbulletin.com/blog/2018/06/we-are-more-ready-ipv6-email-we-may-think/">Virus Bulletin&#8217;s blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/05/21/we-are-more-ready-for-ipv6-email-than-we-may-think/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hide&#039;n&#039;Seek IoT botnet adds persistence</title>
		<link>/2018/05/09/hidenseek-iot-botnet-adds-persistence/</link>
					<comments>/2018/05/09/hidenseek-iot-botnet-adds-persistence/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Wed, 09 May 2018 09:28:02 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[bitdefender]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[hide'n'seek]]></category>
		<category><![CDATA[internet of things]]></category>
		<category><![CDATA[iot]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=432</guid>

					<description><![CDATA[The Hide&#8217;n&#8217;Seek IoT botnet has received an update to make its infection persist on infected devices beyond a restart. Read more on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>The Hide&#8217;n&#8217;Seek IoT botnet has received an update to make its infection persist on infected devices beyond a restart.<br />
Read more on <a href="https://www.virusbulletin.com/blog/2018/05/hidenseek-iot-botnet-adds-persistence/">Virus Bulletin&#8217;s blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/05/09/hidenseek-iot-botnet-adds-persistence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
