/VB 1991 Jersey/
|
1991-conferencereport.pdf
|
1.6 MB
|
img001_595.jpg
|
110.3 KB
|
img002_595.jpg
|
116.2 KB
|
img003_595.jpg
|
126.2 KB
|
/VB 1992 Edinburgh/
|
VB92report.pdf
|
2.4 MB
|
/VB 1993 Amsterdam/
|
VB93report.pdf
|
2.1 MB
|
img001_595.jpg
|
150.0 KB
|
img002_595.jpg
|
163.3 KB
|
img003_595.jpg
|
169.0 KB
|
img004_595.jpg
|
170.0 KB
|
img005_595.jpg
|
142.4 KB
|
img006_595.jpg
|
161.6 KB
|
img007_595.jpg
|
153.4 KB
|
img008_595.jpg
|
156.0 KB
|
/VB 2007 Vienna/
|
A different look at the VB2007 Conference in Vienna .mp4
|
9.5 MB
|
/VB 2008 Ottawa/
|
Interview with John Hawes of Virus Bulletin.mp4
|
5.5 MB
|
Interview with John Hawes of Virus Bulletin.srt
|
7.8 KB
|
Security experts answer key questions at Virus Bulletin 2008.mp4
|
4.0 MB
|
Security experts answer key questions at Virus Bulletin 2008.srt
|
4.6 KB
|
/VB 2009 Geneva/
|
The Virus Bulletin yodelling competition.mp4
|
1.8 MB
|
/VB 2010 Vancouver/
|
Costin Raiu on Virus Bulletin 2010.mp4
|
11.9 MB
|
Costin Raiu on Virus Bulletin 2010.srt
|
19.2 KB
|
Stuxnet demo in Virus Bulletin 2010 conference.mp4
|
3.6 MB
|
VB2010 Social Network and Computer Security Panel Discussion.mp4
|
16.3 MB
|
/VB 2012 Dallas/
|
Flashback OS X malware - VB2012 presentation by Broderick Aquilino (F-Secure).mp4
|
30.6 MB
|
Flashback OS X malware - VB2012 presentation by Broderick Aquilino (F-Secure).srt
|
44.6 KB
|
Virus Bulletin 2012 Conference Overview.mp4
|
13.1 MB
|
/VB 2013 Berlin/
|
An automatic analysis and detection tool for Java exploits.mp4
|
34.9 MB
|
An automatic analysis and detection tool for Java exploits.srt
|
42.7 KB
|
Analysis of Android in-app advertisement kits.mp4
|
17.2 MB
|
Analysis of Android in-app advertisement kits.srt
|
46.8 KB
|
Back channels and bitcoins - ZeroAccess' secret C&C communications.mp4
|
14.1 MB
|
Back channels and bitcoins - ZeroAccess' secret C&C communications.srt
|
62.2 KB
|
Hacking Team and Gamma International in 'business-to-government malware'.mp4
|
18.8 MB
|
Hacking Team and Gamma International in 'business-to-government malware'.srt
|
51.0 KB
|
How to test properly - comparative web filter tests.mp4
|
42.8 MB
|
How to test properly - comparative web filter tests.srt
|
57.1 KB
|
Hypervisor-based, hardware-assisted system monitoring.mp4
|
29.9 MB
|
PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file).mp4
|
17.1 MB
|
PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file).srt
|
50.1 KB
|
Statistically effective protection against APT attacks.mp4
|
21.5 MB
|
Statistically effective protection against APT attacks.srt
|
58.9 KB
|
Surviving 0-days - reducing the window of exposure.mp4
|
15.7 MB
|
Surviving 0-days - reducing the window of exposure.srt
|
52.1 KB
|
VB2013 Keynote - Ethics and the AV industry in the age of WikiLeaks.mp4
|
48.6 MB
|
VB2013 Keynote - Ethics and the AV industry in the age of WikiLeaks.srt
|
79.1 KB
|
/VB 2014 Seattle/
|
.NET malware dynamic instrumentation for automated and manual analysis.mp4
|
20.5 MB
|
.NET malware dynamic instrumentation for automated and manual analysis.srt
|
49.3 KB
|
An in-depth analysis of abuse on Twitter.mp4
|
24.1 MB
|
An in-depth analysis of abuse on Twitter.srt
|
48.0 KB
|
Android packer - facing the challenges, building solutions.mp4
|
22.6 MB
|
Android packer - facing the challenges, building solutions.srt
|
50.4 KB
|
Attack points in health apps & wearable devices - how safe is your quantified self.mp4
|
26.0 MB
|
Attack surface analysis of Tizen devices.mp4
|
27.6 MB
|
Attack surface analysis of Tizen devices.srt
|
68.9 KB
|
Back in BlackEnergy - 2014 targeted attacks in the Ukraine and Poland.mp4
|
18.5 MB
|
Back in BlackEnergy - 2014 targeted attacks in the Ukraine and Poland.srt
|
44.9 KB
|
Bootkits - past, present & future.mp4
|
23.1 MB
|
Bootkits - past, present & future.srt
|
48.0 KB
|
Caphaw - the advanced persistent pluginer.mp4
|
20.5 MB
|
Caphaw - the advanced persistent pluginer.srt
|
51.9 KB
|
DMARC - how to use it to improve your email reputation.mp4
|
10.8 MB
|
DNSSEC - how far have we come.mp4
|
16.0 MB
|
Design to discover - security analytics with 3D visualization engine.mp4
|
20.9 MB
|
Design to discover - security analytics with 3D visualization engine.srt
|
52.7 KB
|
Duping the machine - malware strategies, post sandbox detection.mp4
|
17.4 MB
|
Early launch Android malware - your phone is 0wned (demo).mp4
|
2.2 MB
|
Early launch Android malware - your phone is 0wned.mp4
|
2.7 MB
|
Hiding the network behind the network. Botnet proxy business model.mp4
|
19.4 MB
|
Labelling spam through the analysis of protocol patterns.mp4
|
15.3 MB
|
Labelling spam through the analysis of protocol patterns.srt
|
47.4 KB
|
Leaving our ZIP undone - how to abuse ZIP to deliver malware apps.mp4
|
20.7 MB
|
Leaving our ZIP undone - how to abuse ZIP to deliver malware apps.srt
|
58.2 KB
|
Methods of malware persistence on Mac OS X.mp4
|
25.0 MB
|
OPSEC for security researchers.mp4
|
32.0 MB
|
OPSEC for security researchers.srt
|
66.9 KB
|
Optimized mal-ops. Hack the ad network like a boss.mp4
|
21.8 MB
|
P0wned by a barcode - stealing money from offline users.mp4
|
26.4 MB
|
P0wned by a barcode - stealing money from offline users.srt
|
53.1 KB
|
Presentation of the 1st Peter Szor Award.mp4
|
7.1 MB
|
Protecting financial institutions from banking malware's man-in-the-browser attacks.mp4
|
22.8 MB
|
Protecting financial institutions from banking malware's man-in-the-browser attacks.srt
|
41.8 KB
|
Quantifying maliciousness in Alexa top-ranked domains.mp4
|
21.4 MB
|
Quantifying maliciousness in Alexa top-ranked domains.srt
|
65.7 KB
|
Smart home appliance security & malware.mp4
|
33.0 MB
|
Smart home appliance security & malware.srt
|
51.2 KB
|
Sweeping the IP space - the hunt for evil on the Internet.mp4
|
25.2 MB
|
Swipe away, we're watching you.mp4
|
31.8 MB
|
The evolution of webinjects.mp4
|
18.8 MB
|
The evolution of webinjects.srt
|
63.4 KB
|
Unveiling the kernel - rootkit discovery using selective automated kernel memory differencing.mp4
|
23.5 MB
|
Unveiling the kernel - rootkit discovery using selective automated kernel memory differencing.srt
|
68.4 KB
|
We know it before you do - predicting malicious domains.mp4
|
13.5 MB
|
We know it before you do - predicting malicious domains.srt
|
55.9 KB
|
Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists.mp4
|
18.4 MB
|
Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists.srt
|
45.2 KB
|
/VB 2015 Prague/
|
A quantitative examination of the current state of corporate security practices.mp4
|
34.6 MB
|
A quantitative examination of the current state of corporate security practices.srt
|
56.5 KB
|
Android ransomware - turning CryptoLocker into CryptoUnlocker.mp4
|
41.3 MB
|
Anonymity is king.mp4
|
39.3 MB
|
Anonymity is king.srt
|
52.8 KB
|
Attack on the drones - security vulnerabilities of unmanned aerial vehicles.mp4
|
43.1 MB
|
Breaking the bank(er) - automated configuration data extraction for banking malware.mp4
|
38.9 MB
|
Breaking the bank(er) - automated configuration data extraction for banking malware.srt
|
72.8 KB
|
Building a malware lab in the age of Big Data.mp4
|
35.3 MB
|
Building a malware lab in the age of Big Data.srt
|
64.6 KB
|
C&C-as-a-Service - abusing third-party web services as C&C channels.mp4
|
38.7 MB
|
C&C-as-a-Service - abusing third-party web services as C&C channels.srt
|
63.3 KB
|
Can we trust a trustee An in-depth look into the digitally signed malware industry.mp4
|
21.2 MB
|
Can we trust a trustee An in-depth look into the digitally signed malware industry.srt
|
48.8 KB
|
DDoS trojan - a malicious concept that conquered the ELF format.mp4
|
46.7 MB
|
DDoS trojan - a malicious concept that conquered the ELF format.srt
|
56.2 KB
|
Dare 'DEVIL' - beyond your senses with Dex Visualizer.mp4
|
34.5 MB
|
Dare 'DEVIL' - beyond your senses with Dex Visualizer.srt
|
46.4 KB
|
Dead and buried in their crypts - defeating modern ransomware.mp4
|
38.0 MB
|
Dead and buried in their crypts - defeating modern ransomware.srt
|
67.0 KB
|
Digital 'Bian Lian' (face changing) - the skeleton key malware.mp4
|
47.3 MB
|
Digital 'Bian Lian' (face changing) - the skeleton key malware.srt
|
60.4 KB
|
Does prevalence matter Ranking anti-malware products by potential victim impact.mp4
|
37.8 MB
|
Does prevalence matter Ranking anti-malware products by potential victim impact.srt
|
61.7 KB
|
Doing more with less - a study of file-less infection attacks.mp4
|
40.4 MB
|
Doing more with less - a study of file-less infection attacks.srt
|
49.4 KB
|
Economic sanctions on malware.mp4
|
42.6 MB
|
Economic sanctions on malware.srt
|
55.9 KB
|
Effectively testing APT defences.mp4
|
41.1 MB
|
Effectively testing APT defences.srt
|
64.9 KB
|
Evolution of Android exploits from a static analysis tools perspective.mp4
|
18.8 MB
|
Evolution of Android exploits from a static analysis tools perspective.srt
|
47.6 KB
|
From Asia with love Smartphones with pre-installed malware.mp4
|
41.9 MB
|
From Asia with love Smartphones with pre-installed malware.srt
|
52.5 KB
|
How they're getting the data out of your network.mp4
|
9.3 MB
|
How they're getting the data out of your network.srt
|
24.0 KB
|
It has a EULA, it must be legit.mp4
|
18.2 MB
|
It's a file infector... it's ransomware... it's Virlock.mp4
|
44.2 MB
|
It's a file infector... it's ransomware... it's Virlock.srt
|
42.1 KB
|
Keynote address - One man's anti-malware researcher is....mp4
|
57.8 MB
|
Keynote address - One man's anti-malware researcher is....srt
|
81.1 KB
|
Labeless - no more.mp4
|
26.2 MB
|
Labeless - no more.srt
|
41.9 KB
|
Last-minute paper - Operation Potao Express - analysis of a cyber-espionage toolkit.mp4
|
47.6 MB
|
Last-minute paper - Operation Potao Express - analysis of a cyber-espionage toolkit.srt
|
53.1 KB
|
Last-minute paper - The mysterious case of Linux.Wifatch.mp4
|
48.2 MB
|
Last-minute paper - The mysterious case of Linux.Wifatch.srt
|
66.6 KB
|
Linux Moose endangered or extinct An update on this atypical embedded Linux botnet.mp4
|
41.2 MB
|
Linux Moose endangered or extinct An update on this atypical embedded Linux botnet.srt
|
61.4 KB
|
Making a dent in Russian mobile banking phishing.mp4
|
37.6 MB
|
Making a dent in Russian mobile banking phishing.srt
|
55.2 KB
|
Mobile banking fraud via SMS in North America - who's doing it and how.mp4
|
40.3 MB
|
Mobile banking fraud via SMS in North America - who's doing it and how.srt
|
80.8 KB
|
Modelling the network behaviour of malware to block malicious patterns.mp4
|
41.3 MB
|
Modelling the network behaviour of malware to block malicious patterns.srt
|
67.3 KB
|
Notes on click fraud - American story.mp4
|
20.9 MB
|
Notes on click fraud - American story.srt
|
43.5 KB
|
POS fraud - trends and counter-actions to mass fraud.mp4
|
39.7 MB
|
POS fraud - trends and counter-actions to mass fraud.srt
|
71.2 KB
|
ROSCO - Repository Of Signed COde.mp4
|
42.1 MB
|
Sizing cybercrime - incidents and accidents, hints and allegations.mp4
|
36.0 MB
|
Sizing cybercrime - incidents and accidents, hints and allegations.srt
|
55.0 KB
|
Solving the (in)security of home networked devices.mp4
|
37.8 MB
|
Solving the (in)security of home networked devices.srt
|
55.0 KB
|
Speaking Dyreza protocol. Advantages of 'learning' a new language.mp4
|
36.2 MB
|
Tech Support Scams 2.0 - an inside look into the evolution of the classic Microsoft tech support scam.mp4
|
16.4 MB
|
Tech Support Scams 2.0 - an inside look into the evolution of the classic Microsoft tech support scam.srt
|
52.7 KB
|
The Internet of Bad Things, Observed.mp4
|
59.7 MB
|
The Internet of Bad Things, Observed.srt
|
89.6 KB
|
The Kobayashi Maru dilemma.mp4
|
43.5 MB
|
The Kobayashi Maru dilemma.srt
|
70.1 KB
|
The TAO of .NET and PowerShell malware analysis.mp4
|
41.5 MB
|
The TAO of .NET and PowerShell malware analysis.srt
|
47.1 KB
|
The Unbearable Lightness of APTing.mp4
|
43.0 MB
|
The Unbearable Lightness of APTing.srt
|
55.0 KB
|
The Volatility Bot-Excavator.mp4
|
19.6 MB
|
The elephant in the room.mp4
|
41.4 MB
|
The elephant in the room.srt
|
53.9 KB
|
The ethics and perils of APT research - an unexpected transition into intelligence brokerage.mp4
|
47.0 MB
|
The ethics and perils of APT research - an unexpected transition into intelligence brokerage.srt
|
75.8 KB
|
TurlaSat - The Fault in our Stars.mp4
|
38.3 MB
|
TurlaSat - The Fault in our Stars.srt
|
45.3 KB
|
Ubiquity, security and you - malware, security and the Internet of Things.mp4
|
36.6 MB
|
Ubiquity, security and you - malware, security and the Internet of Things.srt
|
66.2 KB
|
WaveAtlas - surfing through the landscape of current malware packers.mp4
|
40.7 MB
|
WaveAtlas - surfing through the landscape of current malware packers.srt
|
53.6 KB
|
We know what you did this summer - Android banking trojan exposing its sins in the cloud.mp4
|
41.0 MB
|
We know what you did this summer - Android banking trojan exposing its sins in the cloud.srt
|
48.9 KB
|
Will Android trojan, worm or rootkit survive in SEAndroid and containerization.mp4
|
35.1 MB
|
Will Android trojan, worm or rootkit survive in SEAndroid and containerization.srt
|
45.5 KB
|
/VB 2016 Denver/
|
APT Reports and OPSEC Evolution, or - These Are Not the APT Reports You Are Looking For.mp4
|
22.0 MB
|
APT Reports and OPSEC Evolution, or - These Are Not the APT Reports You Are Looking For.srt
|
67.4 KB
|
Defeating Sandbox Evasion - How to Increase Successful Emulation Rate in your Virtualized Environment.mp4
|
22.7 MB
|
Defeating Sandbox Evasion - How to Increase Successful Emulation Rate in your Virtualized Environment.srt
|
60.8 KB
|
Getting Duped - Piggybacking on Webcam Streams for Surreptitious Recordings.mp4
|
21.8 MB
|
Getting Duped - Piggybacking on Webcam Streams for Surreptitious Recordings.srt
|
74.1 KB
|
Great Crypto Failures.mp4
|
23.0 MB
|
Great Crypto Failures.srt
|
68.7 KB
|
Mobile Applications - a Backdoor into Internet of Things.mp4
|
17.6 MB
|
Mobile Applications - a Backdoor into Internet of Things.srt
|
55.0 KB
|
Modern Attacks on Russian Financial Institutions.mp4
|
26.7 MB
|
Modern Attacks on Russian Financial Institutions.srt
|
61.1 KB
|
Neverquest - Crime as a Service and On the Hunt for the Big Bucks.mp4
|
22.4 MB
|
Neverquest - Crime as a Service and On the Hunt for the Big Bucks.srt
|
71.7 KB
|
Nymaim - the Untold Story.mp4
|
18.8 MB
|
On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users.mp4
|
16.2 MB
|
On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users.srt
|
37.7 KB
|
One-Click Fileless Infection.mp4
|
14.2 MB
|
Open Source Malware Lab.mp4
|
16.8 MB
|
Open Source Malware Lab.srt
|
56.6 KB
|
Wave Your False Flags Deception Tactics Muddying Attribution in Targeted Attacks.mp4
|
19.6 MB
|
Wave Your False Flags Deception Tactics Muddying Attribution in Targeted Attacks.srt
|
81.0 KB
|
/VB 2017 Madrid/
|
Battlefield Ukraine - finding patterns behind summer cyber attacks.eng.srt
|
43.1 KB
|
Battlefield Ukraine - finding patterns behind summer cyber attacks.mp4
|
19.3 MB
|
Beyond lexical and PDNS - using signals on graphs to uncover online threats at scale.eng.srt
|
85.1 KB
|
Beyond lexical and PDNS - using signals on graphs to uncover online threats at scale.mp4
|
25.4 MB
|
Consequences of bad security in health care.mp4
|
27.2 MB
|
Crypton - exposing malware's deepest secrets.mp4
|
31.4 MB
|
Gabor Szappanos wins fourth Peter Szor Award.eng.srt
|
21.6 KB
|
Gabor Szappanos wins fourth Peter Szor Award.mp4
|
9.6 MB
|
Industroyer - biggest threat to industrial control systems since Stuxnet.eng.srt
|
63.0 KB
|
Industroyer - biggest threat to industrial control systems since Stuxnet.mp4
|
25.5 MB
|
Last-minute paper - FinFisher - New techniques and infection vectors revealed.eng.srt
|
49.3 KB
|
Last-minute paper - FinFisher - New techniques and infection vectors revealed.mp4
|
21.3 MB
|
Last-minute paper - Spora - the saga continues a.k.a. how to ruin your research in a week.eng.srt
|
66.8 KB
|
Last-minute paper - Spora - the saga continues a.k.a. how to ruin your research in a week.mp4
|
29.0 MB
|
Modern reconnaissance phase on APT - protection layer.eng.srt
|
91.5 KB
|
Modern reconnaissance phase on APT - protection layer.mp4
|
26.3 MB
|
Nine circles of Cerber.eng.srt
|
74.0 KB
|
Nine circles of Cerber.mp4
|
29.2 MB
|
Offensive malware analysis - dissecting OSX FruitFly via a custom C&C server.eng.srt
|
94.8 KB
|
Offensive malware analysis - dissecting OSX FruitFly via a custom C&C server.mp4
|
24.4 MB
|
The router of all evil - more than just default passwords and silly scripts.eng.srt
|
50.6 KB
|
The router of all evil - more than just default passwords and silly scripts.mp4
|
18.2 MB
|
The sprawling market of consumer spyware.eng.srt
|
62.1 KB
|
The sprawling market of consumer spyware.mp4
|
23.0 MB
|
The state of cybersecurity in Africa - Kenya.mp4
|
12.4 MB
|
Turning Trickbot - decoding an encrypted command-and-control channel.eng.srt
|
76.9 KB
|
Turning Trickbot - decoding an encrypted command-and-control channel.mp4
|
26.9 MB
|
VB2017 paper - VirusTotal tips, tricks and myths.eng.srt
|
58.2 KB
|
VB2017 paper - VirusTotal tips, tricks and myths.mp4
|
29.5 MB
|
Walking in your enemy's shadow - when fourth-party collection becomes attribution hell.eng.srt
|
98.6 KB
|
Walking in your enemy's shadow - when fourth-party collection becomes attribution hell.mp4
|
35.6 MB
|
/VB 2018 Montreal/
|
Analysing compiled binaries using logic.eng.srt
|
53.7 KB
|
Analysing compiled binaries using logic.mp4
|
19.6 MB
|
Behind the scenes of the SamSam investigation.eng.srt
|
66.8 KB
|
Behind the scenes of the SamSam investigation.mp4
|
29.8 MB
|
Botception - hire a botnet to spread one's own botnet.eng.srt
|
44.4 KB
|
Botception - hire a botnet to spread one's own botnet.mp4
|
15.7 MB
|
Draw me like one of your French APTs - expanding o.eng.srt
|
82.2 KB
|
Draw me like one of your French APTs - expanding o.mp4
|
33.1 MB
|
Foreverdays - tracking and mitigating threats targeting civil society orgs.eng.srt
|
94.1 KB
|
Foreverdays - tracking and mitigating threats targeting civil society orgs.mp4
|
43.2 MB
|
From Hacking Team to hacked team to….eng.srt
|
51.8 KB
|
From Hacking Team to hacked team to….mp4
|
32.3 MB
|
From drive-by download to drive-by mining - understanding the new paradigm.eng.srt
|
73.4 KB
|
From drive-by download to drive-by mining - understanding the new paradigm.mp4
|
34.3 MB
|
Hide'n'Seek - an adaptive peer-to-peer IoT botnet.eng.srt
|
53.9 KB
|
Hide'n'Seek - an adaptive peer-to-peer IoT botnet.mp4
|
17.5 MB
|
Internet balkanization why are we raising borders.eng.srt
|
73.5 KB
|
Internet balkanization why are we raising borders.mp4
|
26.2 MB
|
Little Brother is watching - we know all your secrets.eng.srt
|
74.7 KB
|
Little Brother is watching - we know all your secrets.mp4
|
33.3 MB
|
Now you see it, now you don't - wipers in the wild.eng.srt
|
63.4 KB
|
Now you see it, now you don't - wipers in the wild.mp4
|
26.1 MB
|
Office bugs on the rise.mp4
|
40.6 MB
|
Shedding skin - Turla's fresh faces.eng.srt
|
73.0 KB
|
Shedding skin - Turla's fresh faces.mp4
|
35.1 MB
|
The Big Bang Theory by APT-C-23.eng.srt
|
75.8 KB
|
The Big Bang Theory by APT-C-23.mp4
|
31.0 MB
|
The modality of mortality in domain names.eng.srt
|
66.8 KB
|
The modality of mortality in domain names.mp4
|
25.8 MB
|
The wolf in sheep's clothing - undressed.eng.srt
|
50.2 KB
|
The wolf in sheep's clothing - undressed.mp4
|
27.5 MB
|
Triada - the past, the present and the (hopefully not existing) future.eng.srt
|
64.6 KB
|
Triada - the past, the present and the (hopefully not existing) future.mp4
|
29.7 MB
|
Unpacking the packed unpacker reversing an Android.eng.srt
|
69.4 KB
|
Unpacking the packed unpacker reversing an Android.mp4
|
28.9 MB
|
Where have all the good hires gone.eng.srt
|
94.6 KB
|
Where have all the good hires gone.mp4
|
20.4 MB
|
Who wasn't responsible for Olympic Destroyer (Paul Rascagneres & Warren Mercer).eng.srt
|
69.6 KB
|
Who wasn't responsible for Olympic Destroyer (Paul Rascagneres & Warren Mercer).mp4
|
30.5 MB
|
/VB 2019 London/
|
A vine climbing over the Great Firewall a long-term attack against China.eng.srt
|
32.4 KB
|
A vine climbing over the Great Firewall a long-term attack against China.mp4
|
23.0 MB
|
Absolutely routed Why routers are the new bullseye in cyber attacks.mp4
|
24.8 MB
|
Buhtrap metamorphosis from cybercrime to cyber espionage.eng.srt
|
42.6 KB
|
Buhtrap metamorphosis from cybercrime to cyber espionage.mp4
|
24.1 MB
|
Exploring Emotet, an elaborate everyday enigma.eng.srt
|
45.0 KB
|
Exploring Emotet, an elaborate everyday enigma.mp4
|
25.7 MB
|
Geost botnet. The discovery story of a new Android banking trojan from an OpSec error.eng.srt
|
38.7 KB
|
Geost botnet. The discovery story of a new Android banking trojan from an OpSec error.mp4
|
23.1 MB
|
Keynote address The security products we deserve.eng.srt
|
74.0 KB
|
Keynote address The security products we deserve.mp4
|
42.0 MB
|
Oops It happened again.mp4
|
26.5 MB
|
Shinigami's revenge the long tail of Ryuk malware.eng.srt
|
39.5 KB
|
Shinigami's revenge the long tail of Ryuk malware.mp4
|
24.3 MB
|
Thwarting Emotet email conversation thread hijacking with clustering.eng.srt
|
42.2 KB
|
Thwarting Emotet email conversation thread hijacking with clustering.mp4
|
21.8 MB
|
Webcam interception and protection in kernel mode in Windows.eng.srt
|
48.4 KB
|
Webcam interception and protection in kernel mode in Windows.mp4
|
38.8 MB
|
/VB 2020 Virtual/
|
2030 backcasting the potential rise and fall of cyber threat intelligence.eng.srt
|
59.5 KB
|
2030 backcasting the potential rise and fall of cyber threat intelligence.mp4
|
30.2 MB
|
A new open-source hypervisor-level malware monitoring and extraction system.eng.srt
|
49.8 KB
|
A new open-source hypervisor-level malware monitoring and extraction system.mp4
|
28.9 MB
|
Advanced Pasta Threat mapping threat actor usage of open-source offensive security tools.eng.srt
|
76.3 KB
|
Advanced Pasta Threat mapping threat actor usage of open-source offensive security tools.mp4
|
39.8 MB
|
Anchor, Bazar, and the Trickbot Connection.eng.srt
|
42.3 KB
|
Anchor, Bazar, and the Trickbot Connection.mp4
|
21.4 MB
|
Another threat actor day.eng.srt
|
50.6 KB
|
Another threat actor day.mp4
|
31.5 MB
|
Behind the Black Mirror Simulating attacks with mock C2 servers.mp4
|
36.9 MB
|
Chasing the Digital Pirates Unveiling the Container Threats.mp4
|
20.5 MB
|
Clandestine hunter two strategies for supply chain attack.mp4
|
29.5 MB
|
Compromising IOT C&C Panels for Unearthing Infections.eng.srt
|
67.6 KB
|
Compromising IOT C&C Panels for Unearthing Infections.mp4
|
33.8 MB
|
Context Aware Detection The future of cybersecurity.eng.srt
|
46.5 KB
|
Context Aware Detection The future of cybersecurity.mp4
|
17.9 MB
|
Dancing samba with Dolphins tracking a Brazilian threat actor moving to Europe.mp4
|
18.2 MB
|
Dissecting fleeceware apps the million-dollar money-making machine in Android and iOS.mp4
|
35.3 MB
|
Emerging trends in malware downloaders.mp4
|
53.6 MB
|
Emissary (Pandas) in the Middle East.eng.srt
|
41.3 KB
|
Emissary (Pandas) in the Middle East.mp4
|
36.7 MB
|
Evolution of Excel 4.0 Macro Weaponization.eng.srt
|
75.9 KB
|
Evolution of Excel 4.0 Macro Weaponization.mp4
|
61.3 MB
|
Ghost Mach-O an analysis of Lazarus’ Mac-malware innovations.mp4
|
31.0 MB
|
GuLoader No, CloudEyE. Flattening the attack curve of the top malicious dropper.eng.srt
|
43.3 KB
|
GuLoader No, CloudEyE. Flattening the attack curve of the top malicious dropper.mp4
|
33.0 MB
|
Hidden risks of advertisements.mp4
|
40.7 MB
|
Just in time, deception to detect Credential Stuffing Bot.mp4
|
17.0 MB
|
Lightweight emulation based IoC extraction for Gafgyt botnets.mp4
|
39.9 MB
|
Like bees to a honeypot - a journey through honeypots.mp4
|
26.1 MB
|
Most sophisticated technique of the year goes to.mp4
|
23.5 MB
|
NetWalking on Sunshine.eng.srt
|
50.6 KB
|
NetWalking on Sunshine.mp4
|
41.9 MB
|
One year later Challenges for young anti-malware products today.mp4
|
23.0 MB
|
Operation LagTime IT colourful Panda footprint.mp4
|
39.3 MB
|
Payment required rare HTTP statuses and air-gaps avoidance from the authors of COMPFun.eng.srt
|
43.9 KB
|
Payment required rare HTTP statuses and air-gaps avoidance from the authors of COMPFun.mp4
|
32.9 MB
|
Ramsay A cyber-espionage toolkit tailored for air-gapped networks.eng.srt
|
78.4 KB
|
Ramsay A cyber-espionage toolkit tailored for air-gapped networks.mp4
|
47.4 MB
|
She sells root shells by the C() shore.mp4
|
24.8 MB
|
Standardized reporting with the Malware Behavior Catalog.eng.srt
|
38.3 KB
|
Standardized reporting with the Malware Behavior Catalog.mp4
|
24.8 MB
|
Stealthy WastedLocker eluding behavior blockers, but not only.eng.srt
|
16.5 KB
|
Stealthy WastedLocker eluding behavior blockers, but not only.mp4
|
19.3 MB
|
TA505 attacking industries around the world.eng.srt
|
49.5 KB
|
TA505 attacking industries around the world.mp4
|
23.1 MB
|
Take care, spyware is slipping into your phones through Operation Poisoned News.eng.srt
|
51.7 KB
|
Take care, spyware is slipping into your phones through Operation Poisoned News.mp4
|
40.2 MB
|
The (f)utility of indicators.mp4
|
51.6 MB
|
The NExt Big Sur(ge) on macOS.eng.srt
|
14.6 KB
|
The NExt Big Sur(ge) on macOS.mp4
|
8.5 MB
|
The rise of the info stealers.eng.srt
|
36.8 KB
|
The rise of the info stealers.mp4
|
23.5 MB
|
Tracking Rapid Evolution Copycat of An APT RAT in Asia.mp4
|
24.7 MB
|
Transparency, Trust and Intention What dismantling the heart of cyberattack public attribution.eng.srt
|
42.2 KB
|
Transparency, Trust and Intention What dismantling the heart of cyberattack public attribution.mp4
|
17.0 MB
|
Unveiling the CryptoMimic.mp4
|
37.6 MB
|
/
|
Virus Bulletin thank you.txt
|
1.0 KB
|
VirusBulletin logo.png
|
10.7 KB
|
Total files 356
|