FileMood

Download Virus Bulletin

Virus Bulletin

Name

Virus Bulletin

 DOWNLOAD Copy Link

Total Size

5.5 GB

Total Files

356

Hash

2C1771C3E3FC39CFB82586A3010399D340DF1474

/VB 1991 Jersey/

1991-conferencereport.pdf

1.6 MB

img001_595.jpg

110.3 KB

img002_595.jpg

116.2 KB

img003_595.jpg

126.2 KB

/VB 1992 Edinburgh/

VB92report.pdf

2.4 MB

/VB 1993 Amsterdam/

VB93report.pdf

2.1 MB

img001_595.jpg

150.0 KB

img002_595.jpg

163.3 KB

img003_595.jpg

169.0 KB

img004_595.jpg

170.0 KB

img005_595.jpg

142.4 KB

img006_595.jpg

161.6 KB

img007_595.jpg

153.4 KB

img008_595.jpg

156.0 KB

/VB 2007 Vienna/

A different look at the VB2007 Conference in Vienna .mp4

9.5 MB

/VB 2008 Ottawa/

Interview with John Hawes of Virus Bulletin.mp4

5.5 MB

Interview with John Hawes of Virus Bulletin.srt

7.8 KB

Security experts answer key questions at Virus Bulletin 2008.mp4

4.0 MB

Security experts answer key questions at Virus Bulletin 2008.srt

4.6 KB

/VB 2009 Geneva/

The Virus Bulletin yodelling competition.mp4

1.8 MB

/VB 2010 Vancouver/

Costin Raiu on Virus Bulletin 2010.mp4

11.9 MB

Costin Raiu on Virus Bulletin 2010.srt

19.2 KB

Stuxnet demo in Virus Bulletin 2010 conference.mp4

3.6 MB

VB2010 Social Network and Computer Security Panel Discussion.mp4

16.3 MB

/VB 2012 Dallas/

Flashback OS X malware - VB2012 presentation by Broderick Aquilino (F-Secure).mp4

30.6 MB

Flashback OS X malware - VB2012 presentation by Broderick Aquilino (F-Secure).srt

44.6 KB

Virus Bulletin 2012 Conference Overview.mp4

13.1 MB

/VB 2013 Berlin/

An automatic analysis and detection tool for Java exploits.mp4

34.9 MB

An automatic analysis and detection tool for Java exploits.srt

42.7 KB

Analysis of Android in-app advertisement kits.mp4

17.2 MB

Analysis of Android in-app advertisement kits.srt

46.8 KB

Back channels and bitcoins - ZeroAccess' secret C&C communications.mp4

14.1 MB

Back channels and bitcoins - ZeroAccess' secret C&C communications.srt

62.2 KB

Hacking Team and Gamma International in 'business-to-government malware'.mp4

18.8 MB

Hacking Team and Gamma International in 'business-to-government malware'.srt

51.0 KB

How to test properly - comparative web filter tests.mp4

42.8 MB

How to test properly - comparative web filter tests.srt

57.1 KB

Hypervisor-based, hardware-assisted system monitoring.mp4

29.9 MB

PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file).mp4

17.1 MB

PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file).srt

50.1 KB

Statistically effective protection against APT attacks.mp4

21.5 MB

Statistically effective protection against APT attacks.srt

58.9 KB

Surviving 0-days - reducing the window of exposure.mp4

15.7 MB

Surviving 0-days - reducing the window of exposure.srt

52.1 KB

VB2013 Keynote - Ethics and the AV industry in the age of WikiLeaks.mp4

48.6 MB

VB2013 Keynote - Ethics and the AV industry in the age of WikiLeaks.srt

79.1 KB

/VB 2014 Seattle/

.NET malware dynamic instrumentation for automated and manual analysis.mp4

20.5 MB

.NET malware dynamic instrumentation for automated and manual analysis.srt

49.3 KB

An in-depth analysis of abuse on Twitter.mp4

24.1 MB

An in-depth analysis of abuse on Twitter.srt

48.0 KB

Android packer - facing the challenges, building solutions.mp4

22.6 MB

Android packer - facing the challenges, building solutions.srt

50.4 KB

Attack points in health apps & wearable devices - how safe is your quantified self.mp4

26.0 MB

Attack surface analysis of Tizen devices.mp4

27.6 MB

Attack surface analysis of Tizen devices.srt

68.9 KB

Back in BlackEnergy - 2014 targeted attacks in the Ukraine and Poland.mp4

18.5 MB

Back in BlackEnergy - 2014 targeted attacks in the Ukraine and Poland.srt

44.9 KB

Bootkits - past, present & future.mp4

23.1 MB

Bootkits - past, present & future.srt

48.0 KB

Caphaw - the advanced persistent pluginer.mp4

20.5 MB

Caphaw - the advanced persistent pluginer.srt

51.9 KB

DMARC - how to use it to improve your email reputation.mp4

10.8 MB

DNSSEC - how far have we come.mp4

16.0 MB

Design to discover - security analytics with 3D visualization engine.mp4

20.9 MB

Design to discover - security analytics with 3D visualization engine.srt

52.7 KB

Duping the machine - malware strategies, post sandbox detection.mp4

17.4 MB

Early launch Android malware - your phone is 0wned (demo).mp4

2.2 MB

Early launch Android malware - your phone is 0wned.mp4

2.7 MB

Hiding the network behind the network. Botnet proxy business model.mp4

19.4 MB

Labelling spam through the analysis of protocol patterns.mp4

15.3 MB

Labelling spam through the analysis of protocol patterns.srt

47.4 KB

Leaving our ZIP undone - how to abuse ZIP to deliver malware apps.mp4

20.7 MB

Leaving our ZIP undone - how to abuse ZIP to deliver malware apps.srt

58.2 KB

Methods of malware persistence on Mac OS X.mp4

25.0 MB

OPSEC for security researchers.mp4

32.0 MB

OPSEC for security researchers.srt

66.9 KB

Optimized mal-ops. Hack the ad network like a boss.mp4

21.8 MB

P0wned by a barcode - stealing money from offline users.mp4

26.4 MB

P0wned by a barcode - stealing money from offline users.srt

53.1 KB

Presentation of the 1st Peter Szor Award.mp4

7.1 MB

Protecting financial institutions from banking malware's man-in-the-browser attacks.mp4

22.8 MB

Protecting financial institutions from banking malware's man-in-the-browser attacks.srt

41.8 KB

Quantifying maliciousness in Alexa top-ranked domains.mp4

21.4 MB

Quantifying maliciousness in Alexa top-ranked domains.srt

65.7 KB

Smart home appliance security & malware.mp4

33.0 MB

Smart home appliance security & malware.srt

51.2 KB

Sweeping the IP space - the hunt for evil on the Internet.mp4

25.2 MB

Swipe away, we're watching you.mp4

31.8 MB

The evolution of webinjects.mp4

18.8 MB

The evolution of webinjects.srt

63.4 KB

Unveiling the kernel - rootkit discovery using selective automated kernel memory differencing.mp4

23.5 MB

Unveiling the kernel - rootkit discovery using selective automated kernel memory differencing.srt

68.4 KB

We know it before you do - predicting malicious domains.mp4

13.5 MB

We know it before you do - predicting malicious domains.srt

55.9 KB

Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists.mp4

18.4 MB

Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists.srt

45.2 KB

/VB 2015 Prague/

A quantitative examination of the current state of corporate security practices.mp4

34.6 MB

A quantitative examination of the current state of corporate security practices.srt

56.5 KB

Android ransomware - turning CryptoLocker into CryptoUnlocker.mp4

41.3 MB

Anonymity is king.mp4

39.3 MB

Anonymity is king.srt

52.8 KB

Attack on the drones - security vulnerabilities of unmanned aerial vehicles.mp4

43.1 MB

Breaking the bank(er) - automated configuration data extraction for banking malware.mp4

38.9 MB

Breaking the bank(er) - automated configuration data extraction for banking malware.srt

72.8 KB

Building a malware lab in the age of Big Data.mp4

35.3 MB

Building a malware lab in the age of Big Data.srt

64.6 KB

C&C-as-a-Service - abusing third-party web services as C&C channels.mp4

38.7 MB

C&C-as-a-Service - abusing third-party web services as C&C channels.srt

63.3 KB

Can we trust a trustee An in-depth look into the digitally signed malware industry.mp4

21.2 MB

Can we trust a trustee An in-depth look into the digitally signed malware industry.srt

48.8 KB

DDoS trojan - a malicious concept that conquered the ELF format.mp4

46.7 MB

DDoS trojan - a malicious concept that conquered the ELF format.srt

56.2 KB

Dare 'DEVIL' - beyond your senses with Dex Visualizer.mp4

34.5 MB

Dare 'DEVIL' - beyond your senses with Dex Visualizer.srt

46.4 KB

Dead and buried in their crypts - defeating modern ransomware.mp4

38.0 MB

Dead and buried in their crypts - defeating modern ransomware.srt

67.0 KB

Digital 'Bian Lian' (face changing) - the skeleton key malware.mp4

47.3 MB

Digital 'Bian Lian' (face changing) - the skeleton key malware.srt

60.4 KB

Does prevalence matter Ranking anti-malware products by potential victim impact.mp4

37.8 MB

Does prevalence matter Ranking anti-malware products by potential victim impact.srt

61.7 KB

Doing more with less - a study of file-less infection attacks.mp4

40.4 MB

Doing more with less - a study of file-less infection attacks.srt

49.4 KB

Economic sanctions on malware.mp4

42.6 MB

Economic sanctions on malware.srt

55.9 KB

Effectively testing APT defences.mp4

41.1 MB

Effectively testing APT defences.srt

64.9 KB

Evolution of Android exploits from a static analysis tools perspective.mp4

18.8 MB

Evolution of Android exploits from a static analysis tools perspective.srt

47.6 KB

From Asia with love Smartphones with pre-installed malware.mp4

41.9 MB

From Asia with love Smartphones with pre-installed malware.srt

52.5 KB

How they're getting the data out of your network.mp4

9.3 MB

How they're getting the data out of your network.srt

24.0 KB

It has a EULA, it must be legit.mp4

18.2 MB

It's a file infector... it's ransomware... it's Virlock.mp4

44.2 MB

It's a file infector... it's ransomware... it's Virlock.srt

42.1 KB

Keynote address - One man's anti-malware researcher is....mp4

57.8 MB

Keynote address - One man's anti-malware researcher is....srt

81.1 KB

Labeless - no more.mp4

26.2 MB

Labeless - no more.srt

41.9 KB

Last-minute paper - Operation Potao Express - analysis of a cyber-espionage toolkit.mp4

47.6 MB

Last-minute paper - Operation Potao Express - analysis of a cyber-espionage toolkit.srt

53.1 KB

Last-minute paper - The mysterious case of Linux.Wifatch.mp4

48.2 MB

Last-minute paper - The mysterious case of Linux.Wifatch.srt

66.6 KB

Linux Moose endangered or extinct An update on this atypical embedded Linux botnet.mp4

41.2 MB

Linux Moose endangered or extinct An update on this atypical embedded Linux botnet.srt

61.4 KB

Making a dent in Russian mobile banking phishing.mp4

37.6 MB

Making a dent in Russian mobile banking phishing.srt

55.2 KB

Mobile banking fraud via SMS in North America - who's doing it and how.mp4

40.3 MB

Mobile banking fraud via SMS in North America - who's doing it and how.srt

80.8 KB

Modelling the network behaviour of malware to block malicious patterns.mp4

41.3 MB

Modelling the network behaviour of malware to block malicious patterns.srt

67.3 KB

Notes on click fraud - American story.mp4

20.9 MB

Notes on click fraud - American story.srt

43.5 KB

POS fraud - trends and counter-actions to mass fraud.mp4

39.7 MB

POS fraud - trends and counter-actions to mass fraud.srt

71.2 KB

ROSCO - Repository Of Signed COde.mp4

42.1 MB

Sizing cybercrime - incidents and accidents, hints and allegations.mp4

36.0 MB

Sizing cybercrime - incidents and accidents, hints and allegations.srt

55.0 KB

Solving the (in)security of home networked devices.mp4

37.8 MB

Solving the (in)security of home networked devices.srt

55.0 KB

Speaking Dyreza protocol. Advantages of 'learning' a new language.mp4

36.2 MB

Tech Support Scams 2.0 - an inside look into the evolution of the classic Microsoft tech support scam.mp4

16.4 MB

Tech Support Scams 2.0 - an inside look into the evolution of the classic Microsoft tech support scam.srt

52.7 KB

The Internet of Bad Things, Observed.mp4

59.7 MB

The Internet of Bad Things, Observed.srt

89.6 KB

The Kobayashi Maru dilemma.mp4

43.5 MB

The Kobayashi Maru dilemma.srt

70.1 KB

The TAO of .NET and PowerShell malware analysis.mp4

41.5 MB

The TAO of .NET and PowerShell malware analysis.srt

47.1 KB

The Unbearable Lightness of APTing.mp4

43.0 MB

The Unbearable Lightness of APTing.srt

55.0 KB

The Volatility Bot-Excavator.mp4

19.6 MB

The elephant in the room.mp4

41.4 MB

The elephant in the room.srt

53.9 KB

The ethics and perils of APT research - an unexpected transition into intelligence brokerage.mp4

47.0 MB

The ethics and perils of APT research - an unexpected transition into intelligence brokerage.srt

75.8 KB

TurlaSat - The Fault in our Stars.mp4

38.3 MB

TurlaSat - The Fault in our Stars.srt

45.3 KB

Ubiquity, security and you - malware, security and the Internet of Things.mp4

36.6 MB

Ubiquity, security and you - malware, security and the Internet of Things.srt

66.2 KB

WaveAtlas - surfing through the landscape of current malware packers.mp4

40.7 MB

WaveAtlas - surfing through the landscape of current malware packers.srt

53.6 KB

We know what you did this summer - Android banking trojan exposing its sins in the cloud.mp4

41.0 MB

We know what you did this summer - Android banking trojan exposing its sins in the cloud.srt

48.9 KB

Will Android trojan, worm or rootkit survive in SEAndroid and containerization.mp4

35.1 MB

Will Android trojan, worm or rootkit survive in SEAndroid and containerization.srt

45.5 KB

/VB 2016 Denver/

APT Reports and OPSEC Evolution, or - These Are Not the APT Reports You Are Looking For.mp4

22.0 MB

APT Reports and OPSEC Evolution, or - These Are Not the APT Reports You Are Looking For.srt

67.4 KB

Defeating Sandbox Evasion - How to Increase Successful Emulation Rate in your Virtualized Environment.mp4

22.7 MB

Defeating Sandbox Evasion - How to Increase Successful Emulation Rate in your Virtualized Environment.srt

60.8 KB

Getting Duped - Piggybacking on Webcam Streams for Surreptitious Recordings.mp4

21.8 MB

Getting Duped - Piggybacking on Webcam Streams for Surreptitious Recordings.srt

74.1 KB

Great Crypto Failures.mp4

23.0 MB

Great Crypto Failures.srt

68.7 KB

Mobile Applications - a Backdoor into Internet of Things.mp4

17.6 MB

Mobile Applications - a Backdoor into Internet of Things.srt

55.0 KB

Modern Attacks on Russian Financial Institutions.mp4

26.7 MB

Modern Attacks on Russian Financial Institutions.srt

61.1 KB

Neverquest - Crime as a Service and On the Hunt for the Big Bucks.mp4

22.4 MB

Neverquest - Crime as a Service and On the Hunt for the Big Bucks.srt

71.7 KB

Nymaim - the Untold Story.mp4

18.8 MB

On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users.mp4

16.2 MB

On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users.srt

37.7 KB

One-Click Fileless Infection.mp4

14.2 MB

Open Source Malware Lab.mp4

16.8 MB

Open Source Malware Lab.srt

56.6 KB

Wave Your False Flags Deception Tactics Muddying Attribution in Targeted Attacks.mp4

19.6 MB

Wave Your False Flags Deception Tactics Muddying Attribution in Targeted Attacks.srt

81.0 KB

/VB 2017 Madrid/

Battlefield Ukraine - finding patterns behind summer cyber attacks.eng.srt

43.1 KB

Battlefield Ukraine - finding patterns behind summer cyber attacks.mp4

19.3 MB

Beyond lexical and PDNS - using signals on graphs to uncover online threats at scale.eng.srt

85.1 KB

Beyond lexical and PDNS - using signals on graphs to uncover online threats at scale.mp4

25.4 MB

Consequences of bad security in health care.mp4

27.2 MB

Crypton - exposing malware's deepest secrets.mp4

31.4 MB

Gabor Szappanos wins fourth Peter Szor Award.eng.srt

21.6 KB

Gabor Szappanos wins fourth Peter Szor Award.mp4

9.6 MB

Industroyer - biggest threat to industrial control systems since Stuxnet.eng.srt

63.0 KB

Industroyer - biggest threat to industrial control systems since Stuxnet.mp4

25.5 MB

Last-minute paper - FinFisher - New techniques and infection vectors revealed.eng.srt

49.3 KB

Last-minute paper - FinFisher - New techniques and infection vectors revealed.mp4

21.3 MB

Last-minute paper - Spora - the saga continues a.k.a. how to ruin your research in a week.eng.srt

66.8 KB

Last-minute paper - Spora - the saga continues a.k.a. how to ruin your research in a week.mp4

29.0 MB

Modern reconnaissance phase on APT - protection layer.eng.srt

91.5 KB

Modern reconnaissance phase on APT - protection layer.mp4

26.3 MB

Nine circles of Cerber.eng.srt

74.0 KB

Nine circles of Cerber.mp4

29.2 MB

Offensive malware analysis - dissecting OSX FruitFly via a custom C&C server.eng.srt

94.8 KB

Offensive malware analysis - dissecting OSX FruitFly via a custom C&C server.mp4

24.4 MB

The router of all evil - more than just default passwords and silly scripts.eng.srt

50.6 KB

The router of all evil - more than just default passwords and silly scripts.mp4

18.2 MB

The sprawling market of consumer spyware.eng.srt

62.1 KB

The sprawling market of consumer spyware.mp4

23.0 MB

The state of cybersecurity in Africa - Kenya.mp4

12.4 MB

Turning Trickbot - decoding an encrypted command-and-control channel.eng.srt

76.9 KB

Turning Trickbot - decoding an encrypted command-and-control channel.mp4

26.9 MB

VB2017 paper - VirusTotal tips, tricks and myths.eng.srt

58.2 KB

VB2017 paper - VirusTotal tips, tricks and myths.mp4

29.5 MB

Walking in your enemy's shadow - when fourth-party collection becomes attribution hell.eng.srt

98.6 KB

Walking in your enemy's shadow - when fourth-party collection becomes attribution hell.mp4

35.6 MB

/VB 2018 Montreal/

Analysing compiled binaries using logic.eng.srt

53.7 KB

Analysing compiled binaries using logic.mp4

19.6 MB

Behind the scenes of the SamSam investigation.eng.srt

66.8 KB

Behind the scenes of the SamSam investigation.mp4

29.8 MB

Botception - hire a botnet to spread one's own botnet.eng.srt

44.4 KB

Botception - hire a botnet to spread one's own botnet.mp4

15.7 MB

Draw me like one of your French APTs - expanding o.eng.srt

82.2 KB

Draw me like one of your French APTs - expanding o.mp4

33.1 MB

Foreverdays - tracking and mitigating threats targeting civil society orgs.eng.srt

94.1 KB

Foreverdays - tracking and mitigating threats targeting civil society orgs.mp4

43.2 MB

From Hacking Team to hacked team to….eng.srt

51.8 KB

From Hacking Team to hacked team to….mp4

32.3 MB

From drive-by download to drive-by mining - understanding the new paradigm.eng.srt

73.4 KB

From drive-by download to drive-by mining - understanding the new paradigm.mp4

34.3 MB

Hide'n'Seek - an adaptive peer-to-peer IoT botnet.eng.srt

53.9 KB

Hide'n'Seek - an adaptive peer-to-peer IoT botnet.mp4

17.5 MB

Internet balkanization why are we raising borders.eng.srt

73.5 KB

Internet balkanization why are we raising borders.mp4

26.2 MB

Little Brother is watching - we know all your secrets.eng.srt

74.7 KB

Little Brother is watching - we know all your secrets.mp4

33.3 MB

Now you see it, now you don't - wipers in the wild.eng.srt

63.4 KB

Now you see it, now you don't - wipers in the wild.mp4

26.1 MB

Office bugs on the rise.mp4

40.6 MB

Shedding skin - Turla's fresh faces.eng.srt

73.0 KB

Shedding skin - Turla's fresh faces.mp4

35.1 MB

The Big Bang Theory by APT-C-23.eng.srt

75.8 KB

The Big Bang Theory by APT-C-23.mp4

31.0 MB

The modality of mortality in domain names.eng.srt

66.8 KB

The modality of mortality in domain names.mp4

25.8 MB

The wolf in sheep's clothing - undressed.eng.srt

50.2 KB

The wolf in sheep's clothing - undressed.mp4

27.5 MB

Triada - the past, the present and the (hopefully not existing) future.eng.srt

64.6 KB

Triada - the past, the present and the (hopefully not existing) future.mp4

29.7 MB

Unpacking the packed unpacker reversing an Android.eng.srt

69.4 KB

Unpacking the packed unpacker reversing an Android.mp4

28.9 MB

Where have all the good hires gone.eng.srt

94.6 KB

Where have all the good hires gone.mp4

20.4 MB

Who wasn't responsible for Olympic Destroyer (Paul Rascagneres & Warren Mercer).eng.srt

69.6 KB

Who wasn't responsible for Olympic Destroyer (Paul Rascagneres & Warren Mercer).mp4

30.5 MB

/VB 2019 London/

A vine climbing over the Great Firewall a long-term attack against China.eng.srt

32.4 KB

A vine climbing over the Great Firewall a long-term attack against China.mp4

23.0 MB

Absolutely routed Why routers are the new bullseye in cyber attacks.mp4

24.8 MB

Buhtrap metamorphosis from cybercrime to cyber espionage.eng.srt

42.6 KB

Buhtrap metamorphosis from cybercrime to cyber espionage.mp4

24.1 MB

Exploring Emotet, an elaborate everyday enigma.eng.srt

45.0 KB

Exploring Emotet, an elaborate everyday enigma.mp4

25.7 MB

Geost botnet. The discovery story of a new Android banking trojan from an OpSec error.eng.srt

38.7 KB

Geost botnet. The discovery story of a new Android banking trojan from an OpSec error.mp4

23.1 MB

Keynote address The security products we deserve.eng.srt

74.0 KB

Keynote address The security products we deserve.mp4

42.0 MB

Oops It happened again.mp4

26.5 MB

Shinigami's revenge the long tail of Ryuk malware.eng.srt

39.5 KB

Shinigami's revenge the long tail of Ryuk malware.mp4

24.3 MB

Thwarting Emotet email conversation thread hijacking with clustering.eng.srt

42.2 KB

Thwarting Emotet email conversation thread hijacking with clustering.mp4

21.8 MB

Webcam interception and protection in kernel mode in Windows.eng.srt

48.4 KB

Webcam interception and protection in kernel mode in Windows.mp4

38.8 MB

/VB 2020 Virtual/

2030 backcasting the potential rise and fall of cyber threat intelligence.eng.srt

59.5 KB

2030 backcasting the potential rise and fall of cyber threat intelligence.mp4

30.2 MB

A new open-source hypervisor-level malware monitoring and extraction system.eng.srt

49.8 KB

A new open-source hypervisor-level malware monitoring and extraction system.mp4

28.9 MB

Advanced Pasta Threat mapping threat actor usage of open-source offensive security tools.eng.srt

76.3 KB

Advanced Pasta Threat mapping threat actor usage of open-source offensive security tools.mp4

39.8 MB

Anchor, Bazar, and the Trickbot Connection.eng.srt

42.3 KB

Anchor, Bazar, and the Trickbot Connection.mp4

21.4 MB

Another threat actor day.eng.srt

50.6 KB

Another threat actor day.mp4

31.5 MB

Behind the Black Mirror Simulating attacks with mock C2 servers.mp4

36.9 MB

Chasing the Digital Pirates Unveiling the Container Threats.mp4

20.5 MB

Clandestine hunter two strategies for supply chain attack.mp4

29.5 MB

Compromising IOT C&C Panels for Unearthing Infections.eng.srt

67.6 KB

Compromising IOT C&C Panels for Unearthing Infections.mp4

33.8 MB

Context Aware Detection The future of cybersecurity.eng.srt

46.5 KB

Context Aware Detection The future of cybersecurity.mp4

17.9 MB

Dancing samba with Dolphins tracking a Brazilian threat actor moving to Europe.mp4

18.2 MB

Dissecting fleeceware apps the million-dollar money-making machine in Android and iOS.mp4

35.3 MB

Emerging trends in malware downloaders.mp4

53.6 MB

Emissary (Pandas) in the Middle East.eng.srt

41.3 KB

Emissary (Pandas) in the Middle East.mp4

36.7 MB

Evolution of Excel 4.0 Macro Weaponization.eng.srt

75.9 KB

Evolution of Excel 4.0 Macro Weaponization.mp4

61.3 MB

Ghost Mach-O an analysis of Lazarus’ Mac-malware innovations.mp4

31.0 MB

GuLoader No, CloudEyE. Flattening the attack curve of the top malicious dropper.eng.srt

43.3 KB

GuLoader No, CloudEyE. Flattening the attack curve of the top malicious dropper.mp4

33.0 MB

Hidden risks of advertisements.mp4

40.7 MB

Just in time, deception to detect Credential Stuffing Bot.mp4

17.0 MB

Lightweight emulation based IoC extraction for Gafgyt botnets.mp4

39.9 MB

Like bees to a honeypot - a journey through honeypots.mp4

26.1 MB

Most sophisticated technique of the year goes to.mp4

23.5 MB

NetWalking on Sunshine.eng.srt

50.6 KB

NetWalking on Sunshine.mp4

41.9 MB

One year later Challenges for young anti-malware products today.mp4

23.0 MB

Operation LagTime IT colourful Panda footprint.mp4

39.3 MB

Payment required rare HTTP statuses and air-gaps avoidance from the authors of COMPFun.eng.srt

43.9 KB

Payment required rare HTTP statuses and air-gaps avoidance from the authors of COMPFun.mp4

32.9 MB

Ramsay A cyber-espionage toolkit tailored for air-gapped networks.eng.srt

78.4 KB

Ramsay A cyber-espionage toolkit tailored for air-gapped networks.mp4

47.4 MB

She sells root shells by the C() shore.mp4

24.8 MB

Standardized reporting with the Malware Behavior Catalog.eng.srt

38.3 KB

Standardized reporting with the Malware Behavior Catalog.mp4

24.8 MB

Stealthy WastedLocker eluding behavior blockers, but not only.eng.srt

16.5 KB

Stealthy WastedLocker eluding behavior blockers, but not only.mp4

19.3 MB

TA505 attacking industries around the world.eng.srt

49.5 KB

TA505 attacking industries around the world.mp4

23.1 MB

Take care, spyware is slipping into your phones through Operation Poisoned News.eng.srt

51.7 KB

Take care, spyware is slipping into your phones through Operation Poisoned News.mp4

40.2 MB

The (f)utility of indicators.mp4

51.6 MB

The NExt Big Sur(ge) on macOS.eng.srt

14.6 KB

The NExt Big Sur(ge) on macOS.mp4

8.5 MB

The rise of the info stealers.eng.srt

36.8 KB

The rise of the info stealers.mp4

23.5 MB

Tracking Rapid Evolution Copycat of An APT RAT in Asia.mp4

24.7 MB

Transparency, Trust and Intention What dismantling the heart of cyberattack public attribution.eng.srt

42.2 KB

Transparency, Trust and Intention What dismantling the heart of cyberattack public attribution.mp4

17.0 MB

Unveiling the CryptoMimic.mp4

37.6 MB

/

Virus Bulletin thank you.txt

1.0 KB

VirusBulletin logo.png

10.7 KB

 

Total files 356


Copyright © 2024 FileMood.com