FileMood

Download Virus Bulletin

Virus Bulletin

Name

Virus Bulletin

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

8.2 GB

Total Files

214

Hash

B36EF5B67B0B64E5A2F3EACA124BDD2443609E34

/VB 1991 Jersey/

1991-conferencereport.pdf

1.6 MB

img001_595.jpg

110.3 KB

img002_595.jpg

116.2 KB

img003_595.jpg

126.2 KB

/VB 1992 Edinburgh/

VB92report.pdf

2.4 MB

/VB 1993 Amsterdam/

VB93report.pdf

2.1 MB

img001_595.jpg

150.0 KB

img002_595.jpg

163.3 KB

img003_595.jpg

169.0 KB

img004_595.jpg

170.0 KB

img005_595.jpg

142.4 KB

img006_595.jpg

161.6 KB

img007_595.jpg

153.4 KB

img008_595.jpg

156.0 KB

/VB 2007 Vienna/

A different look at the VB2007 Conference in Vienna !.mp4

14.0 MB

/VB 2008 Ottawa/

Interview with John Hawes of Virus Bulletin.mp4

4.7 MB

Security experts answer key questions at Virus Bulletin 2008.mp4

3.7 MB

/VB 2009 Geneva/

The Virus Bulletin yodelling competition.mp4

1.9 MB

/VB 2010 Vancouver/

Costin Raiu on Virus Bulletin 2010.mp4

9.5 MB

Stuxnet demo in Virus Bulletin 2010 conference.mp4

3.6 MB

VB2010 Social Network and Computer Security Panel Discussion.mp4

25.4 MB

/VB 2012 Dallas/

Flashback OS X malware - VB2012 presentation by Broderick Aquilino (F-Secure).mp4

20.1 MB

Virus Bulletin 2012 Conference Overview.mp4

23.9 MB

/VB 2013 Berlin/

An automatic analysis and detection tool for Java exploits.mp4

20.3 MB

Analysis of Android in-app advertisement kits.mp4

35.7 MB

Back channels and bitcoins ZeroAccess' secret C&C communications.mp4

23.6 MB

Hacking Team and Gamma International in 'business-to-government malware'.mp4

26.9 MB

How to test properly comparative web filter tests.mp4

24.8 MB

Hypervisor-based, hardware-assisted system monitoring.mp4

24.9 MB

PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file).mp4

26.1 MB

Statistically effective protection against APT attacks.mp4

44.7 MB

Surviving 0-days - reducing the window of exposure.mp4

30.0 MB

VB2013 Keynote Ethics and the AV industry in the age of WikiLeaks.mp4

57.7 MB

/VB 2014 Seattle/

.NET malware dynamic instrumentation for automated and manual analysis.mp4

29.0 MB

An in-depth analysis of abuse on Twitter.mp4

28.4 MB

Android packer facing the challenges, building solutions.mp4

29.6 MB

Attack points in health apps & wearable devices - how safe is your quantified self.mp4

40.2 MB

Attack surface analysis of Tizen devices.mp4

24.9 MB

Back in BlackEnergy 2014 targeted attacks in the Ukraine and Poland.mp4

23.9 MB

Bootkits past, present & future.mp4

33.6 MB

Caphaw - the advanced persistent pluginer.mp4

25.6 MB

DMARC - how to use it to improve your email reputation.mp4

17.8 MB

DNSSEC - how far have we come.mp4

24.8 MB

Design to discover security analytics with 3D visualization engine.mp4

44.9 MB

Duping the machine - malware strategies, post sandbox detection.mp4

24.7 MB

Early launch Android malware your phone is 0wned (demo).mp4

2.2 MB

Early launch Android malware your phone is 0wned.mp4

1.2 MB

Hiding the network behind the network. Botnet proxy business model.mp4

22.1 MB

Labelling spam through the analysis of protocol patterns.mp4

27.2 MB

Leaving our ZIP undone how to abuse ZIP to deliver malware apps.avi

42.2 MB

Methods of malware persistence on Mac OS X.avi

48.0 MB

OPSEC for security researchers.avi

100.6 MB

Optimized mal-ops. Hack the ad network like a boss.avi

43.0 MB

P0wned by a barcode stealing money from offline users.avi

82.0 MB

Presentation of the 1st Peter Szor Award.avi

14.3 MB

Protecting financial institutions from banking malware's man-in-the-browser attacks.avi

61.3 MB

Quantifying maliciousness in Alexa top-ranked domains.avi

51.1 MB

Smart home appliance security & malware.avi

92.7 MB

Sweeping the IP space the hunt for evil on the Internet.avi

48.0 MB

Swipe away, we're watching you.avi

68.6 MB

The evolution of webinjects.avi

47.0 MB

Unveiling the kernel rootkit discovery using selective automated kernel memory differencing.avi

55.4 MB

We know it before you do predicting malicious domains.avi

43.1 MB

Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists.avi

37.3 MB

/VB 2015 Prague/

A quantitative examination of the current state of corporate security practices.avi

58.8 MB

Android ransomware turning CryptoLocker into CryptoUnlocker.avi

55.2 MB

Anonymity is king.avi

69.8 MB

Attack on the drones security vulnerabilities of unmanned aerial vehicles.avi

65.0 MB

Breaking the bank(er) automated configuration data extraction for banking malware.avi

71.8 MB

Building a malware lab in the age of Big Data.avi

68.5 MB

C&C-as-a-Service abusing third-party web services as C&C channels.avi

56.5 MB

Can we trust a trustee An in-depth look into the digitally signed malware industry.avi

46.7 MB

DDoS trojan a malicious concept that conquered the ELF format.avi

65.6 MB

Dare 'DEVIL' beyond your senses with Dex Visualizer.avi

66.9 MB

Dead and buried in their crypts defeating modern ransomware.avi

68.1 MB

Digital 'Bian Lian' (face changing) the skeleton key malware.avi

72.4 MB

Does prevalence matter Ranking anti-malware products by potential victim impact.avi

68.2 MB

Doing more with less a study of file-less infection attacks.avi

65.1 MB

Economic sanctions on malware.avi

95.5 MB

Effectively testing APT defences.avi

59.2 MB

Evolution of Android exploits from a static analysis tools perspective.avi

46.1 MB

From Asia with love Smartphones with pre-installed malware.avi

74.3 MB

How they're getting the data out of your network.avi

23.8 MB

It has a EULA, it must be legit.avi

39.1 MB

It's a file infector... it's ransomware... it's Virlock.avi

57.5 MB

Keynote address One man's anti-malware researcher is....avi

100.9 MB

Labeless - no more.avi

47.3 MB

Last-minute paper Operation Potao Express analysis of a cyber-espionage toolkit.avi

67.0 MB

Last-minute paper The mysterious case of Linux.Wifatch.avi

76.4 MB

Linux Moose endangered or extinct An update on this atypical embedded Linux botnet.avi

60.7 MB

Making a dent in Russian mobile banking phishing.avi

57.0 MB

Mobile banking fraud via SMS in North America who's doing it and how.avi

70.5 MB

Modelling the network behaviour of malware to block malicious patterns.avi

72.8 MB

Notes on click fraud American story.avi

43.3 MB

POS fraud - trends and counter-actions to mass fraud.avi

70.9 MB

ROSCO Repository Of Signed COde.avi

79.4 MB

Sizing cybercrime incidents and accidents, hints and allegations.avi

65.2 MB

Solving the (in)security of home networked devices.avi

67.0 MB

Speaking Dyreza protocol. Advantages of 'learning' a new language.avi

62.1 MB

Tech Support Scams 2.0 an inside look into the evolution of the classic Microsoft tech support scam.avi

45.5 MB

The Internet of Bad Things, Observed.avi

79.2 MB

The Kobayashi Maru dilemma.avi

94.1 MB

The TAO of .NET and PowerShell malware analysis.avi

74.5 MB

The Unbearable Lightness of APTing.avi

74.0 MB

The Volatility Bot-Excavator.avi

31.2 MB

The elephant in the room.avi

75.3 MB

The ethics and perils of APT research an unexpected transition into intelligence brokerage.avi

82.0 MB

TurlaSat The Fault in our Stars.avi

64.0 MB

Ubiquity, security and you - malware, security and the Internet of Things.avi

45.4 MB

WaveAtlas surfing through the landscape of current malware packers.avi

64.6 MB

We know what you did this summer Android banking trojan exposing its sins in the cloud.avi

58.7 MB

Will Android trojan, worm or rootkit survive in SEAndroid and containerization.avi

51.2 MB

/VB 2016 Denver/

APT Reports and OPSEC Evolution, or These Are Not the APT Reports You Are Looking For.avi

62.5 MB

Defeating Sandbox Evasion How to Increase Successful Emulation Rate in your Virtualized Environment.avi

50.7 MB

Getting Duped Piggybacking on Webcam Streams for Surreptitious Recordings.avi

54.3 MB

Great Crypto Failures.avi

61.5 MB

Mobile Applications a Backdoor into Internet of Things.avi

41.4 MB

Modern Attacks on Russian Financial Institutions.avi

53.8 MB

Neverquest Crime as a Service and On the Hunt for the Big Bucks.avi

56.1 MB

Nymaim the Untold Story.avi

47.4 MB

On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users.avi

42.3 MB

One-Click Fileless Infection.avi

35.4 MB

Open Source Malware Lab.avi

42.2 MB

Wave Your False Flags! Deception Tactics Muddying Attribution in Targeted Attacks.avi

61.1 MB

/VB 2017 Madrid/

Battlefield Ukraine finding patterns behind summer cyber attacks.en.transcribed.srt

43.1 KB

Battlefield Ukraine finding patterns behind summer cyber attacks.mp4

58.3 MB

Beyond lexical and PDNS using signals on graphs to uncover online threats at scale.en.transcribed.srt

85.1 KB

Beyond lexical and PDNS using signals on graphs to uncover online threats at scale.mp4

45.8 MB

Consequences of bad security in health care.mp4

90.9 MB

Crypton - exposing malware's deepest secrets.mp4

117.5 MB

Gabor Szappanos wins fourth Peter Szor Award.en.transcribed.srt

21.6 KB

Gabor Szappanos wins fourth Peter Szor Award.mp4

36.3 MB

Industroyer biggest threat to industrial control systems since Stuxnet.en.transcribed.srt

63.0 KB

Industroyer biggest threat to industrial control systems since Stuxnet.mp4

85.1 MB

Last-minute paper FinFisher New techniques and infection vectors revealed.en.transcribed.srt

49.3 KB

Last-minute paper FinFisher New techniques and infection vectors revealed.mp4

69.3 MB

Last-minute paper Spora the saga continues a.k.a. how to ruin your research in a week.en.transcribed.srt

66.8 KB

Last-minute paper Spora the saga continues a.k.a. how to ruin your research in a week.mp4

82.8 MB

Modern reconnaissance phase on APT – protection layer.en.transcribed.srt

91.5 KB

Modern reconnaissance phase on APT – protection layer.mp4

84.8 MB

Nine circles of Cerber.en.transcribed.srt

74.0 KB

Nine circles of Cerber.mp4

97.3 MB

Offensive malware analysis dissecting OSX FruitFly via a custom C&C server.en.transcribed.srt

94.8 KB

Offensive malware analysis dissecting OSX FruitFly via a custom C&C server.mp4

73.4 MB

The router of all evil more than just default passwords and silly scripts.en.transcribed.srt

50.6 KB

The router of all evil more than just default passwords and silly scripts.mp4

60.6 MB

The sprawling market of consumer spyware.en.transcribed.srt

62.1 KB

The sprawling market of consumer spyware.mp4

91.8 MB

The state of cybersecurity in Africa Kenya.mp4

23.7 MB

Turning Trickbot decoding an encrypted command-and-control channel.en.transcribed.srt

76.9 KB

Turning Trickbot decoding an encrypted command-and-control channel.mp4

75.0 MB

VB2017 paper VirusTotal tips, tricks and myths.en.transcribed.srt

58.2 KB

VB2017 paper VirusTotal tips, tricks and myths.mp4

61.5 MB

Walking in your enemy's shadow when fourth-party collection becomes attribution hell.en.transcribed.srt

98.6 KB

Walking in your enemy's shadow when fourth-party collection becomes attribution hell.mp4

134.0 MB

/VB 2018 Montreal/

Analysing compiled binaries using logic.en.transcribed.srt

53.7 KB

Analysing compiled binaries using logic.mp4

36.2 MB

Behind the scenes of the SamSam investigation.en.transcribed.srt

66.8 KB

Behind the scenes of the SamSam investigation.mp4

56.2 MB

Botception hire a botnet to spread one's own botnet.en.transcribed.srt

44.4 KB

Botception hire a botnet to spread one's own botnet.mp4

28.0 MB

Draw me like one of your French APTs - expanding o.en.transcribed.srt

82.2 KB

Draw me like one of your French APTs - expanding o.mp4

45.6 MB

Foreverdays tracking and mitigating threats targeting civil society orgs.en.transcribed.srt

94.1 KB

Foreverdays tracking and mitigating threats targeting civil society orgs.mp4

89.7 MB

From Hacking Team to hacked team to….en.transcribed.srt

51.8 KB

From Hacking Team to hacked team to….mp4

52.8 MB

From drive-by download to drive-by mining understanding the new paradigm.en.transcribed.srt

73.4 KB

From drive-by download to drive-by mining understanding the new paradigm.mp4

51.1 MB

Hide'n'Seek an adaptive peer-to-peer IoT botnet.en.transcribed.srt

53.9 KB

Hide'n'Seek an adaptive peer-to-peer IoT botnet.mp4

33.6 MB

Internet balkanization why are we raising borders.en.transcribed.srt

73.5 KB

Internet balkanization why are we raising borders.mp4

42.5 MB

Little Brother is watching - we know all your secrets.en.transcribed.srt

74.7 KB

Little Brother is watching - we know all your secrets.mp4

45.1 MB

Now you see it, now you don't wipers in the wild.en.transcribed.srt

63.4 KB

Now you see it, now you don't wipers in the wild.mp4

48.4 MB

Office bugs on the rise.mp4

71.0 MB

Shedding skin - Turla's fresh faces.en.transcribed.srt

73.0 KB

Shedding skin - Turla's fresh faces.mp4

72.5 MB

The Big Bang Theory by APT-C-23.en.transcribed.srt

75.8 KB

The Big Bang Theory by APT-C-23.mp4

45.0 MB

The modality of mortality in domain names.en.transcribed.srt

66.8 KB

The modality of mortality in domain names.mp4

29.2 MB

The wolf in sheep's clothing - undressed.en.transcribed.srt

50.2 KB

The wolf in sheep's clothing - undressed.mp4

48.6 MB

Triada the past, the present and the (hopefully not existing) future.en.transcribed.srt

64.6 KB

Triada the past, the present and the (hopefully not existing) future.mp4

43.8 MB

Unpacking the packed unpacker reversing an Android.en.transcribed.srt

69.4 KB

Unpacking the packed unpacker reversing an Android.mp4

35.5 MB

Where have all the good hires gone.en.transcribed.srt

94.6 KB

Where have all the good hires gone.mp4

46.3 MB

Who wasn't responsible for Olympic Destroyer (Paul Rascagneres & Warren Mercer).en.transcribed.srt

69.6 KB

Who wasn't responsible for Olympic Destroyer (Paul Rascagneres & Warren Mercer).mp4

55.8 MB

/VB 2019 London/

A vine climbing over the Great Firewall a long-term attack against China.en.transcribed.srt

32.4 KB

A vine climbing over the Great Firewall a long-term attack against China.mp4

41.8 MB

Absolutely routed!! Why routers are the new bullseye in cyber attacks.mp4

51.0 MB

Buhtrap metamorphosis from cybercrime to cyber espionage.en.transcribed.srt

42.6 KB

Buhtrap metamorphosis from cybercrime to cyber espionage.mp4

58.9 MB

Exploring Emotet, an elaborate everyday enigma.en.transcribed.srt

45.0 KB

Exploring Emotet, an elaborate everyday enigma.mp4

62.2 MB

Geost botnet. The discovery story of a new Android banking trojan from an OpSec error.en.transcribed.srt

38.7 KB

Geost botnet. The discovery story of a new Android banking trojan from an OpSec error.mp4

56.4 MB

Keynote address The security products we deserve.en.transcribed.srt

74.0 KB

Keynote address The security products we deserve.mp4

98.1 MB

Oops! It happened again!.mp4

69.1 MB

Shinigami's revenge the long tail of Ryuk malware.en.transcribed.srt

39.5 KB

Shinigami's revenge the long tail of Ryuk malware.mp4

61.9 MB

Thwarting Emotet email conversation thread hijacking with clustering.en.transcribed.srt

42.2 KB

Thwarting Emotet email conversation thread hijacking with clustering.mp4

45.6 MB

Webcam interception and protection in kernel mode in Windows.en.transcribed.srt

48.4 KB

Webcam interception and protection in kernel mode in Windows.mp4

54.4 MB

/

Virus Bulletin thank you.txt

1.0 KB

VirusBulletin logo.png

10.7 KB

 

Total files 214


Copyright © 2025 FileMood.com