/VB 1991 Jersey/
|
1991-conferencereport.pdf
|
1.6 MB
|
img001_595.jpg
|
110.3 KB
|
img002_595.jpg
|
116.2 KB
|
img003_595.jpg
|
126.2 KB
|
/VB 1992 Edinburgh/
|
VB92report.pdf
|
2.4 MB
|
/VB 1993 Amsterdam/
|
VB93report.pdf
|
2.1 MB
|
img001_595.jpg
|
150.0 KB
|
img002_595.jpg
|
163.3 KB
|
img003_595.jpg
|
169.0 KB
|
img004_595.jpg
|
170.0 KB
|
img005_595.jpg
|
142.4 KB
|
img006_595.jpg
|
161.6 KB
|
img007_595.jpg
|
153.4 KB
|
img008_595.jpg
|
156.0 KB
|
/VB 2007 Vienna/
|
A different look at the VB2007 Conference in Vienna !.mp4
|
14.0 MB
|
/VB 2008 Ottawa/
|
Interview with John Hawes of Virus Bulletin.mp4
|
4.7 MB
|
Security experts answer key questions at Virus Bulletin 2008.mp4
|
3.7 MB
|
/VB 2009 Geneva/
|
The Virus Bulletin yodelling competition.mp4
|
1.9 MB
|
/VB 2010 Vancouver/
|
Costin Raiu on Virus Bulletin 2010.mp4
|
9.5 MB
|
Stuxnet demo in Virus Bulletin 2010 conference.mp4
|
3.6 MB
|
VB2010 Social Network and Computer Security Panel Discussion.mp4
|
25.4 MB
|
/VB 2012 Dallas/
|
Flashback OS X malware - VB2012 presentation by Broderick Aquilino (F-Secure).mp4
|
20.1 MB
|
Virus Bulletin 2012 Conference Overview.mp4
|
23.9 MB
|
/VB 2013 Berlin/
|
An automatic analysis and detection tool for Java exploits.mp4
|
20.3 MB
|
Analysis of Android in-app advertisement kits.mp4
|
35.7 MB
|
Back channels and bitcoins ZeroAccess' secret C&C communications.mp4
|
23.6 MB
|
Hacking Team and Gamma International in 'business-to-government malware'.mp4
|
26.9 MB
|
How to test properly comparative web filter tests.mp4
|
24.8 MB
|
Hypervisor-based, hardware-assisted system monitoring.mp4
|
24.9 MB
|
PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file).mp4
|
26.1 MB
|
Statistically effective protection against APT attacks.mp4
|
44.7 MB
|
Surviving 0-days - reducing the window of exposure.mp4
|
30.0 MB
|
VB2013 Keynote Ethics and the AV industry in the age of WikiLeaks.mp4
|
57.7 MB
|
/VB 2014 Seattle/
|
.NET malware dynamic instrumentation for automated and manual analysis.mp4
|
29.0 MB
|
An in-depth analysis of abuse on Twitter.mp4
|
28.4 MB
|
Android packer facing the challenges, building solutions.mp4
|
29.6 MB
|
Attack points in health apps & wearable devices - how safe is your quantified self.mp4
|
40.2 MB
|
Attack surface analysis of Tizen devices.mp4
|
24.9 MB
|
Back in BlackEnergy 2014 targeted attacks in the Ukraine and Poland.mp4
|
23.9 MB
|
Bootkits past, present & future.mp4
|
33.6 MB
|
Caphaw - the advanced persistent pluginer.mp4
|
25.6 MB
|
DMARC - how to use it to improve your email reputation.mp4
|
17.8 MB
|
DNSSEC - how far have we come.mp4
|
24.8 MB
|
Design to discover security analytics with 3D visualization engine.mp4
|
44.9 MB
|
Duping the machine - malware strategies, post sandbox detection.mp4
|
24.7 MB
|
Early launch Android malware your phone is 0wned (demo).mp4
|
2.2 MB
|
Early launch Android malware your phone is 0wned.mp4
|
1.2 MB
|
Hiding the network behind the network. Botnet proxy business model.mp4
|
22.1 MB
|
Labelling spam through the analysis of protocol patterns.mp4
|
27.2 MB
|
Leaving our ZIP undone how to abuse ZIP to deliver malware apps.avi
|
42.2 MB
|
Methods of malware persistence on Mac OS X.avi
|
48.0 MB
|
OPSEC for security researchers.avi
|
100.6 MB
|
Optimized mal-ops. Hack the ad network like a boss.avi
|
43.0 MB
|
P0wned by a barcode stealing money from offline users.avi
|
82.0 MB
|
Presentation of the 1st Peter Szor Award.avi
|
14.3 MB
|
Protecting financial institutions from banking malware's man-in-the-browser attacks.avi
|
61.3 MB
|
Quantifying maliciousness in Alexa top-ranked domains.avi
|
51.1 MB
|
Smart home appliance security & malware.avi
|
92.7 MB
|
Sweeping the IP space the hunt for evil on the Internet.avi
|
48.0 MB
|
Swipe away, we're watching you.avi
|
68.6 MB
|
The evolution of webinjects.avi
|
47.0 MB
|
Unveiling the kernel rootkit discovery using selective automated kernel memory differencing.avi
|
55.4 MB
|
We know it before you do predicting malicious domains.avi
|
43.1 MB
|
Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists.avi
|
37.3 MB
|
/VB 2015 Prague/
|
A quantitative examination of the current state of corporate security practices.avi
|
58.8 MB
|
Android ransomware turning CryptoLocker into CryptoUnlocker.avi
|
55.2 MB
|
Anonymity is king.avi
|
69.8 MB
|
Attack on the drones security vulnerabilities of unmanned aerial vehicles.avi
|
65.0 MB
|
Breaking the bank(er) automated configuration data extraction for banking malware.avi
|
71.8 MB
|
Building a malware lab in the age of Big Data.avi
|
68.5 MB
|
C&C-as-a-Service abusing third-party web services as C&C channels.avi
|
56.5 MB
|
Can we trust a trustee An in-depth look into the digitally signed malware industry.avi
|
46.7 MB
|
DDoS trojan a malicious concept that conquered the ELF format.avi
|
65.6 MB
|
Dare 'DEVIL' beyond your senses with Dex Visualizer.avi
|
66.9 MB
|
Dead and buried in their crypts defeating modern ransomware.avi
|
68.1 MB
|
Digital 'Bian Lian' (face changing) the skeleton key malware.avi
|
72.4 MB
|
Does prevalence matter Ranking anti-malware products by potential victim impact.avi
|
68.2 MB
|
Doing more with less a study of file-less infection attacks.avi
|
65.1 MB
|
Economic sanctions on malware.avi
|
95.5 MB
|
Effectively testing APT defences.avi
|
59.2 MB
|
Evolution of Android exploits from a static analysis tools perspective.avi
|
46.1 MB
|
From Asia with love Smartphones with pre-installed malware.avi
|
74.3 MB
|
How they're getting the data out of your network.avi
|
23.8 MB
|
It has a EULA, it must be legit.avi
|
39.1 MB
|
It's a file infector... it's ransomware... it's Virlock.avi
|
57.5 MB
|
Keynote address One man's anti-malware researcher is....avi
|
100.9 MB
|
Labeless - no more.avi
|
47.3 MB
|
Last-minute paper Operation Potao Express analysis of a cyber-espionage toolkit.avi
|
67.0 MB
|
Last-minute paper The mysterious case of Linux.Wifatch.avi
|
76.4 MB
|
Linux Moose endangered or extinct An update on this atypical embedded Linux botnet.avi
|
60.7 MB
|
Making a dent in Russian mobile banking phishing.avi
|
57.0 MB
|
Mobile banking fraud via SMS in North America who's doing it and how.avi
|
70.5 MB
|
Modelling the network behaviour of malware to block malicious patterns.avi
|
72.8 MB
|
Notes on click fraud American story.avi
|
43.3 MB
|
POS fraud - trends and counter-actions to mass fraud.avi
|
70.9 MB
|
ROSCO Repository Of Signed COde.avi
|
79.4 MB
|
Sizing cybercrime incidents and accidents, hints and allegations.avi
|
65.2 MB
|
Solving the (in)security of home networked devices.avi
|
67.0 MB
|
Speaking Dyreza protocol. Advantages of 'learning' a new language.avi
|
62.1 MB
|
Tech Support Scams 2.0 an inside look into the evolution of the classic Microsoft tech support scam.avi
|
45.5 MB
|
The Internet of Bad Things, Observed.avi
|
79.2 MB
|
The Kobayashi Maru dilemma.avi
|
94.1 MB
|
The TAO of .NET and PowerShell malware analysis.avi
|
74.5 MB
|
The Unbearable Lightness of APTing.avi
|
74.0 MB
|
The Volatility Bot-Excavator.avi
|
31.2 MB
|
The elephant in the room.avi
|
75.3 MB
|
The ethics and perils of APT research an unexpected transition into intelligence brokerage.avi
|
82.0 MB
|
TurlaSat The Fault in our Stars.avi
|
64.0 MB
|
Ubiquity, security and you - malware, security and the Internet of Things.avi
|
45.4 MB
|
WaveAtlas surfing through the landscape of current malware packers.avi
|
64.6 MB
|
We know what you did this summer Android banking trojan exposing its sins in the cloud.avi
|
58.7 MB
|
Will Android trojan, worm or rootkit survive in SEAndroid and containerization.avi
|
51.2 MB
|
/VB 2016 Denver/
|
APT Reports and OPSEC Evolution, or These Are Not the APT Reports You Are Looking For.avi
|
62.5 MB
|
Defeating Sandbox Evasion How to Increase Successful Emulation Rate in your Virtualized Environment.avi
|
50.7 MB
|
Getting Duped Piggybacking on Webcam Streams for Surreptitious Recordings.avi
|
54.3 MB
|
Great Crypto Failures.avi
|
61.5 MB
|
Mobile Applications a Backdoor into Internet of Things.avi
|
41.4 MB
|
Modern Attacks on Russian Financial Institutions.avi
|
53.8 MB
|
Neverquest Crime as a Service and On the Hunt for the Big Bucks.avi
|
56.1 MB
|
Nymaim the Untold Story.avi
|
47.4 MB
|
On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users.avi
|
42.3 MB
|
One-Click Fileless Infection.avi
|
35.4 MB
|
Open Source Malware Lab.avi
|
42.2 MB
|
Wave Your False Flags! Deception Tactics Muddying Attribution in Targeted Attacks.avi
|
61.1 MB
|
/VB 2017 Madrid/
|
Battlefield Ukraine finding patterns behind summer cyber attacks.en.transcribed.srt
|
43.1 KB
|
Battlefield Ukraine finding patterns behind summer cyber attacks.mp4
|
58.3 MB
|
Beyond lexical and PDNS using signals on graphs to uncover online threats at scale.en.transcribed.srt
|
85.1 KB
|
Beyond lexical and PDNS using signals on graphs to uncover online threats at scale.mp4
|
45.8 MB
|
Consequences of bad security in health care.mp4
|
90.9 MB
|
Crypton - exposing malware's deepest secrets.mp4
|
117.5 MB
|
Gabor Szappanos wins fourth Peter Szor Award.en.transcribed.srt
|
21.6 KB
|
Gabor Szappanos wins fourth Peter Szor Award.mp4
|
36.3 MB
|
Industroyer biggest threat to industrial control systems since Stuxnet.en.transcribed.srt
|
63.0 KB
|
Industroyer biggest threat to industrial control systems since Stuxnet.mp4
|
85.1 MB
|
Last-minute paper FinFisher New techniques and infection vectors revealed.en.transcribed.srt
|
49.3 KB
|
Last-minute paper FinFisher New techniques and infection vectors revealed.mp4
|
69.3 MB
|
Last-minute paper Spora the saga continues a.k.a. how to ruin your research in a week.en.transcribed.srt
|
66.8 KB
|
Last-minute paper Spora the saga continues a.k.a. how to ruin your research in a week.mp4
|
82.8 MB
|
Modern reconnaissance phase on APT – protection layer.en.transcribed.srt
|
91.5 KB
|
Modern reconnaissance phase on APT – protection layer.mp4
|
84.8 MB
|
Nine circles of Cerber.en.transcribed.srt
|
74.0 KB
|
Nine circles of Cerber.mp4
|
97.3 MB
|
Offensive malware analysis dissecting OSX FruitFly via a custom C&C server.en.transcribed.srt
|
94.8 KB
|
Offensive malware analysis dissecting OSX FruitFly via a custom C&C server.mp4
|
73.4 MB
|
The router of all evil more than just default passwords and silly scripts.en.transcribed.srt
|
50.6 KB
|
The router of all evil more than just default passwords and silly scripts.mp4
|
60.6 MB
|
The sprawling market of consumer spyware.en.transcribed.srt
|
62.1 KB
|
The sprawling market of consumer spyware.mp4
|
91.8 MB
|
The state of cybersecurity in Africa Kenya.mp4
|
23.7 MB
|
Turning Trickbot decoding an encrypted command-and-control channel.en.transcribed.srt
|
76.9 KB
|
Turning Trickbot decoding an encrypted command-and-control channel.mp4
|
75.0 MB
|
VB2017 paper VirusTotal tips, tricks and myths.en.transcribed.srt
|
58.2 KB
|
VB2017 paper VirusTotal tips, tricks and myths.mp4
|
61.5 MB
|
Walking in your enemy's shadow when fourth-party collection becomes attribution hell.en.transcribed.srt
|
98.6 KB
|
Walking in your enemy's shadow when fourth-party collection becomes attribution hell.mp4
|
134.0 MB
|
/VB 2018 Montreal/
|
Analysing compiled binaries using logic.en.transcribed.srt
|
53.7 KB
|
Analysing compiled binaries using logic.mp4
|
36.2 MB
|
Behind the scenes of the SamSam investigation.en.transcribed.srt
|
66.8 KB
|
Behind the scenes of the SamSam investigation.mp4
|
56.2 MB
|
Botception hire a botnet to spread one's own botnet.en.transcribed.srt
|
44.4 KB
|
Botception hire a botnet to spread one's own botnet.mp4
|
28.0 MB
|
Draw me like one of your French APTs - expanding o.en.transcribed.srt
|
82.2 KB
|
Draw me like one of your French APTs - expanding o.mp4
|
45.6 MB
|
Foreverdays tracking and mitigating threats targeting civil society orgs.en.transcribed.srt
|
94.1 KB
|
Foreverdays tracking and mitigating threats targeting civil society orgs.mp4
|
89.7 MB
|
From Hacking Team to hacked team to….en.transcribed.srt
|
51.8 KB
|
From Hacking Team to hacked team to….mp4
|
52.8 MB
|
From drive-by download to drive-by mining understanding the new paradigm.en.transcribed.srt
|
73.4 KB
|
From drive-by download to drive-by mining understanding the new paradigm.mp4
|
51.1 MB
|
Hide'n'Seek an adaptive peer-to-peer IoT botnet.en.transcribed.srt
|
53.9 KB
|
Hide'n'Seek an adaptive peer-to-peer IoT botnet.mp4
|
33.6 MB
|
Internet balkanization why are we raising borders.en.transcribed.srt
|
73.5 KB
|
Internet balkanization why are we raising borders.mp4
|
42.5 MB
|
Little Brother is watching - we know all your secrets.en.transcribed.srt
|
74.7 KB
|
Little Brother is watching - we know all your secrets.mp4
|
45.1 MB
|
Now you see it, now you don't wipers in the wild.en.transcribed.srt
|
63.4 KB
|
Now you see it, now you don't wipers in the wild.mp4
|
48.4 MB
|
Office bugs on the rise.mp4
|
71.0 MB
|
Shedding skin - Turla's fresh faces.en.transcribed.srt
|
73.0 KB
|
Shedding skin - Turla's fresh faces.mp4
|
72.5 MB
|
The Big Bang Theory by APT-C-23.en.transcribed.srt
|
75.8 KB
|
The Big Bang Theory by APT-C-23.mp4
|
45.0 MB
|
The modality of mortality in domain names.en.transcribed.srt
|
66.8 KB
|
The modality of mortality in domain names.mp4
|
29.2 MB
|
The wolf in sheep's clothing - undressed.en.transcribed.srt
|
50.2 KB
|
The wolf in sheep's clothing - undressed.mp4
|
48.6 MB
|
Triada the past, the present and the (hopefully not existing) future.en.transcribed.srt
|
64.6 KB
|
Triada the past, the present and the (hopefully not existing) future.mp4
|
43.8 MB
|
Unpacking the packed unpacker reversing an Android.en.transcribed.srt
|
69.4 KB
|
Unpacking the packed unpacker reversing an Android.mp4
|
35.5 MB
|
Where have all the good hires gone.en.transcribed.srt
|
94.6 KB
|
Where have all the good hires gone.mp4
|
46.3 MB
|
Who wasn't responsible for Olympic Destroyer (Paul Rascagneres & Warren Mercer).en.transcribed.srt
|
69.6 KB
|
Who wasn't responsible for Olympic Destroyer (Paul Rascagneres & Warren Mercer).mp4
|
55.8 MB
|
/VB 2019 London/
|
A vine climbing over the Great Firewall a long-term attack against China.en.transcribed.srt
|
32.4 KB
|
A vine climbing over the Great Firewall a long-term attack against China.mp4
|
41.8 MB
|
Absolutely routed!! Why routers are the new bullseye in cyber attacks.mp4
|
51.0 MB
|
Buhtrap metamorphosis from cybercrime to cyber espionage.en.transcribed.srt
|
42.6 KB
|
Buhtrap metamorphosis from cybercrime to cyber espionage.mp4
|
58.9 MB
|
Exploring Emotet, an elaborate everyday enigma.en.transcribed.srt
|
45.0 KB
|
Exploring Emotet, an elaborate everyday enigma.mp4
|
62.2 MB
|
Geost botnet. The discovery story of a new Android banking trojan from an OpSec error.en.transcribed.srt
|
38.7 KB
|
Geost botnet. The discovery story of a new Android banking trojan from an OpSec error.mp4
|
56.4 MB
|
Keynote address The security products we deserve.en.transcribed.srt
|
74.0 KB
|
Keynote address The security products we deserve.mp4
|
98.1 MB
|
Oops! It happened again!.mp4
|
69.1 MB
|
Shinigami's revenge the long tail of Ryuk malware.en.transcribed.srt
|
39.5 KB
|
Shinigami's revenge the long tail of Ryuk malware.mp4
|
61.9 MB
|
Thwarting Emotet email conversation thread hijacking with clustering.en.transcribed.srt
|
42.2 KB
|
Thwarting Emotet email conversation thread hijacking with clustering.mp4
|
45.6 MB
|
Webcam interception and protection in kernel mode in Windows.en.transcribed.srt
|
48.4 KB
|
Webcam interception and protection in kernel mode in Windows.mp4
|
54.4 MB
|
/
|
Virus Bulletin thank you.txt
|
1.0 KB
|
VirusBulletin logo.png
|
10.7 KB
|
Total files 214
|