589689.xyz

Virus Bulletin

  • 收录时间:2024-06-22 01:41:55
  • 文件大小:8GB
  • 下载次数:1
  • 最近下载:2024-06-22 01:41:55
  • 磁力链接:

文件列表

  1. VB 2021 Virtual/VB2021 localhost Day #1 live track.mp4 424MB
  2. VB 2021 Virtual/VB2021 localhost Day #2 live track.mp4 408MB
  3. VB 2018 Montreal/Adware is just malware with a legal department.mp4 64MB
  4. VB 2021 Virtual/CTO (Call Tree Overviewer) yet another function call tree viewer.mp4 58MB
  5. VB 2021 Virtual/Endpoint security checkbox a stealthy approach to cyberdefence.mp4 53MB
  6. VB 2021 Virtual/From match fixing to data exfiltration - a story of Messaging as a Service (MaaS).mp4 51MB
  7. VB 2021 Virtual/A deep dive into Water Roc, one of the most relentless ransomware groups.mp4 51MB
  8. VB 2021 Virtual/STK, A-OK Stopping messaging attacks on vulnerable SIMs.mp4 48MB
  9. VB 2021 Virtual/Pay2Key - the newly discovered ransomware traced all the way to Iran.mp4 47MB
  10. VB 2022 Prague/Keynote address Why are you telling me this Hakan Tanriverdi Bayerischer Rundfunk.mp4 47MB
  11. VB 2021 Virtual/All roads lead to Rome the Conti manual leak dissection.mp4 47MB
  12. VB 2018 Montreal/Foreverdays tracking and mitigating threats targeting civil society orgs.mp4 46MB
  13. VB 2021 Virtual/Bugs in malware - uncovering vulnerabilities found in malware payloads.mp4 46MB
  14. VB 2021 Virtual/Evolution after prosecution Psychedelic APT41.mp4 46MB
  15. VB 2021 Threat Intelligence Practitioner Summit/Fireside chat Good times, bad times, you know I’ve had my share.mp4 46MB
  16. VB 2020 Virtual/Fireside Chat Comfortably Numb.mp4 45MB
  17. VB 2018 Montreal/Fake News, Inc.mp4 45MB
  18. VB 2018 Montreal/Office bugs on the rise.mp4 44MB
  19. VB 2021 Virtual/The keksec botnets we observed in the past year.mp4 43MB
  20. VB 2021 Virtual/The ‘Ghost Hand’ attack.mp4 42MB
  21. VB 2021 Virtual/ShadowPad the masterpiece of privately sold malware in Chinese espionage.mp4 42MB
  22. VB 2022 Prague/Unmasking WindTape Patrick Wardle Objective See.mp4 41MB
  23. VB 2022 Prague/SHAREM shellcode analysis framework with emulation, a disassembler, and timeless debugging VERONA La.mp4 41MB
  24. VB 2019 London/Keynote address The security products we deserve.mp4 41MB
  25. VB 2021 Threat Intelligence Practitioner Summit/Now you see me, now you don’t.mp4 41MB
  26. VB 2021 Virtual/UNC788 Iran’s decade of credential harvesting and surveillance operations.mp4 40MB
  27. VB 2022 Prague/Lessons learned from six Lapsus$ incident responses Gabriela Nicolao & Santiago Abastante Deloitte.mp4 40MB
  28. VB 2021 Virtual/Hunting web skimmers with VirusTotal and YARA.mp4 40MB
  29. VB 2021 Virtual/Where is the cuckoo egg.mp4 40MB
  30. VB 2021 Virtual/Reverse Android malware like a Jedi Master.mp4 39MB
  31. VB 2020 Virtual/Evolution of Excel 4.0 Macro Weaponization.mp4 39MB
  32. VB 2021 Virtual/When malware changed its mind an empirical study of variable program behaviours in the real world.mp4 39MB
  33. VB 2020 Virtual/Panel Flattening the Curve of Cyber-Risks.mp4 38MB
  34. VB 2022 Prague/Russian wipers in the cyberwar against Ukraine Alexander Adamov NioGuard Security Lab.mp4 38MB
  35. VB 2018 Montreal/Shedding skin - Turla's fresh faces.mp4 38MB
  36. VB 2018 Montreal/From drive-by download to drive-by mining understanding the new paradigm.mp4 38MB
  37. VB 2015 Prague/Keynote address One man's anti-malware researcher is.mp4 38MB
  38. VB 2018 Montreal/Lazarus Group one mahjong game played with different sets of tiles.mp4 38MB
  39. VB 2021 Virtual/SubCrawl - a framework for the analysis and clustering of hacking tools found using open directories.mp4 37MB
  40. VB 2022 Prague/Hunting the AndroidBianLian botnet Axelle Apvrille Fortinet.mp4 37MB
  41. VB 2018 Montreal/Anatomy of an attack detecting and defeating CRASHOVERRIDE.mp4 37MB
  42. VB 2018 Montreal/Draw me like one of your French APTs - expanding our descriptive palette for digital threat actors.mp4 36MB
  43. VB 2018 Montreal/Little Brother is watching - we know all your secrets.mp4 36MB
  44. VB 2021 Virtual/Your five most critical M365 vulnerabilities revealed and how to fix them (Partner Content).mp4 36MB
  45. VB 2022 Prague/Not Safe for Windows NSFW a China based threat with a lot to say Jono Davis PwC.mp4 35MB
  46. VB 2018 Montreal/From Hacking Team to hacked team to.mp4 35MB
  47. VB 2019 London/The Bagsu banker case.mp4 35MB
  48. VB 2014 Seattle/Smart home appliance security & malware.mp4 35MB
  49. VB 2020 Virtual/Emerging trends in malware downloaders.mp4 35MB
  50. VB 2022 Prague/Zeroing in on XENOTIME analysis of the entities responsible for the Triton event Joe Slowik Gigamon.mp4 34MB
  51. VB 2018 Montreal/Android app deobfuscation using static-dynamic cooperation.mp4 34MB
  52. VB 2018 Montreal/The Big Bang Theory by APT-C-23.mp4 34MB
  53. VB 2021 Virtual/Uncovering automatic Obfuscation-as-a-Service for malicious Android applications.mp4 33MB
  54. VB 2018 Montreal/Who wasn’t responsible for Olympic Destroyer (Paul Rascagnères & Warren Mercer).mp4 33MB
  55. VB 2022 Prague/Exploit archaeology a forensic history of in the wild NSO Group exploits Donncha Ó Cearbhaill Amnest.mp4 33MB
  56. VB 2013 Berlin/VB2013 Keynote - Ethics and the AV industry in the age of WikiLeaks.mp4 33MB
  57. VB 2018 Montreal/Triada the past, the present and the (hopefully not existing) future.mp4 32MB
  58. VB 2014 Seattle/OPSEC for security researchers.mp4 32MB
  59. VB 2018 Montreal/Behind the scenes of the SamSam investigation.mp4 32MB
  60. VB 2021 Virtual/A detailed analysis of a new version of Darkside Ransomware (V. 2.1.2.3).mp4 32MB
  61. VB 2022 Prague/You OTA know combating malicious Android system updaters Łukasz Siewierski & Alec Guertin Google.mp4 32MB
  62. VB 2015 Prague/The Kobayashi Maru dilemma.mp4 32MB
  63. VB 2021 Threat Intelligence Practitioner Summit/New PlugX Fingerprint-THOR.mp4 31MB
  64. VB 2020 Virtual/Ransomware Evolution in LATAM.mp4 31MB
  65. VB 2020 Virtual/The (f)utility of indicators.mp4 31MB
  66. VB 2017 Madrid/VB2017 paper VirusTotal tips, tricks and myths.mp4 31MB
  67. VB 2021 Virtual/The baffling Berserk Bear a decade’s activity targeting critical infrastructure.mp4 31MB
  68. VB 2018 Montreal/Unpacking the packed unpacker reversing an Android anti-analysis library.mp4 31MB
  69. VB 2020 Virtual/Ramsay A cyber-espionage toolkit tailored for air-gapped networks.mp4 31MB
  70. VB 2015 Prague/Last-minute paper The mysterious case of Linux.Wifatch.mp4 31MB
  71. VB 2022 Prague/Sha Zhu Pan cocktail of cryptocurrency, social engineering and fake apps targeting Android and iPhon.mp4 31MB
  72. VB 2021 Threat Intelligence Practitioner Summit/Panel A tale of two companies.mp4 31MB
  73. VB 2015 Prague/Economic sanctions on malware.mp4 31MB
  74. VB 2015 Prague/Last-minute paper Operation Potao Express analysis of a cyber-espionage toolkit.mp4 31MB
  75. VB 2021 Virtual/Security the hidden cost of Android stalkerware.mp4 31MB
  76. VB 2016 Denver/Anti-malware Testing Undercover.mp4 31MB
  77. VB 2014 Seattle/P0wned by a barcode stealing money from offline users.mp4 31MB
  78. VB 2018 Montreal/The wolf in sheep's clothing - undressed.mp4 31MB
  79. VB 2017 Madrid/Walking in your enemy's shadow when fourth-party collection becomes attribution hell.mp4 30MB
  80. VB 2015 Prague/ROSCO Repository Of Signed COde.mp4 30MB
  81. VB 2022 Prague/Lazarus & BYOVD evil to the Windows core Peter Kalnai & Matěj Havránek ESET.mp4 30MB
  82. VB 2019 London/Attribution is in the object using RTF object dimensions to track APT phishing weaponizers.mp4 30MB
  83. VB 2016 Denver/Modern Attacks on Russian Financial Institutions.mp4 30MB
  84. VB 2022 Prague/Operation Dragon Castling suspected APT group hijacks WPS Office updater to target East Asian bettin.mp4 30MB
  85. VB 2018 Montreal/The modality of mortality in domain names.mp4 30MB
  86. VB 2014 Seattle/Swipe away, we're watching you.mp4 30MB
  87. VB 2021 Threat Intelligence Practitioner Summit/Peak Analyzer an automated malware campaign detector.mp4 29MB
  88. VB 2015 Prague/Attack on the drones security vulnerabilities of unmanned aerial vehicles.mp4 29MB
  89. VB 2012 Dallas/Flashback OS X malware - VB2012 presentation by Broderick Aquilino (F-Secure).mp4 29MB
  90. VB 2015 Prague/DDoS trojan a malicious concept that conquered the ELF format.mp4 29MB
  91. VB 2020 Virtual/Hidden risks of advertisements.mp4 29MB
  92. VB 2018 Montreal/Now you see it, now you don't wipers in the wild.mp4 29MB
  93. VB 2017 Madrid/The life story of an IPT - Inept Persistent Threat actor.mp4 29MB
  94. VB 2015 Prague/Breaking the bank(er) automated configuration data extraction for banking malware.mp4 29MB
  95. VB 2019 London/Static analysis methods for detection of Microsoft Office exploits.mp4 29MB
  96. VB 2019 London/Never before had Stierlitz been so close to failure.mp4 29MB
  97. VB 2018 Montreal/Internet balkanization why are we raising borders online.mp4 29MB
  98. VB 2015 Prague/Modelling the network behaviour of malware to block malicious patterns.mp4 28MB
  99. VB 2015 Prague/Android ransomware turning CryptoLocker into CryptoUnlocker.mp4 28MB
  100. VB 2021 Threat Intelligence Practitioner Summit/Keynote Learning from failure ransomware and future conflicts.mp4 28MB
  101. VB 2017 Madrid/Crypton - exposing malware's deepest secrets.mp4 28MB
  102. VB 2019 London/Rich headers leveraging the mysterious artifact of the PE format.mp4 28MB
  103. VB 2021 Virtual/LazyScripter from Empire to double RAT.mp4 28MB
  104. VB 2022 Prague/Combating control flow flattening in - NET malware Georgy Kucherin Kaspersky.mp4 28MB
  105. VB 2016 Denver/Last-minute paper A Malicious OS X Cocktail Served from a Tain'ted Bottle.mp4 28MB
  106. VB 2015 Prague/It's a file infector it's ransomware it's Virlock.mp4 28MB
  107. VB 2015 Prague/Linux Moose endangered or extinct An update on this atypical embedded Linux botnet.mp4 28MB
  108. VB 2022 Prague/Uncovering a broad criminal ecosystem powered by one of the largest botnets, Glupteba Luca Nagy Goog.mp4 28MB
  109. VB 2020 Virtual/Advanced Pasta Threat mapping threat actor usage of open-source offensive security tools.mp4 28MB
  110. VB 2021 Threat Intelligence Practitioner Summit/Operation Diànxùn a cyberespionage campaign targeting telecommunication companies.mp4 28MB
  111. VB 2017 Madrid/Beyond lexical and PDNS using signals on graphs to uncover online threats at scale.mp4 28MB
  112. VB 2015 Prague/The Unbearable Lightness of APTing.mp4 28MB
  113. VB 2020 Virtual/Opening Keynote Collaborating with Competitors A Better Strategy to Beat Adversaries.mp4 27MB
  114. VB 2019 London/Cyber espionage in the Middle East unravelling OSX.WindTail.mp4 27MB
  115. VB 2015 Prague/POS fraud - trends and counter-actions to mass fraud.mp4 27MB
  116. VB 2015 Prague/From Asia with love Smartphones with pre-installed malware.mp4 27MB
  117. VB 2020 Virtual/Operation LagTime IT colourful Panda footprint.mp4 27MB
  118. VB 2019 London/APT cases exploiting vulnerabilities in region-specific software.mp4 27MB
  119. VB 2015 Prague/Anonymity is king.mp4 27MB
  120. VB 2019 London/Medical IoT for diabetes and cybercrime.mp4 27MB
  121. VB 2019 London/Oops It happened again.mp4 27MB
  122. VB 2015 Prague/The TAO of .NET and PowerShell malware analysis.mp4 27MB
  123. VB 2021 Threat Intelligence Practitioner Summit/The use of dark patterns and psychological tricks in Android malware.mp4 27MB
  124. VB 2015 Prague/C&C-as-a-Service abusing third-party web services as C&C channels.mp4 27MB
  125. VB 2022 Prague/The long arm of the prisoner social engineering from Kenyan prisons Patricia Musomba.mp4 27MB
  126. VB 2016 Denver/The Beginning of the End(point) Where we are now and where we'll be in five years.mp4 27MB
  127. VB 2015 Prague/The elephant in the room.mp4 27MB
  128. VB 2018 Montreal/Levelling up why sharing threat intelligence makes you more competitive.mp4 27MB
  129. VB 2019 London/A vine climbing over the Great Firewall a long-term attack against China.mp4 27MB
  130. VB 2016 Denver/APT Reports and OPSEC Evolution, or These Are Not the APT Reports You Are Looking For.mp4 26MB
  131. VB 2015 Prague/Sizing cybercrime incidents and accidents, hints and allegations.mp4 26MB
  132. VB 2021 Virtual/Ransomware a correlation between infection vectors and victims.mp4 26MB
  133. VB 2015 Prague/We know what you did this summer Android banking trojan exposing its sins in the cloud.mp4 26MB
  134. VB 2015 Prague/Does prevalence matter Ranking anti-malware products by potential victim impact.mp4 26MB
  135. VB 2019 London/2,000 reactions to a malware attack - accidental study.mp4 26MB
  136. VB 2019 London/Pulling the PKPLUG the adversary playbook for the long-standing espionage activity of.mp4 26MB
  137. VB 2015 Prague/Solving the (in)security of home networked devices.mp4 26MB
  138. VB 2017 Madrid/Nine circles of Cerber.mp4 26MB
  139. VB 2022 Prague/Encryption time flies when you're having fun the case of the exotic BlackCat ransomware Aleksandar M.mp4 26MB
  140. VB 2015 Prague/Doing more with less a study of file-less infection attacks.mp4 26MB
  141. VB 2022 Prague/Tracking the entire iceberg - long term APT malware C2 protocol emulation and scanning Takahiro Haru.mp4 26MB
  142. VB 2017 Madrid/Modern reconnaissance phase on APT - protection layer.mp4 26MB
  143. VB 2015 Prague/WaveAtlas surfing through the landscape of current malware packers.mp4 26MB
  144. VB 2021 Virtual/Operation Newton Hi Kimsuky Did an Apple(seed) really fall on Newton’s head.mp4 26MB
  145. VB 2021 Virtual/Operation Bookcodes - targeting South Korea.mp4 26MB
  146. VB 2020 Virtual/Take care, spyware is slipping into your phones through Operation Poisoned News.mp4 26MB
  147. VB 2019 London/Webcam interception and protection in kernel mode in Windows.mp4 26MB
  148. VB 2018 Montreal/Under the hood - the automotive challenge.mp4 25MB
  149. VB 2019 London/Exploring Emotet, an elaborate everyday enigma.mp4 25MB
  150. VB 2015 Prague/Dead and buried in their crypts defeating modern ransomware.mp4 25MB
  151. VB 2016 Denver/Neverquest Crime as a Service and On the Hunt for the Big Bucks.mp4 25MB
  152. VB 2021 Virtual/Threat hunting from SolarWinds to Hafnium APT.mp4 25MB
  153. VB 2015 Prague/Speaking Dyreza protocol. Advantages of 'learning' a new language.mp4 25MB
  154. VB 2017 Madrid/Last-minute paper Spora the saga continues a.k.a. how to ruin your research in a week.mp4 25MB
  155. VB 2014 Seattle/Attack points in health apps & wearable devices - how safe is your quantified self.mp4 25MB
  156. VB 2014 Seattle/Attack surface analysis of Tizen devices.mp4 25MB
  157. VB 2019 London/Play fuzzing machine - hunting iOS and macOS kernel vulnerabilities automatically and smartly.mp4 25MB
  158. VB 2016 Denver/Great Crypto Failures.mp4 25MB
  159. VB 2020 Virtual/Unveiling the CryptoMimic.mp4 25MB
  160. VB 2020 Virtual/Behind the Black Mirror Simulating attacks with mock C2 servers.mp4 25MB
  161. VB 2015 Prague/Dare 'DEVIL' beyond your senses with Dex Visualizer.mp4 25MB
  162. VB 2017 Madrid/Industroyer biggest threat to industrial control systems since Stuxnet.mp4 25MB
  163. VB 2015 Prague/TurlaSat The Fault in our Stars.mp4 25MB
  164. VB 2020 Virtual/Compromising IOT C&C Panels for Unearthing Infections.mp4 25MB
  165. VB 2015 Prague/Will Android trojan, worm or rootkit survive in SEAndroid and containerization.mp4 25MB
  166. VB 2019 London/Absolutely routed Why routers are the new bullseye in cyber attacks.mp4 24MB
  167. VB 2015 Prague/Ubiquity, security and you - malware, security and the Internet of Things.mp4 24MB
  168. VB 2014 Seattle/Sweeping the IP space the hunt for evil on the Internet.mp4 24MB
  169. VB 2015 Prague/A quantitative examination of the current state of corporate security practices.mp4 24MB
  170. VB 2020 Virtual/Creating Network Effects Intelligence Sharing for Supply Chain Security.mp4 24MB
  171. VB 2016 Denver/Getting Duped Piggybacking on Webcam Streams for Surreptitious Recordings.mp4 24MB
  172. VB 2021 Threat Intelligence Practitioner Summit/Where’s your data Ransomware protecting your ICS environment.mp4 24MB
  173. VB 2016 Denver/Defeating Sandbox Evasion How to Increase Successful Emulation Rate in your Virtualized Environment.mp4 24MB
  174. VB 2019 London/The cake is a lie Uncovering the secret world of malware-like cheats in video games.mp4 24MB
  175. VB 2022 Prague/Creepy things that glow in the dark a deep look @ POLONIUM's undocumented tools Robert Lipovsky ESET.mp4 24MB
  176. VB 2014 Seattle/Design to discover security analytics with 3D visualization engine.mp4 24MB
  177. VB 2017 Madrid/Consequences of bad security in health care.mp4 24MB
  178. VB 2020 Virtual/Lightweight emulation based IoC extraction for Gafgyt botnets.mp4 24MB
  179. VB 2017 Madrid/Client Maximus raises the bar.mp4 24MB
  180. VB 2019 London/Shinigami's revenge the long tail of Ryuk malware.mp4 24MB
  181. VB 2014 Seattle/Methods of malware persistence on Mac OS X.mp4 24MB
  182. VB 2014 Seattle/Bootkits past, present & future.mp4 24MB
  183. VB 2015 Prague/Inside recent FQDN (Fully Qualified Domain Name) surges on the Internet.mp4 24MB
  184. VB 2014 Seattle/An in-depth analysis of abuse on Twitter.mp4 24MB
  185. VB 2020 Virtual/Emissary (Pandas) in the Middle East.mp4 23MB
  186. VB 2017 Madrid/Offensive malware analysis dissecting OSX FruitFly via a custom C&C server.mp4 23MB
  187. VB 2021 Virtual/Sandworm reading the indictment between the lines.mp4 23MB
  188. VB 2015 Prague/Building a malware lab in the age of Big Data.mp4 23MB
  189. VB 2016 Denver/Malicious Proxy auto-configs An Easy Way to Harvest Banking Credentials.mp4 23MB
  190. VB 2019 London/Spoofing in the reeds with Rietspoof.mp4 23MB
  191. VB 2019 London/Abusing third-party cloud services in targeted attacks.mp4 23MB
  192. VB 2019 London/Buhtrap metamorphosis from cybercrime to cyber espionage.mp4 23MB
  193. VB 2020 Virtual/NetWalking on Sunshine.mp4 23MB
  194. VB 2019 London/Attor spy platform with curious GSM fingerprinting.mp4 23MB
  195. VB 2014 Seattle/Quantifying maliciousness in Alexa top-ranked domains.mp4 23MB
  196. VB 2014 Seattle/Unveiling the kernel rootkit discovery using selective automated kernel memory differencing.mp4 23MB
  197. VB 2019 London/Defeating APT10 compiler-level obfuscations.mp4 23MB
  198. VB 2020 Virtual/Payment required rare HTTP statuses and air-gaps avoidance from the authors of COMPFun.mp4 23MB
  199. VB 2019 London/Geost botnet. The discovery story of a new Android banking trojan from an OpSec error.mp4 22MB
  200. VB 2018 Montreal/Where have all the good hires gone.mp4 22MB
  201. VB 2020 Virtual/Another threat actor day.mp4 22MB
  202. VB 2017 Madrid/Browser attack points still abused by banking trojans.mp4 22MB
  203. VB 2016 Denver/Wave Your False Flags Deception Tactics Muddying Attribution in Targeted Attacks.mp4 22MB
  204. VB 2015 Prague/The evolution of ransomware from CryptoLocker to CryptoWall.mp4 22MB
  205. VB 2016 Denver/Building a Local PassiveDNS Capability for Malware Incident Response.mp4 22MB
  206. VB 2020 Virtual/Dissecting fleeceware apps the million-dollar money-making machine in Android and iOS.mp4 22MB
  207. VB 2017 Madrid/Turning Trickbot decoding an encrypted command-and-control channel.mp4 22MB
  208. VB 2014 Seattle/Hiding the network behind the network. Botnet proxy business model.mp4 22MB
  209. VB 2018 Montreal/Analysing compiled binaries using logic.mp4 22MB
  210. VB 2014 Seattle/Optimized mal-ops. Hack the ad network like a boss.mp4 22MB
  211. VB 2016 Denver/Nymaim the Untold Story.mp4 22MB
  212. VB 2014 Seattle/Leaving our ZIP undone how to abuse ZIP to deliver malware apps.mp4 22MB
  213. VB 2020 Virtual/Business Email Compromise - Scalable Attribution Powering Industry and Law Enforcement Collaboration.mp4 22MB
  214. VB 2019 London/Thwarting Emotet email conversation thread hijacking with clustering.mp4 21MB
  215. VB 2020 Virtual/German Angst - Cybercrime Ecosystem in the DACH Region.mp4 21MB
  216. VB 2013 Berlin/Statistically effective protection against APT attacks.mp4 21MB
  217. VB 2013 Berlin/An automatic analysis and detection tool for Java exploits.mp4 21MB
  218. VB 2017 Madrid/Last-minute paper FinFisher New techniques and infection vectors revealed.mp4 21MB
  219. VB 2014 Seattle/.NET malware dynamic instrumentation for automated and manual analysis.mp4 21MB
  220. VB 2016 Denver/Debugging and Monitoring Malware Network Activities with Haka.mp4 21MB
  221. VB 2021 Threat Intelligence Practitioner Summit/Incident response with an XDR.mp4 21MB
  222. VB 2017 Madrid/Exploring the virtual worlds of advergaming.mp4 21MB
  223. VB 2020 Virtual/A new open-source hypervisor-level malware monitoring and extraction system .mp4 21MB
  224. VB 2017 Madrid/Android reverse engineering tools not the usual suspects.mp4 21MB
  225. VB 2020 Virtual/Ghost Mach-O an analysis of Lazarus’ Mac-malware innovations.mp4 20MB
  226. VB 2019 London/A deep dive into iPhone exploit chains.mp4 20MB
  227. VB 2020 Virtual/Clandestine hunter two strategies for supply chain attack.mp4 20MB
  228. VB 2019 London/Finding drive-by rookies using an automated active observation platform.mp4 20MB
  229. VB 2020 Virtual/2030 backcasting the potential rise and fall of cyber threat intelligence.mp4 20MB
  230. VB 2014 Seattle/The evolution of webinjects.mp4 20MB
  231. VB 2018 Montreal/Hide'n'Seek an adaptive peer-to-peer IoT botnet.mp4 20MB
  232. VB 2020 Virtual/GuLoader No, CloudEyE. Flattening the attack curve of the top malicious dropper.mp4 20MB
  233. VB 2014 Seattle/Caphaw - the advanced persistent pluginer.mp4 20MB
  234. VB 2014 Seattle/Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists.mp4 20MB
  235. VB 2016 Denver/Mobile Applications a Backdoor into Internet of Things.mp4 20MB
  236. VB 2013 Berlin/Hypervisor-based, hardware-assisted system monitoring.mp4 19MB
  237. VB 2021 Virtual/Android stalkerware hunting automation, analysis and detection.mp4 19MB
  238. VB 2017 Madrid/The sprawling market of consumer spyware.mp4 19MB
  239. VB 2020 Virtual/Tracking Rapid Evolution Copycat of An APT RAT in Asia.mp4 19MB
  240. VB 2016 Denver/Open Source Malware Lab.mp4 19MB
  241. VB 2020 Virtual/Closing Keynote Threatscaping like a CERT.mp4 19MB
  242. VB 2015 Prague/Labeless - no more.mp4 19MB
  243. VB 2013 Berlin/Analysis of Android in-app advertisement kits.mp4 19MB
  244. VB 2014 Seattle/Duping the machine - malware strategies, post sandbox detection.mp4 19MB
  245. VB 2019 London/TIPS Keynote Nexus between OT and IT threat intelligence.mp4 19MB
  246. VB 2014 Seattle/Back in BlackEnergy 2014 targeted attacks in the Ukraine and Poland.mp4 19MB
  247. VB 2017 Madrid/The router of all evil more than just default passwords and silly scripts.mp4 19MB
  248. VB 2014 Seattle/Labelling spam through the analysis of protocol patterns.mp4 18MB
  249. VB 2019 London/Catch me if you can detection of injection exploitation by validating query and API integrity.mp4 18MB
  250. VB 2020 Virtual/Like bees to a honeypot - a journey through honeypots.mp4 18MB
  251. VB 2013 Berlin/Hacking Team and Gamma International in 'business-to-government malware'.mp4 18MB
  252. VB 2016 Denver/On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users.mp4 18MB
  253. VB 2017 Madrid/Battlefield Ukraine finding patterns behind summer cyber attacks.mp4 18MB
  254. VB 2018 Montreal/Botception hire a botnet to spread one's own botnet.mp4 18MB
  255. VB 2020 Virtual/She sells root shells by the C() shore.mp4 18MB
  256. VB 2013 Berlin/PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file).mp4 17MB
  257. VB 2014 Seattle/DNSSEC - how far have we come.mp4 17MB
  258. VB 2019 London/TIPS Keynote Building secure sharing systems that treat humans as features not bugs.mp4 17MB
  259. VB 2020 Virtual/TA505 attacking industries around the world.mp4 17MB
  260. VB 2020 Virtual/Standardized reporting with the Malware Behavior Catalog.mp4 17MB
  261. VB 2014 Seattle/We know it before you do predicting malicious domains.mp4 16MB
  262. VB 2016 Denver/One-Click Fileless Infection.mp4 16MB
  263. VB 2020 Virtual/One year later Challenges for young anti-malware products today.mp4 16MB
  264. VB 2013 Berlin/Surviving 0-days - reducing the window of exposure.mp4 16MB
  265. VB 2021 Virtual/Shades of Red RedXOR Linux backdoor and its Chinese origins.mp4 15MB
  266. VB 2016 Denver/Wild Android Collusions.mp4 15MB
  267. VB 2020 Virtual/Anchor, Bazar, and the Trickbot Connection.mp4 15MB
  268. VB 2020 Virtual/Chasing the Digital Pirates Unveiling the Container Threats.mp4 15MB
  269. VB 2020 Virtual/The rise of the info stealers.mp4 15MB
  270. VB 2020 Virtual/Most sophisticated technique of the year goes to.mp4 15MB
  271. VB 2015 Prague/The Volatility Bot-Excavator.mp4 14MB
  272. VB 2017 Madrid/The state of cybersecurity in Africa Kenya.mp4 14MB
  273. VB 2013 Berlin/Back channels and bitcoins ZeroAccess' secret C&C communications.mp4 13MB
  274. VB 2020 Virtual/Dancing samba with Dolphins tracking a Brazilian threat actor moving to Europe.mp4 13MB
  275. VB 2019 London/Exploring the Chinese DDoS landscape.mp4 13MB
  276. VB 2020 Virtual/Context Aware Detection The future of cybersecurity.mp4 13MB
  277. VB 2020 Virtual/Just in time, deception to detect Credential Stuffing Bot.mp4 12MB
  278. VB 2014 Seattle/DMARC - how to use it to improve your email reputation.mp4 12MB
  279. VB 2021 Threat Intelligence Practitioner Summit/Keynote The Community Effect.mp4 12MB
  280. VB 2020 Virtual/Transparency, Trust and Intention What dismantling the heart of cyberattack public attribution.mp4 12MB
  281. VB 2020 Virtual/Stealthy WastedLocker eluding behavior blockers, but not only.mp4 12MB
  282. VB 2010 Vancouver/VB2010 Social Network and Computer Security Panel Discussion.mp4 12MB
  283. VB 2017 Madrid/Gábor Szappanos wins fourth Peter Szőr Award.mp4 8MB
  284. VB 2012 Dallas/Virus Bulletin 2012 Conference Overview.mp4 7MB
  285. VB 2010 Vancouver/Costin Raiu on Virus Bulletin 2010.mp4 7MB
  286. VB 2007 Vienna/A different look at the VB2007 Conference in Vienna.mp4 6MB
  287. VB 2020 Virtual/The NExt Big Sur(ge) on macOS.mp4 6MB
  288. VB 2008 Ottawa/Interview with John Hawes of Virus Bulletin.mp4 4MB
  289. VB 2014 Seattle/Early launch Android malware your phone is 0wned.mp4 3MB
  290. VB 2008 Ottawa/Security experts answer key questions at Virus Bulletin 2008.mp4 3MB
  291. VB 2010 Vancouver/Stuxnet demo in Virus Bulletin 2010 conference.mp4 2MB
  292. VB 1992 Edinburgh/VB92report.pdf 2MB
  293. VB 1993 Amsterdam/VB93report.pdf 2MB
  294. VB 2009 Geneva/The Virus Bulletin yodelling competition.mp4 2MB
  295. VB 2014 Seattle/Early launch Android malware your phone is 0wned (demo).mp4 2MB
  296. VB 1991 Jersey/1991-conferencereport.pdf 2MB
  297. VB 1993 Amsterdam/img004_595.jpg 166KB
  298. VB 1993 Amsterdam/img003_595.jpg 165KB
  299. VB 1993 Amsterdam/img002_595.jpg 159KB
  300. VB 1993 Amsterdam/img006_595.jpg 158KB
  301. VB 1993 Amsterdam/img008_595.jpg 152KB
  302. VB 1993 Amsterdam/img007_595.jpg 150KB
  303. VB 1993 Amsterdam/img001_595.jpg 146KB
  304. VB 1993 Amsterdam/img005_595.jpg 139KB
  305. VB 1991 Jersey/img003_595.jpg 123KB
  306. VB 1991 Jersey/img002_595.jpg 113KB
  307. VB 1991 Jersey/img001_595.jpg 108KB
  308. VB 2020 Virtual/Fireside Chat Comfortably Numb.eng.srt 86KB
  309. VB 2018 Montreal/Adware is just malware with a legal department.eng.srt 78KB
  310. VB 2020 Virtual/Ramsay A cyber-espionage toolkit tailored for air-gapped networks.eng.srt 77KB
  311. VB 2021 Virtual/STK, A-OK Stopping messaging attacks on vulnerable SIMs.eng.srt 75KB
  312. VB 2020 Virtual/Advanced Pasta Threat mapping threat actor usage of open-source offensive security tools.eng.srt 75KB
  313. VB 2019 London/Keynote address The security products we deserve.eng.srt 72KB
  314. VB 2022 Prague/Keynote address Why are you telling me this Hakan Tanriverdi Bayerischer Rundfunk.eng.srt 71KB
  315. VB 2020 Virtual/Opening Keynote Collaborating with Competitors A Better Strategy to Beat Adversaries.eng.srt 70KB
  316. VB 2020 Virtual/Creating Network Effects Intelligence Sharing for Supply Chain Security.eng.srt 68KB
  317. VB 2020 Virtual/Compromising IOT C&C Panels for Unearthing Infections.eng.srt 66KB
  318. VB 2022 Prague/Exploit archaeology a forensic history of in the wild NSO Group exploits Donncha Ó Cearbhaill Amnest.eng.srt 64KB
  319. VB 2020 Virtual/Ransomware Evolution in LATAM.eng.srt 64KB
  320. VB 2015 Prague/Keynote address One man's anti-malware researcher is.eng.srt 64KB
  321. VB 2021 Virtual/Pay2Key - the newly discovered ransomware traced all the way to Iran.eng.srt 63KB
  322. VB 2018 Montreal/Fake News, Inc..eng.srt 63KB
  323. VB 2013 Berlin/VB2013 Keynote - Ethics and the AV industry in the age of WikiLeaks.eng.srt 63KB
  324. VB 2021 Virtual/Endpoint security checkbox a stealthy approach to cyberdefence.eng.srt 62KB
  325. VB 2016 Denver/Wave Your False Flags Deception Tactics Muddying Attribution in Targeted Attacks.eng.srt 62KB
  326. VB 2018 Montreal/Anatomy of an attack detecting and defeating CRASHOVERRIDE.eng.srt 62KB
  327. VB 2017 Madrid/Walking in your enemy's shadow when fourth-party collection becomes attribution hell.eng.srt 62KB
  328. VB 2019 London/TIPS Keynote Nexus between OT and IT threat intelligence.eng.srt 61KB
  329. VB 2017 Madrid/Offensive malware analysis dissecting OSX FruitFly via a custom C&C server.eng.srt 61KB
  330. VB 2018 Montreal/Where have all the good hires gone.eng.srt 60KB
  331. VB 2016 Denver/Getting Duped Piggybacking on Webcam Streams for Surreptitious Recordings.eng.srt 60KB
  332. VB 2018 Montreal/Foreverdays tracking and mitigating threats targeting civil society orgs.eng.srt 60KB
  333. VB 2019 London/TIPS Keynote Building secure sharing systems that treat humans as features not bugs.eng.srt 59KB
  334. VB 2019 London/Pulling the PKPLUG the adversary playbook for the long-standing espionage activity of.eng.srt 58KB
  335. VB 2020 Virtual/Business Email Compromise - Scalable Attribution Powering Industry and Law Enforcement Collaboration.eng.srt 58KB
  336. VB 2020 Virtual/2030 backcasting the potential rise and fall of cyber threat intelligence.eng.srt 58KB
  337. VB 2022 Prague/Zeroing in on XENOTIME analysis of the entities responsible for the Triton event Joe Slowik Gigamon.eng.srt 58KB
  338. VB 2015 Prague/Breaking the bank(er) automated configuration data extraction for banking malware.eng.srt 57KB
  339. VB 2019 London/Attribution is in the object using RTF object dimensions to track APT phishing weaponizers.eng.srt 57KB
  340. VB 2017 Madrid/Modern reconnaissance phase on APT - protection layer.eng.srt 56KB
  341. VB 2021 Virtual/A deep dive into Water Roc, one of the most relentless ransomware groups.eng.srt 56KB
  342. VB 2022 Prague/Hunting the AndroidBianLian botnet Axelle Apvrille Fortinet.eng.srt 56KB
  343. VB 2021 Virtual/Bugs in malware - uncovering vulnerabilities found in malware payloads.eng.srt 56KB
  344. VB 2022 Prague/Not Safe for Windows NSFW a China based threat with a lot to say Jono Davis PwC.eng.srt 56KB
  345. VB 2015 Prague/POS fraud - trends and counter-actions to mass fraud.eng.srt 55KB
  346. VB 2016 Denver/Neverquest Crime as a Service and On the Hunt for the Big Bucks.eng.srt 55KB
  347. VB 2021 Virtual/ShadowPad the masterpiece of privately sold malware in Chinese espionage.eng.srt 55KB
  348. VB 2015 Prague/The Kobayashi Maru dilemma.eng.srt 55KB
  349. VB 2020 Virtual/Panel Flattening the Curve of Cyber-Risks.eng.srt 55KB
  350. VB 2016 Denver/The Beginning of the End(point) Where we are now and where we'll be in five years.eng.srt 55KB
  351. VB 2021 Virtual/From match fixing to data exfiltration - a story of Messaging as a Service (MaaS).eng.srt 55KB
  352. VB 2019 London/2,000 reactions to a malware attack - accidental study.eng.srt 55KB
  353. VB 2014 Seattle/Unveiling the kernel rootkit discovery using selective automated kernel memory differencing.eng.srt 54KB
  354. VB 2019 London/A deep dive into iPhone exploit chains.eng.srt 54KB
  355. VB 2018 Montreal/The Big Bang Theory by APT-C-23.eng.srt 54KB
  356. VB 2014 Seattle/Attack surface analysis of Tizen devices.eng.srt 54KB
  357. VB 2022 Prague/SHAREM shellcode analysis framework with emulation, a disassembler, and timeless debugging VERONA La.eng.srt 54KB
  358. VB 2016 Denver/Great Crypto Failures.eng.srt 54KB
  359. VB 2017 Madrid/Beyond lexical and PDNS using signals on graphs to uncover online threats at scale.eng.srt 54KB
  360. VB 2015 Prague/Ubiquity, security and you - malware, security and the Internet of Things.eng.srt 53KB
  361. VB 2015 Prague/Modelling the network behaviour of malware to block malicious patterns.eng.srt 53KB
  362. VB 2015 Prague/Dead and buried in their crypts defeating modern ransomware.eng.srt 53KB
  363. VB 2016 Denver/APT Reports and OPSEC Evolution, or These Are Not the APT Reports You Are Looking For.eng.srt 53KB
  364. VB 2017 Madrid/Exploring the virtual worlds of advergaming.eng.srt 53KB
  365. VB 2018 Montreal/Draw me like one of your French APTs - expanding our descriptive palette for digital threat actors.eng.srt 52KB
  366. VB 2014 Seattle/Quantifying maliciousness in Alexa top-ranked domains.eng.srt 52KB
  367. VB 2014 Seattle/OPSEC for security researchers.eng.srt 52KB
  368. VB 2015 Prague/Last-minute paper The mysterious case of Linux.Wifatch.eng.srt 51KB
  369. VB 2018 Montreal/Under the hood - the automotive challenge.eng.srt 51KB
  370. VB 2022 Prague/You OTA know combating malicious Android system updaters Łukasz Siewierski & Alec Guertin Google.eng.srt 51KB
  371. VB 2016 Denver/Anti-malware Testing Undercover.eng.srt 51KB
  372. VB 2020 Virtual/Take care, spyware is slipping into your phones through Operation Poisoned News.eng.srt 50KB
  373. VB 2015 Prague/Building a malware lab in the age of Big Data.eng.srt 50KB
  374. VB 2022 Prague/Encryption time flies when you're having fun the case of the exotic BlackCat ransomware Aleksandar M.eng.srt 50KB
  375. VB 2014 Seattle/The evolution of webinjects.eng.srt 49KB
  376. VB 2020 Virtual/Another threat actor day.eng.srt 49KB
  377. VB 2015 Prague/C&C-as-a-Service abusing third-party web services as C&C channels.eng.srt 49KB
  378. VB 2015 Prague/Does prevalence matter Ranking anti-malware products by potential victim impact.eng.srt 49KB
  379. VB 2022 Prague/The long arm of the prisoner social engineering from Kenyan prisons Patricia Musomba.eng.srt 49KB
  380. VB 2020 Virtual/German Angst - Cybercrime Ecosystem in the DACH Region.eng.srt 49KB
  381. VB 2013 Berlin/Back channels and bitcoins ZeroAccess' secret C&C communications.eng.srt 49KB
  382. VB 2020 Virtual/A new open-source hypervisor-level malware monitoring and extraction system .eng.srt 49KB
  383. VB 2020 Virtual/TA505 attacking industries around the world.eng.srt 48KB
  384. VB 2022 Prague/Sha Zhu Pan cocktail of cryptocurrency, social engineering and fake apps targeting Android and iPhon.eng.srt 48KB
  385. VB 2015 Prague/Linux Moose endangered or extinct An update on this atypical embedded Linux botnet.eng.srt 48KB
  386. VB 2017 Madrid/Turning Trickbot decoding an encrypted command-and-control channel.eng.srt 48KB
  387. VB 2016 Denver/Modern Attacks on Russian Financial Institutions.eng.srt 48KB
  388. VB 2020 Virtual/Behind the Black Mirror Simulating attacks with mock C2 servers.eng.srt 48KB
  389. VB 2016 Denver/Defeating Sandbox Evasion How to Increase Successful Emulation Rate in your Virtualized Environment.eng.srt 48KB
  390. VB 2017 Madrid/Nine circles of Cerber.eng.srt 48KB
  391. VB 2018 Montreal/Little Brother is watching - we know all your secrets.eng.srt 48KB
  392. VB 2019 London/Webcam interception and protection in kernel mode in Windows.eng.srt 47KB
  393. VB 2019 London/Cyber espionage in the Middle East unravelling OSX.WindTail.eng.srt 47KB
  394. VB 2018 Montreal/From drive-by download to drive-by mining understanding the new paradigm.eng.srt 46KB
  395. VB 2018 Montreal/Shedding skin - Turla's fresh faces.eng.srt 46KB
  396. VB 2020 Virtual/Like bees to a honeypot - a journey through honeypots.eng.srt 46KB
  397. VB 2021 Virtual/The keksec botnets we observed in the past year.eng.srt 46KB
  398. VB 2021 Virtual/Evolution after prosecution Psychedelic APT41.eng.srt 46KB
  399. VB 2014 Seattle/Leaving our ZIP undone how to abuse ZIP to deliver malware apps.eng.srt 46KB
  400. VB 2022 Prague/Combating control flow flattening in - NET malware Georgy Kucherin Kaspersky.eng.srt 46KB
  401. VB 2019 London/Abusing third-party cloud services in targeted attacks.eng.srt 45KB
  402. VB 2021 Virtual/When malware changed its mind an empirical study of variable program behaviours in the real world.eng.srt 45KB
  403. VB 2020 Virtual/Context Aware Detection The future of cybersecurity.eng.srt 45KB
  404. VB 2018 Montreal/Internet balkanization why are we raising borders online.eng.srt 45KB
  405. VB 2022 Prague/Russian wipers in the cyberwar against Ukraine Alexander Adamov NioGuard Security Lab.eng.srt 45KB
  406. VB 2015 Prague/DDoS trojan a malicious concept that conquered the ELF format.eng.srt 45KB
  407. VB 2019 London/Static analysis methods for detection of Microsoft Office exploits.eng.srt 44KB
  408. VB 2022 Prague/Lazarus & BYOVD evil to the Windows core Peter Kalnai & Matěj Havránek ESET.eng.srt 44KB
  409. VB 2015 Prague/Economic sanctions on malware.eng.srt 44KB
  410. VB 2018 Montreal/Who wasn’t responsible for Olympic Destroyer (Paul Rascagnères & Warren Mercer).eng.srt 44KB
  411. VB 2016 Denver/Open Source Malware Lab.eng.srt 44KB
  412. VB 2015 Prague/A quantitative examination of the current state of corporate security practices.eng.srt 44KB
  413. VB 2019 London/Exploring Emotet, an elaborate everyday enigma.eng.srt 44KB
  414. VB 2015 Prague/Solving the (in)security of home networked devices.eng.srt 44KB
  415. VB 2015 Prague/The Unbearable Lightness of APTing.eng.srt 44KB
  416. VB 2018 Montreal/Unpacking the packed unpacker reversing an Android anti-analysis library.eng.srt 44KB
  417. VB 2014 Seattle/We know it before you do predicting malicious domains.eng.srt 44KB
  418. VB 2021 Virtual/Threat hunting from SolarWinds to Hafnium APT.eng.srt 44KB
  419. VB 2016 Denver/Mobile Applications a Backdoor into Internet of Things.eng.srt 44KB
  420. VB 2012 Dallas/Flashback OS X malware - VB2012 presentation by Broderick Aquilino (F-Secure).srt 44KB
  421. VB 2016 Denver/Malicious Proxy auto-configs An Easy Way to Harvest Banking Credentials.eng.srt 43KB
  422. VB 2016 Denver/Building a Local PassiveDNS Capability for Malware Incident Response.eng.srt 43KB
  423. VB 2015 Prague/The elephant in the room.eng.srt 43KB
  424. VB 2018 Montreal/Lazarus Group one mahjong game played with different sets of tiles.eng.srt 43KB
  425. VB 2019 London/Never before had Stierlitz been so close to failure.eng.srt 43KB
  426. VB 2022 Prague/Lessons learned from six Lapsus$ incident responses Gabriela Nicolao & Santiago Abastante Deloitte.eng.srt 43KB
  427. VB 2015 Prague/Sizing cybercrime incidents and accidents, hints and allegations.eng.srt 43KB
  428. VB 2019 London/Rich headers leveraging the mysterious artifact of the PE format.eng.srt 43KB
  429. VB 2022 Prague/Creepy things that glow in the dark a deep look @ POLONIUM's undocumented tools Robert Lipovsky ESET.eng.srt 43KB
  430. VB 2019 London/Attor spy platform with curious GSM fingerprinting.eng.srt 42KB
  431. VB 2020 Virtual/GuLoader No, CloudEyE. Flattening the attack curve of the top malicious dropper.eng.srt 42KB
  432. VB 2017 Madrid/The life story of an IPT - Inept Persistent Threat actor.eng.srt 42KB
  433. VB 2015 Prague/WaveAtlas surfing through the landscape of current malware packers.eng.srt 42KB
  434. VB 2017 Madrid/Client Maximus raises the bar.eng.srt 42KB
  435. VB 2016 Denver/Last-minute paper A Malicious OS X Cocktail Served from a Tain'ted Bottle.eng.srt 42KB
  436. VB 2018 Montreal/Behind the scenes of the SamSam investigation.eng.srt 42KB
  437. VB 2015 Prague/Anonymity is king.eng.srt 42KB
  438. VB 2018 Montreal/The modality of mortality in domain names.eng.srt 42KB
  439. VB 2014 Seattle/Design to discover security analytics with 3D visualization engine.eng.srt 42KB
  440. VB 2017 Madrid/Last-minute paper Spora the saga continues a.k.a. how to ruin your research in a week.eng.srt 42KB
  441. VB 2018 Montreal/Triada the past, the present and the (hopefully not existing) future.eng.srt 42KB
  442. VB 2015 Prague/Last-minute paper Operation Potao Express analysis of a cyber-espionage toolkit.eng.srt 42KB
  443. VB 2019 London/Buhtrap metamorphosis from cybercrime to cyber espionage.eng.srt 42KB
  444. VB 2021 Virtual/Where is the cuckoo egg.eng.srt 42KB
  445. VB 2020 Virtual/Anchor, Bazar, and the Trickbot Connection.eng.srt 41KB
  446. VB 2015 Prague/From Asia with love Smartphones with pre-installed malware.eng.srt 41KB
  447. VB 2014 Seattle/P0wned by a barcode stealing money from offline users.eng.srt 41KB
  448. VB 2016 Denver/Wild Android Collusions.eng.srt 41KB
  449. VB 2019 London/Thwarting Emotet email conversation thread hijacking with clustering.eng.srt 41KB
  450. VB 2020 Virtual/Transparency, Trust and Intention What dismantling the heart of cyberattack public attribution.eng.srt 41KB
  451. VB 2017 Madrid/Industroyer biggest threat to industrial control systems since Stuxnet.eng.srt 41KB
  452. VB 2014 Seattle/Caphaw - the advanced persistent pluginer.eng.srt 41KB
  453. VB 2019 London/Medical IoT for diabetes and cybercrime.eng.srt 41KB
  454. VB 2013 Berlin/Hacking Team and Gamma International in 'business-to-government malware'.eng.srt 41KB
  455. VB 2014 Seattle/Smart home appliance security & malware.eng.srt 40KB
  456. VB 2013 Berlin/Surviving 0-days - reducing the window of exposure.eng.srt 40KB
  457. VB 2020 Virtual/Emissary (Pandas) in the Middle East.eng.srt 40KB
  458. VB 2018 Montreal/Now you see it, now you don't wipers in the wild.eng.srt 40KB
  459. VB 2022 Prague/Uncovering a broad criminal ecosystem powered by one of the largest botnets, Glupteba Luca Nagy Goog.eng.srt 40KB
  460. VB 2015 Prague/Doing more with less a study of file-less infection attacks.eng.srt 39KB
  461. VB 2017 Madrid/The sprawling market of consumer spyware.eng.srt 39KB
  462. VB 2013 Berlin/PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file).eng.srt 39KB
  463. VB 2015 Prague/We know what you did this summer Android banking trojan exposing its sins in the cloud.eng.srt 39KB
  464. VB 2014 Seattle/.NET malware dynamic instrumentation for automated and manual analysis.eng.srt 39KB
  465. VB 2019 London/Shinigami's revenge the long tail of Ryuk malware.eng.srt 39KB
  466. VB 2014 Seattle/Bootkits past, present & future.eng.srt 38KB
  467. VB 2014 Seattle/An in-depth analysis of abuse on Twitter.eng.srt 38KB
  468. VB 2014 Seattle/Labelling spam through the analysis of protocol patterns.eng.srt 38KB
  469. VB 2018 Montreal/Android app deobfuscation using static-dynamic cooperation.eng.srt 38KB
  470. VB 2019 London/Geost botnet. The discovery story of a new Android banking trojan from an OpSec error.eng.srt 38KB
  471. VB 2017 Madrid/VB2017 paper VirusTotal tips, tricks and myths.eng.srt 38KB
  472. VB 2017 Madrid/Browser attack points still abused by banking trojans.eng.srt 38KB
  473. VB 2019 London/The cake is a lie Uncovering the secret world of malware-like cheats in video games.eng.srt 38KB
  474. VB 2020 Virtual/Standardized reporting with the Malware Behavior Catalog.eng.srt 37KB
  475. VB 2015 Prague/The TAO of .NET and PowerShell malware analysis.eng.srt 37KB
  476. VB 2015 Prague/Dare 'DEVIL' beyond your senses with Dex Visualizer.eng.srt 37KB
  477. VB 2019 London/Spoofing in the reeds with Rietspoof.eng.srt 36KB
  478. VB 2013 Berlin/Analysis of Android in-app advertisement kits.eng.srt 36KB
  479. VB 2015 Prague/Will Android trojan, worm or rootkit survive in SEAndroid and containerization.eng.srt 36KB
  480. VB 2020 Virtual/The rise of the info stealers.eng.srt 36KB
  481. VB 2014 Seattle/Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists.eng.srt 36KB
  482. VB 2014 Seattle/Back in BlackEnergy 2014 targeted attacks in the Ukraine and Poland.eng.srt 36KB
  483. VB 2015 Prague/TurlaSat The Fault in our Stars.eng.srt 36KB
  484. VB 2018 Montreal/Levelling up why sharing threat intelligence makes you more competitive.eng.srt 35KB
  485. VB 2022 Prague/Tracking the entire iceberg - long term APT malware C2 protocol emulation and scanning Takahiro Haru.eng.srt 35KB
  486. VB 2019 London/Exploring the Chinese DDoS landscape.eng.srt 35KB
  487. VB 2022 Prague/Operation Dragon Castling suspected APT group hijacks WPS Office updater to target East Asian bettin.eng.srt 35KB
  488. VB 2021 Virtual/Security the hidden cost of Android stalkerware.eng.srt 35KB
  489. VB 2016 Denver/Debugging and Monitoring Malware Network Activities with Haka.eng.srt 35KB
  490. VB 2018 Montreal/Hide'n'Seek an adaptive peer-to-peer IoT botnet.eng.srt 35KB
  491. VB 2018 Montreal/Analysing compiled binaries using logic.eng.srt 34KB
  492. VB 2017 Madrid/Android reverse engineering tools not the usual suspects.eng.srt 34KB
  493. VB 2019 London/Play fuzzing machine - hunting iOS and macOS kernel vulnerabilities automatically and smartly.eng.srt 34KB
  494. VB 2018 Montreal/From Hacking Team to hacked team to.eng.srt 34KB
  495. VB 2019 London/APT cases exploiting vulnerabilities in region-specific software.eng.srt 33KB
  496. VB 2015 Prague/It's a file infector it's ransomware it's Virlock.eng.srt 33KB
  497. VB 2017 Madrid/The router of all evil more than just default passwords and silly scripts.eng.srt 33KB
  498. VB 2021 Virtual/LazyScripter from Empire to double RAT.eng.srt 33KB
  499. VB 2015 Prague/The evolution of ransomware from CryptoLocker to CryptoWall.eng.srt 33KB
  500. VB 2015 Prague/Labeless - no more.eng.srt 32KB
  501. VB 2018 Montreal/The wolf in sheep's clothing - undressed.eng.srt 32KB
  502. VB 2017 Madrid/Last-minute paper FinFisher New techniques and infection vectors revealed.eng.srt 32KB
  503. VB 2019 London/A vine climbing over the Great Firewall a long-term attack against China.eng.srt 32KB
  504. VB 2016 Denver/On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users.eng.srt 29KB
  505. VB 2021 Virtual/Operation Newton Hi Kimsuky Did an Apple(seed) really fall on Newton’s head.eng.srt 29KB
  506. VB 2020 Virtual/Just in time, deception to detect Credential Stuffing Bot.eng.srt 29KB
  507. VB 2015 Prague/Inside recent FQDN (Fully Qualified Domain Name) surges on the Internet.eng.srt 29KB
  508. VB 2018 Montreal/Botception hire a botnet to spread one's own botnet.eng.srt 28KB
  509. VB 2021 Virtual/Android stalkerware hunting automation, analysis and detection.eng.srt 27KB
  510. VB 2021 Virtual/Operation Bookcodes - targeting South Korea.eng.srt 24KB
  511. VB 2019 London/Finding drive-by rookies using an automated active observation platform.eng.srt 22KB
  512. VB 2010 Vancouver/Costin Raiu on Virus Bulletin 2010.srt 19KB
  513. VB 2020 Virtual/Stealthy WastedLocker eluding behavior blockers, but not only.eng.srt 16KB
  514. VB 2017 Madrid/Gábor Szappanos wins fourth Peter Szőr Award.eng.srt 13KB
  515. VirusBulletin logo.png 10KB
  516. VB 2008 Ottawa/Interview with John Hawes of Virus Bulletin.eng.srt 6KB
  517. VB 2008 Ottawa/Security experts answer key questions at Virus Bulletin 2008.eng.srt 4KB
  518. Virus Bulletin thank you.txt 1010B