Virus Bulletin
File List
- VB 2021 Virtual/VB2021 localhost Day #1 live track.mp4 459.8 MB
- VB 2021 Virtual/VB2021 localhost Day #2 live track.mp4 441.4 MB
- VB 2024 Dublin/Unveiling shadows key tactics for tracking cyber threat actors, attribution, and infrastructure.mp4 85.8 MB
- VB 2023 London/Panel discussion Addressing the ransomware threat from outside the lab Chester Wisniewski et al.mp4 83.1 MB
- VB 2024 Dublin/VB2024 Closing keynote May you live in interesting times - Brian Honan (BH Consulting).mp4 80.7 MB
- VB 2023 London/Applied one-to-many code similarity analysis using MCRIT - Daniel Plohmann (Fraunhofer FKIE).mp4 74.3 MB
- VB 2024 Dublin/Workshop Writing malware configuration parsers - Mark Lim & Zong Yu Wu (Palo Alto Networks).mp4 71.8 MB
- VB 2021 Threat Intelligence Practitioner Summit/Fireside chat Good times, bad times, you know I’ve had my share.mp4 64.7 MB
- VB 2020 Virtual/Fireside Chat Comfortably Numb.mp4 61.4 MB
- VB 2024 Dublin/Code blue energy - Righard Zwienenberg & Josep Albors (ESET).mp4 50.9 MB
- VB 2024 Dublin/BEC and phishing targets local election candidate me - Andrew Brandt (Sophos).mp4 49.4 MB
- VB 2024 Dublin/TIPS Certified malware a case for industry TI sharing of DigSig metadata Samir Mody (K7).mp4 48.5 MB
- VB 2021 Virtual/CTO (Call Tree Overviewer) yet another function call tree viewer.mp4 47.2 MB
- VB 2023 London/Keynote address Solving cyber insecurity - Martin Lee (Cisco Talos).mp4 47.0 MB
- VB 2021 Virtual/A deep dive into Water Roc, one of the most relentless ransomware groups.mp4 46.2 MB
- VB 2024 Dublin/Life & DEaTH building detection, forensics, & intelligence at scale Selena Larson & Konstan Klinger.mp4 45.9 MB
- VB 2024 Dublin/Modern-day witchcraft a new breed of hybrid attacks by ransomware operators -Vaibhav Deshmukh et al.mp4 45.4 MB
- VB 2020 Virtual/Panel Flattening the Curve of Cyber-Risks.mp4 44.8 MB
- VB 2018 Montreal/Adware is just malware with a legal department.mp4 44.7 MB
- VB 2022 Prague/Keynote address Why are you telling me this Hakan Tanriverdi Bayerischer Rundfunk.mp4 44.4 MB
- VB 2023 London/Deobfuscating virtualized malware using Hex Rays Decompiler - Georgy Kucherin (Kaspersky).mp4 44.2 MB
- VB 2024 Dublin/Project 0xA11C deoxidizing the Rust malware ecosystem - Nicole Fishbein & Juan Andrés Guerro-Saade.mp4 43.7 MB
- VB 2024 Dublin/Breaking boundaries investigating vulnerable drivers and mitigating risks - Jiří Vinopal.mp4 43.5 MB
- VB 2024 Dublin/Leveraging AI to enhance the capabilities of SHAREM Shellcode Analysis Framework Bramwell Brizendine.mp4 43.3 MB
- VB 2022 Prague/Lessons learned from six Lapsus$ incident responses Gabriela Nicolao & Santiago Abastante Deloitte.mp4 43.2 MB
- VB 2023 London/Generic script emulation - Kurt Natvig (Acronis).mp4 43.0 MB
- VB 2023 London/Keynote address The physics of information asymmetry - Juan Andrés Guerrero Saade (SentinelOne).mp4 42.9 MB
- VB 2024 Dublin/The Impersonators - Gabor Szappanos & Steeve Gaudreault (Sophos).mp4 42.9 MB
- VB 2024 Dublin/TIPS Fireside chat Achtung Baby Cybersecurity insights with U2 you too - Jeannette Jarvis et al.mp4 42.3 MB
- VB 2024 Dublin/Tracking FIN7 malware honeypots, new AI deepfake lures - Zach Edwards (Silent Push).mp4 41.3 MB
- VB 2024 Dublin/Byteing back detection, dissection & protection against macOS stealers Patrick Wardle Objective-See.mp4 40.5 MB
- VB 2020 Virtual/Evolution of Excel 4.0 Macro Weaponization.mp4 40.5 MB
- VB 2023 London/Infostealers investigate the cybercrime threat in its ecosystem - Livia Tibirna & Pierre Le Bourhis.mp4 40.4 MB
- VB 2023 London/The global state of scams in 2023 - Jorij Abraham (GASA).mp4 40.0 MB
- VB 2024 Dublin/An open source cloud DFIR kit - Dredge - Santiago Abastante (Solidarity Labs).mp4 39.6 MB
- VB 2022 Prague/SHAREM shellcode analysis framework with emulation, a disassembler, and timeless debugging VERONA La.mp4 39.5 MB
- VB 2022 Prague/Unmasking WindTape Patrick Wardle Objective See.mp4 39.5 MB
- VB 2024 Dublin/Hospitals, airports and telcos - modern approach to attributing hacktivism attacks - Itay Cohen.mp4 39.2 MB
- VB 2022 Prague/Hunting the AndroidBianLian botnet Axelle Apvrille Fortinet.mp4 39.0 MB
- VB 2021 Threat Intelligence Practitioner Summit/Panel A tale of two companies.mp4 37.9 MB
- VB 2024 Dublin/TIPS Stix and stones enabling faster intelligence gathering with GenAI and OASIS - Kieran Hughes.mp4 37.8 MB
- VB 2023 London/Everything happens for a reason the choices made by ransomware operators - Jono Davis (PwC).mp4 37.7 MB
- VB 2024 Dublin/TIPS Unveiling cybersecurity impact the role of published security findings in strengthening.mp4 37.7 MB
- VB 2024 Dublin/TIPS Keynote No more secrets in cybersecurity implementing ‘radical transparency’ Suzanne Spaulding.mp4 37.6 MB
- VB 2024 Dublin/Arming WinRAR deep dive into APTs exploiting WinRAR's 0 day vulnerability - a SideCopy case study.mp4 37.4 MB
- VB 2024 Dublin/Automatically detect and support against anti debug with IDAGhidra to streamline debugging process.mp4 37.2 MB
- VB 2024 Dublin/VB2024 Opening keynote Solving puzzles protecting high risk communities - Runa Sandvik (Granitt).mp4 37.1 MB
- VB 2014 Seattle/Design to discover security analytics with 3D visualization engine.mp4 37.0 MB
- VB 2024 Dublin/Ghosts from the past become Gh0stbusters in 2024 - Hiroshi Takeuchi (MACNICA).mp4 36.8 MB
- VB 2022 Prague/Russian wipers in the cyberwar against Ukraine Alexander Adamov NioGuard Security Lab.mp4 36.7 MB
- VB 2023 London/SharpTongue pwning your foreign policy, one interview request at a time - Tom Lancaster (Volexity).mp4 36.3 MB
- VB 2023 London/Unveiling activities of Tropic Trooper 2023 deep analysis of Xiangoop Loader and EntryShell payload.mp4 36.0 MB
- VB 2023 London/MEGALO 414E DON uncovering data espionage, blackmailing and shell companies in mobile lending.mp4 35.9 MB
- VB 2024 Dublin/CrackedCantil a malware symphony delivered by cracked software - - performed by loaders, infostealers..mp4 35.9 MB
- VB 2023 London/Looking into TUT's tomb the universe of threats in LATAM - Camilo Gutiérrez Amaya & Fernando Tavella.mp4 35.9 MB
- VB 2024 Dublin/SO that looks suspicious leveraging process memory and kernel usermode probes to detect Shared.mp4 35.8 MB
- VB 2020 Virtual/Emissary (Pandas) in the Middle East.mp4 35.8 MB
- VB 2023 London/Side loading is not dead the Chinese and the Korean way - Gabor Szappanos (Sophos).mp4 35.8 MB
- VB 2024 Dublin/Reviewing 2022 KA SAT incident & implications for distributed communication environments -Joe Slowik.mp4 35.7 MB
- VB 2023 London/The Dragon who sold his Camaro reversing a custom router implant - Itay Cohen (Check Point).mp4 35.7 MB
- VB 2024 Dublin/Marketplace scams neanderthals hunting mammoths with Telekopye - Jakub Souček & Radek Jizba (ESET).mp4 35.5 MB
- VB 2024 Dublin/Confronting the surge of macOS stealers in 2024 - Kseniia Yamburh (MacPaw (Moonlock Lab)).mp4 35.2 MB
- VB 2021 Virtual/Endpoint security checkbox a stealthy approach to cyberdefence.mp4 35.0 MB
- VB 2020 Virtual/Emerging trends in malware downloaders.mp4 34.9 MB
- VB 2024 Dublin/Getting cozy with milk and WARMCOOKIES - Daniel Stepanic (Elastic).mp4 34.8 MB
- VB 2019 London/Keynote address The security products we deserve.mp4 34.6 MB
- VB 2024 Dublin/The Mask has been unmasked again - Georgy Kucherin & Marc Rivero López.mp4 34.6 MB
- VB 2024 Dublin/Android Flutter malware - Axelle Apvrille (Fortinet).mp4 33.9 MB
- VB 2023 London/R2R stomping - are you ready to run - Jiří Vinopal (Check Point Research).mp4 33.8 MB
- VB 2020 Virtual/Ramsay A cyber-espionage toolkit tailored for air-gapped networks.mp4 33.8 MB
- VB 2022 Prague/Zeroing in on XENOTIME analysis of the entities responsible for the Triton event Joe Slowik Gigamon.mp4 33.7 MB
- VB 2024 Dublin/TA577 walked just past you indirect syscalls in Pikabot - Emre Güler (VMRay).mp4 33.6 MB
- VB 2014 Seattle/Smart home appliance security & malware.mp4 33.5 MB
- VB 2022 Prague/Not Safe for Windows NSFW a China based threat with a lot to say Jono Davis PwC.mp4 33.4 MB
- VB 2020 Virtual/Hidden risks of advertisements.mp4 33.3 MB
- VB 2023 London/C2F2 a framework for detecting C2 frameworks at scale - Oleg Boyarchuk & Stefano Ortolani (VMware).mp4 32.8 MB
- VB 2023 London/May the Shadow Force be with Maggie - Shadow Force Group characteristics and relationship to Maggie.mp4 32.8 MB
- VB 2023 London/Panel Securing the future the vital role of computer security vendors in an AI-driven world.mp4 32.7 MB
- VB 2024 Dublin/From code to crime exploring threats in GitHub Codespaces - Jaromir Horejsi & Nitesh Surana.mp4 32.7 MB
- VB 2020 Virtual/Ransomware Evolution in LATAM.mp4 32.6 MB
- VB 2021 Virtual/From match fixing to data exfiltration - a story of Messaging as a Service (MaaS).mp4 32.6 MB
- VB 2024 Dublin/Open by default the hidden cost of convenience in network security - Aurelio Picon (CUJO AI).mp4 32.5 MB
- VB 2024 Dublin/Who plays on AZORult An unknown attacker collects various data and spreads additional payloads.mp4 32.5 MB
- VB 2023 London/DNS takeover the full journey and redemption - John Jensen (Silent Push).mp4 32.2 MB
- VB 2023 London/Mac ing sense of the 3CX supply chain attack analysis of the macOS payloads - Patrick Wardle.mp4 32.2 MB
- VB 2022 Prague/Exploit archaeology a forensic history of in the wild NSO Group exploits Donncha Ó Cearbhaill Amnest.mp4 32.1 MB
- VB 2023 London/W3LL phishing kit - the tools, the criminal ecosystem, and the market impact - Martijn van den Berk.mp4 31.9 MB
- VB 2021 Virtual/Your five most critical M365 vulnerabilities revealed and how to fix them (Partner Content).mp4 31.7 MB
- VB 2024 Dublin/A web of surveillance - Jurre van Bergen (Amnesty International).mp4 31.6 MB
- VB 2023 London/Tales from a cloud CSIRT - let's deep dive into a Kubernetes k8s infection - Santiago Abastante.mp4 31.6 MB
- VB 2024 Dublin/TIPS Indicator wranglin’ - an approach to dynamically typing IOCs with poor data context -Noah Dunn.mp4 31.6 MB
- VB 2021 Virtual/All roads lead to Rome the Conti manual leak dissection.mp4 31.6 MB
- VB 2023 London/Hit the bullseye detecting browser exploits abusing the X memory in WebAssembly - Edouard Bochin.mp4 31.5 MB
- VB 2021 Virtual/Pay2Key - the newly discovered ransomware traced all the way to Iran.mp4 31.4 MB
- VB 2021 Virtual/Reverse Android malware like a Jedi Master.mp4 31.4 MB
- VB 2018 Montreal/Foreverdays tracking and mitigating threats targeting civil society orgs.mp4 31.1 MB
- VB 2022 Prague/Operation Dragon Castling suspected APT group hijacks WPS Office updater to target East Asian bettin.mp4 31.1 MB
- VB 2023 London/Intent-based approach to detect email account compromise - Abhishek Singh & Fahim Abbasi (Cisco).mp4 31.1 MB
- VB 2021 Virtual/STK, A-OK Stopping messaging attacks on vulnerable SIMs.mp4 30.9 MB
- VB 2021 Threat Intelligence Practitioner Summit/Now you see me, now you don’t.mp4 30.5 MB
- VB 2020 Virtual/The (f)utility of indicators.mp4 30.3 MB
- VB 2022 Prague/Lazarus & BYOVD evil to the Windows core Peter Kalnai & Matěj Havránek ESET.mp4 30.3 MB
- VB 2023 London/Abusing Electron based applications in targeted attacks Jaromir Horejsi (Trend Micro).mp4 30.3 MB
- VB 2023 London/Don't flatten yourself restoring malware with Control Flow Flattening obfuscation - Geri Revay.mp4 30.2 MB
- VB 2023 London/When a botnet cries detecting botnet infection chains - Guillaume Couchard & Erwan Chevalier.mp4 30.1 MB
- VB 2023 London/Exploring the efficacy of community-driven TI a real world approach - Samir Mody & Hariharan S (K7).mp4 30.0 MB
- VB 2020 Virtual/Advanced Pasta Threat mapping threat actor usage of open-source offensive security tools.mp4 29.9 MB
- VB 2019 London/The Bagsu banker case.mp4 29.8 MB
- VB 2022 Prague/Sha Zhu Pan cocktail of cryptocurrency, social engineering and fake apps targeting Android and iPhon.mp4 29.8 MB
- VB 2022 Prague/You OTA know combating malicious Android system updaters Łukasz Siewierski & Alec Guertin Google.mp4 29.6 MB
- VB 2021 Virtual/Bugs in malware - uncovering vulnerabilities found in malware payloads.mp4 28.9 MB
- VB 2021 Virtual/The ‘Ghost Hand’ attack.mp4 28.7 MB
- VB 2023 London/Lazarus campaigns and backdoors in 2022 2023 - Peter Kálnai (ESET).mp4 28.7 MB
- VB 2022 Prague/Combating control flow flattening in - NET malware Georgy Kucherin Kaspersky.mp4 28.5 MB
- VB 2021 Virtual/Evolution after prosecution Psychedelic APT41.mp4 28.4 MB
- VB 2020 Virtual/Take care, spyware is slipping into your phones through Operation Poisoned News.mp4 28.2 MB
- VB 2023 London/Silent whispers of malware unveiling hidden threats in legitimate network traffic - Royce Lu.mp4 28.2 MB
- VB 2024 Dublin/Multimodal AI the sixth sense for cyber defence - Younghoo Lee (Sophos).mp4 28.0 MB
- VB 2021 Virtual/When malware changed its mind an empirical study of variable program behaviours in the real world.mp4 27.9 MB
- VB 2022 Prague/Uncovering a broad criminal ecosystem powered by one of the largest botnets, Glupteba Luca Nagy Goog.mp4 27.8 MB
- VB 2021 Virtual/ShadowPad the masterpiece of privately sold malware in Chinese espionage.mp4 27.8 MB
- VB 2018 Montreal/Fake News, Inc.mp4 27.7 MB
- VB 2023 London/South Korean Android banking menace FakeCalls - Raman Ladutska (Check Point).mp4 27.6 MB
- VB 2017 Madrid/Walking in your enemy's shadow when fourth-party collection becomes attribution hell.mp4 27.6 MB
- VB 2018 Montreal/Office bugs on the rise.mp4 27.5 MB
- VB 2014 Seattle/OPSEC for security researchers.mp4 27.5 MB
- VB 2023 London/USB flows in the Great River classic tradecraft is still alive - Hiroshi Takeuchi (MACNICA).mp4 27.2 MB
- VB 2022 Prague/The long arm of the prisoner social engineering from Kenyan prisons Patricia Musomba.mp4 27.2 MB
- VB 2020 Virtual/Behind the Black Mirror Simulating attacks with mock C2 servers.mp4 27.1 MB
- VB 2020 Virtual/Opening Keynote Collaborating with Competitors A Better Strategy to Beat Adversaries.mp4 27.0 MB
- VB 2017 Madrid/Crypton - exposing malware's deepest secrets.mp4 26.9 MB
- VB 2021 Virtual/The keksec botnets we observed in the past year.mp4 26.9 MB
- VB 2024 Dublin/P-wave of malicious code signing - Yuta Sawabe & Rintaro Koike (NTT Security Holdings).mp4 26.7 MB
- VB 2023 London/FirePeony a ghost wandering around the Royal Road - Rintaro Koike & Shogo Hayashi.mp4 26.7 MB
- VB 2023 London/TetrisPhantom targeted attacks using secure USB - Noushin Shabab (Kaspersky).mp4 26.6 MB
- VB 2024 Dublin/Origins of a logger - Agent Tesla - Berk Albayrak & Utku Çorbacı (Malwation).mp4 26.6 MB
- VB 2023 London/Look out Outlook's gonna get you Anurag Shandilya (K7 Computing).mp4 26.6 MB
- VB 2023 London/AI-based digital evidence enhancement technology for profiling attack groups and techniques.mp4 26.4 MB
- VB 2020 Virtual/Dissecting fleeceware apps the million-dollar money-making machine in Android and iOS.mp4 26.4 MB
- VB 2022 Prague/Encryption time flies when you're having fun the case of the exotic BlackCat ransomware Aleksandar M.mp4 26.4 MB
- VB 2024 Dublin/Sugarcoating KANDYKORN a sweet dive into a sophisticated MacOS backdoor - Salim Bitam (Elastic).mp4 26.3 MB
- VB 2021 Virtual/A detailed analysis of a new version of Darkside Ransomware (V. 2.1.2.3).mp4 26.2 MB
- VB 2024 Dublin/A wild RAT appears reversing DinodasRAT on Linux - Anderson Leite.mp4 26.1 MB
- VB 2021 Virtual/Hunting web skimmers with VirusTotal and YARA.mp4 26.0 MB
- VB 2024 Dublin/Octopus Prime it didn't turn into a truck, but a widely spread Android botnet - Thibault Seret.mp4 25.9 MB
- VB 2024 Dublin/Proactively hunting for low reputed infrastructure used by large cybercrimes and APTs - Janos Szurdi.mp4 25.8 MB
- VB 2023 London/Ransoming and clipping for illicit cryptocurrency gains - Chetan Raghuprasad (Cisco Talos).mp4 25.6 MB
- VB 2018 Montreal/Shedding skin - Turla's fresh faces.mp4 25.5 MB
- VB 2021 Virtual/Security the hidden cost of Android stalkerware.mp4 25.5 MB
- VB 2020 Virtual/Creating Network Effects Intelligence Sharing for Supply Chain Security.mp4 25.4 MB
- VB 2017 Madrid/Nine circles of Cerber.mp4 25.3 MB
- VB 2023 London/RedStinger new APT discovered amid Russia Ukraine conflict - Roberto Santos & Hossein Jazi.mp4 25.2 MB
- VB 2021 Virtual/SubCrawl - a framework for the analysis and clustering of hacking tools found using open directories.mp4 25.2 MB
- VB 2020 Virtual/Lightweight emulation based IoC extraction for Gafgyt botnets.mp4 25.2 MB
- VB 2024 Dublin/TIPS Wrap up - Michael Daniel (Cyber Threat Alliance).mp4 25.1 MB
- VB 2021 Virtual/UNC788 Iran’s decade of credential harvesting and surveillance operations.mp4 25.1 MB
- VB 2023 London/Dancing the night away with named pipes - Daniel Stepanic (Elastic).mp4 25.0 MB
- VB 2023 London/The Dropping Elephant never dropped - Ye Jin (Kaspersky).mp4 24.9 MB
- VB 2020 Virtual/Operation LagTime IT colourful Panda footprint.mp4 24.9 MB
- VB 2022 Prague/Creepy things that glow in the dark a deep look @ POLONIUM's undocumented tools Robert Lipovsky ESET.mp4 24.8 MB
- VB 2024 Dublin/IcePeony with the '996' work culture - Rintaro Koike & Shota Nakajima.mp4 24.8 MB
- VB 2023 London/Building a cybersecurity AI dataset for a secure digital society - Bomin Choi (KISA).mp4 24.7 MB
- VB 2022 Prague/Tracking the entire iceberg - long term APT malware C2 protocol emulation and scanning Takahiro Haru.mp4 24.7 MB
- VB 2020 Virtual/NetWalking on Sunshine.mp4 24.5 MB
- VB 2023 London/Possible supply chain attack targeting South Asian government delivers Shadowpad - Daniel Lunghi.mp4 24.5 MB
- VB 2023 London/The history & tactics of visa-centric scams in search, spam & social apps - Chris Boyd.mp4 24.4 MB
- VB 2019 London/Attribution is in the object using RTF object dimensions to track APT phishing weaponizers.mp4 24.3 MB
- VB 2020 Virtual/Compromising IOT C&C Panels for Unearthing Infections.mp4 24.3 MB
- VB 2018 Montreal/Lazarus Group one mahjong game played with different sets of tiles.mp4 24.3 MB
- VB 2018 Montreal/From Hacking Team to hacked team to.mp4 24.1 MB
- VB 2018 Montreal/Draw me like one of your French APTs - expanding our descriptive palette for digital threat actors.mp4 24.0 MB
- VB 2014 Seattle/Swipe away, we're watching you.mp4 23.9 MB
- VB 2014 Seattle/P0wned by a barcode stealing money from offline users.mp4 23.9 MB
- VB 2018 Montreal/Little Brother is watching - we know all your secrets.mp4 23.8 MB
- VB 2020 Virtual/Payment required rare HTTP statuses and air-gaps avoidance from the authors of COMPFun.mp4 23.7 MB
- VB 2020 Virtual/Another threat actor day.mp4 23.5 MB
- VB 2019 London/Rich headers leveraging the mysterious artifact of the PE format.mp4 23.5 MB
- VB 2019 London/Oops It happened again.mp4 23.5 MB
- VB 2020 Virtual/Unveiling the CryptoMimic.mp4 23.4 MB
- VB 2024 Dublin/Dark deals unveiling the underground market of exploits - Anna Pavlovskaia (Kaspersky).mp4 23.2 MB
- VB 2020 Virtual/A new open-source hypervisor-level malware monitoring and extraction system.mp4 23.1 MB
- VB 2020 Virtual/Business Email Compromise - Scalable Attribution Powering Industry and Law Enforcement Collaboration.mp4 23.1 MB
- VB 2023 London/Web3 will bite you in the Web 2 0 exploring IPFS threats - Morton Swimmer (Trend Micro).mp4 23.1 MB
- VB 2018 Montreal/Who wasn’t responsible for Olympic Destroyer (Paul Rascagnères & Warren Mercer).mp4 23.0 MB
- VB 2018 Montreal/From drive-by download to drive-by mining understanding the new paradigm.mp4 23.0 MB
- VB 2021 Virtual/Uncovering automatic Obfuscation-as-a-Service for malicious Android applications.mp4 22.9 MB
- VB 2019 London/2,000 reactions to a malware attack - accidental study.mp4 22.7 MB
- VB 2017 Madrid/Modern reconnaissance phase on APT - protection layer.mp4 22.5 MB
- VB 2017 Madrid/Last-minute paper Spora the saga continues a.k.a. how to ruin your research in a week.mp4 22.4 MB
- VB 2021 Virtual/Where is the cuckoo egg.mp4 22.2 MB
- VB 2018 Montreal/Anatomy of an attack detecting and defeating CRASHOVERRIDE.mp4 22.2 MB
- VB 2017 Madrid/Industroyer biggest threat to industrial control systems since Stuxnet.mp4 22.0 MB
- VB 2020 Virtual/German Angst - Cybercrime Ecosystem in the DACH Region.mp4 22.0 MB
- VB 2023 London/Turla and Sandworm come filelessly - Alexander Adamov (NioGuard Security Lab).mp4 22.0 MB
- VB 2019 London/Never before had Stierlitz been so close to failure.mp4 21.9 MB
- VB 2023 London/Teasing the secrets from threat actors malware configuration extractors - Mark Lim.mp4 21.9 MB
- VB 2023 London/Magniber's missteps because even spiders trip over their own web Amata Anantaprayoon & Patrik Olson.mp4 21.8 MB
- VB 2019 London/Medical IoT for diabetes and cybercrime.mp4 21.7 MB
- VB 2017 Madrid/Consequences of bad security in health care.mp4 21.7 MB
- VB 2020 Virtual/2030 backcasting the potential rise and fall of cyber threat intelligence.mp4 21.6 MB
- VB 2020 Virtual/GuLoader No, CloudEyE. Flattening the attack curve of the top malicious dropper.mp4 21.6 MB
- VB 2020 Virtual/She sells root shells by the C() shore.mp4 21.4 MB
- VB 2021 Threat Intelligence Practitioner Summit/New PlugX Fingerprint-THOR.mp4 21.2 MB
- VB 2021 Threat Intelligence Practitioner Summit/The use of dark patterns and psychological tricks in Android malware.mp4 21.2 MB
- VB 2019 London/Exploring Emotet, an elaborate everyday enigma.mp4 21.2 MB
- VB 2017 Madrid/Browser attack points still abused by banking trojans.mp4 21.2 MB
- VB 2017 Madrid/Client Maximus raises the bar.mp4 21.1 MB
- VB 2019 London/Cyber espionage in the Middle East unravelling OSX.WindTail.mp4 21.0 MB
- VB 2017 Madrid/Offensive malware analysis dissecting OSX FruitFly via a custom C&C server.mp4 21.0 MB
- VB 2018 Montreal/Android app deobfuscation using static-dynamic cooperation.mp4 20.9 MB
- VB 2018 Montreal/Behind the scenes of the SamSam investigation.mp4 20.9 MB
- VB 2020 Virtual/Clandestine hunter two strategies for supply chain attack.mp4 20.8 MB
- VB 2019 London/APT cases exploiting vulnerabilities in region-specific software.mp4 20.8 MB
- VB 2020 Virtual/Like bees to a honeypot - a journey through honeypots.mp4 20.7 MB
- VB 2019 London/Pulling the PKPLUG the adversary playbook for the long-standing espionage activity of.mp4 20.4 MB
- VB 2019 London/Static analysis methods for detection of Microsoft Office exploits.mp4 20.4 MB
- VB 2019 London/Webcam interception and protection in kernel mode in Windows.mp4 20.3 MB
- VB 2017 Madrid/VB2017 paper VirusTotal tips, tricks and myths.mp4 20.3 MB
- VB 2018 Montreal/Unpacking the packed unpacker reversing an Android anti-analysis library.mp4 20.2 MB
- VB 2017 Madrid/Turning Trickbot decoding an encrypted command-and-control channel.mp4 20.2 MB
- VB 2018 Montreal/The wolf in sheep's clothing - undressed.mp4 20.1 MB
- VB 2018 Montreal/The Big Bang Theory by APT-C-23.mp4 20.0 MB
- VB 2024 Dublin/Shadow play WildCard's malware campaigns amidst Israel Hamas conflict - NicoleFishbein, RyanRobinson.mp4 20.0 MB
- VB 2021 Threat Intelligence Practitioner Summit/Peak Analyzer an automated malware campaign detector.mp4 20.0 MB
- VB 2019 London/Shinigami's revenge the long tail of Ryuk malware.mp4 19.9 MB
- VB 2019 London/Buhtrap metamorphosis from cybercrime to cyber espionage.mp4 19.8 MB
- VB 2020 Virtual/Tracking Rapid Evolution Copycat of An APT RAT in Asia.mp4 19.7 MB
- VB 2019 London/Absolutely routed Why routers are the new bullseye in cyber attacks.mp4 19.7 MB
- VB 2014 Seattle/Sweeping the IP space the hunt for evil on the Internet.mp4 19.7 MB
- VB 2018 Montreal/Triada the past, the present and the (hopefully not existing) future.mp4 19.7 MB
- VB 2020 Virtual/Ghost Mach-O an analysis of Lazarus’ Mac-malware innovations.mp4 19.7 MB
- VB 2016 Denver/Anti-malware Testing Undercover.mp4 19.5 MB
- VB 2019 London/The cake is a lie Uncovering the secret world of malware-like cheats in video games.mp4 19.4 MB
- VB 2021 Virtual/LazyScripter from Empire to double RAT.mp4 19.3 MB
- VB 2019 London/Play fuzzing machine - hunting iOS and macOS kernel vulnerabilities automatically and smartly.mp4 19.2 MB
- VB 2016 Denver/Modern Attacks on Russian Financial Institutions.mp4 19.2 MB
- VB 2021 Virtual/Ransomware a correlation between infection vectors and victims.mp4 19.2 MB
- VB 2019 London/Geost botnet. The discovery story of a new Android banking trojan from an OpSec error.mp4 19.0 MB
- VB 2019 London/A vine climbing over the Great Firewall a long-term attack against China.mp4 18.9 MB
- VB 2021 Virtual/Threat hunting from SolarWinds to Hafnium APT.mp4 18.8 MB
- VB 2017 Madrid/Exploring the virtual worlds of advergaming.mp4 18.7 MB
- VB 2019 London/Attor spy platform with curious GSM fingerprinting.mp4 18.7 MB
- VB 2019 London/Spoofing in the reeds with Rietspoof.mp4 18.6 MB
- VB 2019 London/Abusing third-party cloud services in targeted attacks.mp4 18.5 MB
- VB 2021 Threat Intelligence Practitioner Summit/Keynote Learning from failure ransomware and future conflicts.mp4 18.5 MB
- VB 2020 Virtual/Closing Keynote Threatscaping like a CERT.mp4 18.4 MB
- VB 2016 Denver/Last-minute paper A Malicious OS X Cocktail Served from a Tain'ted Bottle.mp4 18.4 MB
- VB 2020 Virtual/Standardized reporting with the Malware Behavior Catalog.mp4 18.3 MB
- VB 2018 Montreal/Now you see it, now you don't wipers in the wild.mp4 18.3 MB
- VB 2014 Seattle/Methods of malware persistence on Mac OS X.mp4 18.3 MB
- VB 2017 Madrid/Android reverse engineering tools not the usual suspects.mp4 18.3 MB
- VB 2017 Madrid/The life story of an IPT - Inept Persistent Threat actor.mp4 18.2 MB
- VB 2016 Denver/APT Reports and OPSEC Evolution, or These Are Not the APT Reports You Are Looking For.mp4 18.1 MB
- VB 2020 Virtual/TA505 attacking industries around the world.mp4 18.1 MB
- VB 2017 Madrid/Last-minute paper FinFisher New techniques and infection vectors revealed.mp4 18.0 MB
- VB 2016 Denver/Great Crypto Failures.mp4 17.9 MB
- VB 2021 Virtual/The baffling Berserk Bear a decade’s activity targeting critical infrastructure.mp4 17.8 MB
- VB 2021 Virtual/Operation Bookcodes - targeting South Korea.mp4 17.8 MB
- VB 2014 Seattle/Attack points in health apps & wearable devices - how safe is your quantified self.mp4 17.7 MB
- VB 2016 Denver/Neverquest Crime as a Service and On the Hunt for the Big Bucks.mp4 17.6 MB
- VB 2019 London/Thwarting Emotet email conversation thread hijacking with clustering.mp4 17.6 MB
- VB 2018 Montreal/Internet balkanization why are we raising borders online.mp4 17.5 MB
- VB 2021 Threat Intelligence Practitioner Summit/Operation Diànxùn a cyberespionage campaign targeting telecommunication companies.mp4 17.4 MB
- VB 2016 Denver/The Beginning of the End(point) Where we are now and where we'll be in five years.mp4 17.4 MB
- VB 2018 Montreal/Under the hood - the automotive challenge.mp4 17.4 MB
- VB 2017 Madrid/Beyond lexical and PDNS using signals on graphs to uncover online threats at scale.mp4 17.4 MB
- VB 2021 Threat Intelligence Practitioner Summit/Where’s your data Ransomware protecting your ICS environment.mp4 17.4 MB
- VB 2018 Montreal/The modality of mortality in domain names.mp4 17.3 MB
- VB 2017 Madrid/The sprawling market of consumer spyware.mp4 17.1 MB
- VB 2019 London/Defeating APT10 compiler-level obfuscations.mp4 17.0 MB
- VB 2016 Denver/Defeating Sandbox Evasion How to Increase Successful Emulation Rate in your Virtualized Environment.mp4 17.0 MB
- VB 2021 Virtual/Operation Newton Hi Kimsuky Did an Apple(seed) really fall on Newton’s head.mp4 16.9 MB
- VB 2016 Denver/Getting Duped Piggybacking on Webcam Streams for Surreptitious Recordings.mp4 16.9 MB
- VB 2018 Montreal/Levelling up why sharing threat intelligence makes you more competitive.mp4 16.7 MB
- VB 2014 Seattle/Bootkits past, present & future.mp4 16.7 MB
- VB 2016 Denver/Wave Your False Flags Deception Tactics Muddying Attribution in Targeted Attacks.mp4 16.7 MB
- VB 2013 Berlin/VB2013 Keynote - Ethics and the AV industry in the age of WikiLeaks.mp4 16.6 MB
- VB 2018 Montreal/Where have all the good hires gone.mp4 16.4 MB
- VB 2014 Seattle/Unveiling the kernel rootkit discovery using selective automated kernel memory differencing.mp4 16.2 MB
- VB 2020 Virtual/Chasing the Digital Pirates Unveiling the Container Threats.mp4 16.1 MB
- VB 2017 Madrid/The router of all evil more than just default passwords and silly scripts.mp4 16.1 MB
- VB 2014 Seattle/.NET malware dynamic instrumentation for automated and manual analysis.mp4 16.0 MB
- VB 2014 Seattle/Quantifying maliciousness in Alexa top-ranked domains.mp4 15.9 MB
- VB 2021 Virtual/Sandworm reading the indictment between the lines.mp4 15.8 MB
- VB 2020 Virtual/Anchor, Bazar, and the Trickbot Connection.mp4 15.8 MB
- VB 2017 Madrid/Battlefield Ukraine finding patterns behind summer cyber attacks.mp4 15.7 MB
- VB 2014 Seattle/Optimized mal-ops. Hack the ad network like a boss.mp4 15.6 MB
- VB 2014 Seattle/An in-depth analysis of abuse on Twitter.mp4 15.6 MB
- VB 2020 Virtual/Stealthy WastedLocker eluding behavior blockers, but not only.mp4 15.5 MB
- VB 2020 Virtual/One year later Challenges for young anti-malware products today.mp4 15.5 MB
- VB 2019 London/Finding drive-by rookies using an automated active observation platform.mp4 15.5 MB
- VB 2016 Denver/Debugging and Monitoring Malware Network Activities with Haka.mp4 15.3 MB
- VB 2016 Denver/Malicious Proxy auto-configs An Easy Way to Harvest Banking Credentials.mp4 15.3 MB
- VB 2016 Denver/Building a Local PassiveDNS Capability for Malware Incident Response.mp4 15.3 MB
- VB 2016 Denver/Nymaim the Untold Story.mp4 15.2 MB
- VB 2018 Montreal/Analysing compiled binaries using logic.mp4 15.0 MB
- VB 2020 Virtual/The rise of the info stealers.mp4 14.9 MB
- VB 2015 Prague/Keynote address One man's anti-malware researcher is.mp4 14.8 MB
- VB 2014 Seattle/Caphaw - the advanced persistent pluginer.mp4 14.7 MB
- VB 2020 Virtual/Most sophisticated technique of the year goes to.mp4 14.7 MB
- VB 2020 Virtual/Dancing samba with Dolphins tracking a Brazilian threat actor moving to Europe.mp4 14.7 MB
- VB 2019 London/Catch me if you can detection of injection exploitation by validating query and API integrity.mp4 14.7 MB
- VB 2014 Seattle/Leaving our ZIP undone how to abuse ZIP to deliver malware apps.mp4 14.5 MB
- VB 2021 Virtual/Android stalkerware hunting automation, analysis and detection.mp4 14.5 MB
- VB 2013 Berlin/Statistically effective protection against APT attacks.mp4 14.5 MB
- VB 2018 Montreal/Hide'n'Seek an adaptive peer-to-peer IoT botnet.mp4 14.5 MB
- VB 2020 Virtual/Context Aware Detection The future of cybersecurity.mp4 14.4 MB
- VB 2016 Denver/Mobile Applications a Backdoor into Internet of Things.mp4 14.3 MB
- VB 2019 London/A deep dive into iPhone exploit chains.mp4 14.2 MB
- VB 2014 Seattle/Back in BlackEnergy 2014 targeted attacks in the Ukraine and Poland.mp4 14.1 MB
- VB 2016 Denver/Open Source Malware Lab.mp4 14.1 MB
- VB 2014 Seattle/The evolution of webinjects.mp4 14.0 MB
- VB 2019 London/TIPS Keynote Nexus between OT and IT threat intelligence.mp4 13.9 MB
- VB 2015 Prague/The Kobayashi Maru dilemma.mp4 13.9 MB
- VB 2014 Seattle/Labelling spam through the analysis of protocol patterns.mp4 13.6 MB
- VB 2013 Berlin/Hacking Team and Gamma International in 'business-to-government malware'.mp4 13.5 MB
- VB 2015 Prague/Economic sanctions on malware.mp4 13.4 MB
- VB 2014 Seattle/Hiding the network behind the network. Botnet proxy business model.mp4 13.3 MB
- VB 2019 London/TIPS Keynote Building secure sharing systems that treat humans as features not bugs.mp4 13.1 MB
- VB 2014 Seattle/Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists.mp4 13.1 MB
- VB 2013 Berlin/Analysis of Android in-app advertisement kits.mp4 13.0 MB
- VB 2013 Berlin/PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file).mp4 12.9 MB
- VB 2020 Virtual/Transparency, Trust and Intention What dismantling the heart of cyberattack public attribution.mp4 12.8 MB
- VB 2015 Prague/ROSCO Repository Of Signed COde.mp4 12.7 MB
- VB 2020 Virtual/Just in time, deception to detect Credential Stuffing Bot.mp4 12.5 MB
- VB 2014 Seattle/Duping the machine - malware strategies, post sandbox detection.mp4 12.4 MB
- VB 2016 Denver/On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users.mp4 12.4 MB
- VB 2014 Seattle/DNSSEC - how far have we come.mp4 12.4 MB
- VB 2015 Prague/Last-minute paper The mysterious case of Linux.Wifatch.mp4 12.3 MB
- VB 2018 Montreal/Botception hire a botnet to spread one's own botnet.mp4 12.2 MB
- VB 2021 Virtual/VB 2021 Virtual captions/VB2021 localhost Day #1 live track.eng.json 12.1 MB
- VB 2021 Threat Intelligence Practitioner Summit/Keynote The Community Effect.mp4 12.1 MB
- VB 2021 Threat Intelligence Practitioner Summit/Incident response with an XDR.mp4 11.9 MB
- VB 2013 Berlin/Surviving 0-days - reducing the window of exposure.mp4 11.8 MB
- VB 2015 Prague/Attack on the drones security vulnerabilities of unmanned aerial vehicles.mp4 11.8 MB
- VB 2016 Denver/One-Click Fileless Infection.mp4 11.7 MB
- VB 2015 Prague/Modelling the network behaviour of malware to block malicious patterns.mp4 11.7 MB
- VB 2015 Prague/DDoS trojan a malicious concept that conquered the ELF format.mp4 11.5 MB
- VB 2015 Prague/The Unbearable Lightness of APTing.mp4 11.4 MB
- VB 2015 Prague/Last-minute paper Operation Potao Express analysis of a cyber-espionage toolkit.mp4 11.4 MB
- VB 2015 Prague/Breaking the bank(er) automated configuration data extraction for banking malware.mp4 11.3 MB
- VB 2015 Prague/Sizing cybercrime incidents and accidents, hints and allegations.mp4 11.3 MB
- VB 2015 Prague/Dead and buried in their crypts defeating modern ransomware.mp4 11.2 MB
- VB 2015 Prague/Anonymity is king.mp4 11.2 MB
- VB 2015 Prague/From Asia with love Smartphones with pre-installed malware.mp4 11.1 MB
- VB 2015 Prague/The elephant in the room.mp4 11.0 MB
- VB 2013 Berlin/Back channels and bitcoins ZeroAccess' secret C&C communications.mp4 11.0 MB
- VB 2015 Prague/Android ransomware turning CryptoLocker into CryptoUnlocker.mp4 11.0 MB
- VB 2015 Prague/The TAO of .NET and PowerShell malware analysis.mp4 10.9 MB
- VB 2015 Prague/POS fraud - trends and counter-actions to mass fraud.mp4 10.9 MB
- VB 2015 Prague/Does prevalence matter Ranking anti-malware products by potential victim impact.mp4 10.8 MB
- VB 2015 Prague/Dare 'DEVIL' beyond your senses with Dex Visualizer.mp4 10.8 MB
- VB 2021 Virtual/Shades of Red RedXOR Linux backdoor and its Chinese origins.mp4 10.7 MB
- VB 2021 Virtual/VB 2021 Virtual captions/VB2021 localhost Day #2 live track.eng.json 10.7 MB
- VB 2014 Seattle/We know it before you do predicting malicious domains.mp4 10.6 MB
- VB 2015 Prague/Speaking Dyreza protocol. Advantages of 'learning' a new language.mp4 10.6 MB
- VB 2015 Prague/It's a file infector it's ransomware it's Virlock.mp4 10.5 MB
- VB 2015 Prague/Doing more with less a study of file-less infection attacks.mp4 10.5 MB
- VB 2015 Prague/Solving the (in)security of home networked devices.mp4 10.5 MB
- VB 2016 Denver/Wild Android Collusions.mp4 10.4 MB
- VB 2015 Prague/Building a malware lab in the age of Big Data.mp4 10.4 MB
- VB 2015 Prague/WaveAtlas surfing through the landscape of current malware packers.mp4 10.4 MB
- VB 2015 Prague/Linux Moose endangered or extinct An update on this atypical embedded Linux botnet.mp4 10.4 MB
- VB 2013 Berlin/Hypervisor-based, hardware-assisted system monitoring.mp4 10.2 MB
- VB 2015 Prague/C&C-as-a-Service abusing third-party web services as C&C channels.mp4 9.9 MB
- VB 2015 Prague/We know what you did this summer Android banking trojan exposing its sins in the cloud.mp4 9.9 MB
- VB 2015 Prague/TurlaSat The Fault in our Stars.mp4 9.8 MB
- VB 2015 Prague/Inside recent FQDN (Fully Qualified Domain Name) surges on the Internet.mp4 9.7 MB
- VB 2015 Prague/Will Android trojan, worm or rootkit survive in SEAndroid and containerization.mp4 9.7 MB
- VB 2015 Prague/A quantitative examination of the current state of corporate security practices.mp4 9.6 MB
- VB 2024 Dublin/Inside the VB Conference (VB2024).mp4 9.6 MB
- VB 2013 Berlin/An automatic analysis and detection tool for Java exploits.mp4 9.6 MB
- VB 2014 Seattle/Attack surface analysis of Tizen devices.mp4 9.6 MB
- VB 2015 Prague/Ubiquity, security and you - malware, security and the Internet of Things.mp4 9.5 MB
- VB 2017 Madrid/The state of cybersecurity in Africa Kenya.mp4 9.2 MB
- VB 2019 London/Exploring the Chinese DDoS landscape.mp4 9.0 MB
- VB 2012 Dallas/Virus Bulletin 2012 Conference Overview.mp4 8.7 MB
- VB 2014 Seattle/DMARC - how to use it to improve your email reputation.mp4 8.6 MB
- VB 2017 Madrid/Gábor Szappanos wins fourth Peter Szőr Award.mp4 8.2 MB
- VB 2015 Prague/Labeless - no more.mp4 8.0 MB
- VB 2015 Prague/The evolution of ransomware from CryptoLocker to CryptoWall.mp4 7.8 MB
- VB 2010 Vancouver/VB2010 Social Network and Computer Security Panel Discussion.mp4 7.7 MB
- VB 2020 Virtual/The NExt Big Sur(ge) on macOS.mp4 6.7 MB
- VB 2015 Prague/The Volatility Bot-Excavator.mp4 5.8 MB
- VB 2007 Vienna/A different look at the VB2007 Conference in Vienna.mp4 5.1 MB
- VB 2010 Vancouver/Costin Raiu on Virus Bulletin 2010.mp4 3.3 MB
- VB 1992 Edinburgh/VB92report.pdf 2.3 MB
- VB 2021 Virtual/VB 2021 Virtual captions/Your five most critical M365 vulnerabilities revealed and how to fix them (Partner Content).eng.json 2.2 MB
- VB 2014 Seattle/Early launch Android malware your phone is 0wned.mp4 2.1 MB
- VB 1993 Amsterdam/VB93report.pdf 2.0 MB
- VB 2019 London/VB 2019 London captions/The Bagsu banker case.eng.json 1.9 MB
- VB 2020 Virtual/VB 2020 Virtual captions/Evolution of Excel 4.0 Macro Weaponization.eng.json 1.7 MB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Fireside chat Good times, bad times, you know I’ve had my share.eng.json 1.7 MB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Now you see me, now you don’t.eng.json 1.7 MB
- VB 1991 Jersey/1991-conferencereport.pdf 1.5 MB
- VB 2014 Seattle/VB 2014 Seattle captions/Sweeping the IP space the hunt for evil on the Internet.eng.json 1.4 MB
- VB 2013 Berlin/VB 2013 Berlin captions/Hypervisor-based, hardware-assisted system monitoring.eng.json 1.4 MB
- VB 2020 Virtual/VB 2020 Virtual captions/Emerging trends in malware downloaders.eng.json 1.4 MB
- VB 2022 Prague/VB 2022 Prague captions/Unmasking WindTape Patrick Wardle Objective See.eng.json 1.4 MB
- VB 2014 Seattle/VB 2014 Seattle captions/Methods of malware persistence on Mac OS X.eng.json 1.4 MB
- VB 2014 Seattle/VB 2014 Seattle captions/Attack points in health apps & wearable devices - how safe is your quantified self.eng.json 1.4 MB
- VB 2020 Virtual/VB 2020 Virtual captions/Hidden risks of advertisements.eng.json 1.4 MB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Where’s your data Ransomware protecting your ICS environment.eng.json 1.4 MB
- VB 2014 Seattle/VB 2014 Seattle captions/Duping the machine - malware strategies, post sandbox detection.eng.json 1.4 MB
- VB 2019 London/VB 2019 London captions/Oops It happened again.eng.json 1.3 MB
- VB 2021 Virtual/VB 2021 Virtual captions/Uncovering automatic Obfuscation-as-a-Service for malicious Android applications.eng.json 1.3 MB
- VB 2014 Seattle/VB 2014 Seattle captions/DNSSEC - how far have we come.eng.json 1.3 MB
- VB 2021 Virtual/VB 2021 Virtual captions/UNC788 Iran’s decade of credential harvesting and surveillance operations.eng.json 1.3 MB
- VB 2014 Seattle/Early launch Android malware your phone is 0wned (demo).mp4 1.3 MB
- VB 2020 Virtual/VB 2020 Virtual captions/She sells root shells by the C() shore.eng.json 1.3 MB
- VB 2014 Seattle/VB 2014 Seattle captions/DMARC - how to use it to improve your email reputation.eng.json 1.2 MB
- VB 2008 Ottawa/Security experts answer key questions at Virus Bulletin 2008.mp4 1.2 MB
- VB 2017 Madrid/VB 2017 Madrid captions/Crypton - exposing malware's deepest secrets.eng.json 1.2 MB
- VB 2015 Prague/VB 2015 Prague captions/ROSCO Repository Of Signed COde.eng.json 1.2 MB
- VB 2021 Virtual/VB 2021 Virtual captions/SubCrawl - a framework for the analysis and clustering of hacking tools found using open directories.eng.json 1.2 MB
- VB 2018 Montreal/VB 2018 Montreal captions/Office bugs on the rise.eng.json 1.2 MB
- VB 2013 Berlin/VB 2013 Berlin captions/Statistically effective protection against APT attacks.eng.json 1.2 MB
- VB 2024 Dublin/VB 2024 Dublin captions/CrackedCantil a malware symphony delivered by cracked software - - performed by loaders, infostealers..eng.json 1.1 MB
- VB 2017 Madrid/VB 2017 Madrid captions/Consequences of bad security in health care.eng.json 1.1 MB
- VB 2021 Virtual/VB 2021 Virtual captions/Hunting web skimmers with VirusTotal and YARA.eng.json 1.1 MB
- VB 2008 Ottawa/Interview with John Hawes of Virus Bulletin.mp4 1.1 MB
- VB 2010 Vancouver/Stuxnet demo in Virus Bulletin 2010 conference.mp4 1.1 MB
- VB 2019 London/VB 2019 London captions/Absolutely routed Why routers are the new bullseye in cyber attacks.eng.json 1.1 MB
- VB 2015 Prague/VB 2015 Prague captions/Android ransomware turning CryptoLocker into CryptoUnlocker.eng.json 1.1 MB
- VB 2016 Denver/VB 2016 Denver captions/Nymaim the Untold Story.eng.json 1.1 MB
- VB 2020 Virtual/VB 2020 Virtual captions/The (f)utility of indicators.eng.json 1.1 MB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/New PlugX Fingerprint-THOR.eng.json 1.1 MB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Panel A tale of two companies.eng.json 1.0 MB
- VB 2013 Berlin/VB 2013 Berlin captions/An automatic analysis and detection tool for Java exploits.eng.json 1.0 MB
- VB 2021 Virtual/VB 2021 Virtual captions/The baffling Berserk Bear a decade’s activity targeting critical infrastructure.eng.json 1.0 MB
- VB 2009 Geneva/The Virus Bulletin yodelling competition.mp4 1.0 MB
- VB 2020 Virtual/VB 2020 Virtual captions/NetWalking on Sunshine.eng.json 1.0 MB
- VB 2014 Seattle/VB 2014 Seattle captions/Swipe away, we're watching you.eng.json 1.0 MB
- VB 2015 Prague/VB 2015 Prague captions/Attack on the drones security vulnerabilities of unmanned aerial vehicles.eng.json 998.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Payment required rare HTTP statuses and air-gaps avoidance from the authors of COMPFun.eng.json 998.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Ransomware a correlation between infection vectors and victims.eng.json 991.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Dissecting fleeceware apps the million-dollar money-making machine in Android and iOS.eng.json 971.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Closing Keynote Threatscaping like a CERT.eng.json 945.5 KB
- VB 2016 Denver/VB 2016 Denver captions/One-Click Fileless Infection.eng.json 937.2 KB
- VB 2021 Virtual/VB 2021 Virtual captions/CTO (Call Tree Overviewer) yet another function call tree viewer.eng.json 930.4 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Peak Analyzer an automated malware campaign detector.eng.json 916.9 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Reverse Android malware like a Jedi Master.eng.json 906.2 KB
- VB 2015 Prague/VB 2015 Prague captions/Speaking Dyreza protocol. Advantages of 'learning' a new language.eng.json 905.1 KB
- VB 2021 Virtual/VB 2021 Virtual captions/The ‘Ghost Hand’ attack.eng.json 904.2 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Operation LagTime IT colourful Panda footprint.eng.json 901.6 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Optimized mal-ops. Hack the ad network like a boss.eng.json 896.8 KB
- VB 2021 Virtual/VB 2021 Virtual captions/All roads lead to Rome the Conti manual leak dissection.eng.json 870.9 KB
- VB 2020 Virtual/VB 2020 Virtual captions/One year later Challenges for young anti-malware products today.eng.json 858.8 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Keynote Learning from failure ransomware and future conflicts.eng.json 856.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Ghost Mach-O an analysis of Lazarus’ Mac-malware innovations.eng.json 854.9 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Tracking Rapid Evolution Copycat of An APT RAT in Asia.eng.json 854.9 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Operation Diànxùn a cyberespionage campaign targeting telecommunication companies.eng.json 845.6 KB
- VB 2019 London/VB 2019 London captions/Catch me if you can detection of injection exploitation by validating query and API integrity.eng.json 844.8 KB
- VB 2017 Madrid/VB 2017 Madrid captions/The state of cybersecurity in Africa Kenya.eng.json 826.1 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Unveiling the CryptoMimic.eng.json 783.1 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Chasing the Digital Pirates Unveiling the Container Threats.eng.json 733.4 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Hiding the network behind the network. Botnet proxy business model.eng.json 723.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Dancing samba with Dolphins tracking a Brazilian threat actor moving to Europe.eng.json 718.1 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Battlefield Ukraine finding patterns behind summer cyber attacks.eng.json 689.6 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/The use of dark patterns and psychological tricks in Android malware.eng.json 681.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Lightweight emulation based IoC extraction for Gafgyt botnets.eng.json 645.5 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Shades of Red RedXOR Linux backdoor and its Chinese origins.eng.json 628.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Clandestine hunter two strategies for supply chain attack.eng.json 611.8 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Sandworm reading the indictment between the lines.eng.json 586.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Most sophisticated technique of the year goes to.eng.json 578.6 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Incident response with an XDR.eng.json 577.4 KB
- VB 2019 London/VB 2019 London captions/Defeating APT10 compiler-level obfuscations.eng.json 574.8 KB
- VB 2015 Prague/VB 2015 Prague captions/The Volatility Bot-Excavator.eng.json 558.4 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/VB2010 Social Network and Computer Security Panel Discussion.eng.json 540.2 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Keynote The Community Effect.eng.json 450.8 KB
- VB 2021 Virtual/VB 2021 Virtual captions/A detailed analysis of a new version of Darkside Ransomware (V. 2.1.2.3).eng.json 400.4 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/Costin Raiu on Virus Bulletin 2010.eng.json 384.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/VB2021 localhost Day #1 live track.eng.srt 338.8 KB
- VB 2021 Virtual/VB 2021 Virtual captions/VB2021 localhost Day #1 live track.eng.txt 333.8 KB
- VB 2021 Virtual/VB 2021 Virtual captions/VB2021 localhost Day #1 live track.eng.lrc 330.9 KB
- VB 2021 Virtual/VB 2021 Virtual captions/VB2021 localhost Day #1 live track.eng.vtt 322.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/VB2021 localhost Day #2 live track.eng.srt 307.9 KB
- VB 2021 Virtual/VB 2021 Virtual captions/VB2021 localhost Day #2 live track.eng.txt 296.1 KB
- VB 2020 Virtual/VB 2020 Virtual captions/The NExt Big Sur(ge) on macOS.eng.json 295.3 KB
- VB 2021 Virtual/VB 2021 Virtual captions/VB2021 localhost Day #2 live track.eng.lrc 293.7 KB
- VB 2021 Virtual/VB 2021 Virtual captions/VB2021 localhost Day #2 live track.eng.vtt 293.1 KB
- VB 2021 Virtual/VB 2021 Virtual captions/VB2021 localhost Day #1 live track.eng.tsv 289.7 KB
- VB 2021 Virtual/VB 2021 Virtual captions/VB2021 localhost Day #2 live track.eng.tsv 257.9 KB
- VB 2021 Virtual/VB 2021 Virtual captions/VB2021 localhost Day #1 live track.eng.text 239.9 KB
- VB 2021 Virtual/VB 2021 Virtual captions/VB2021 localhost Day #2 live track.eng.text 216.1 KB
- VB 1993 Amsterdam/img004_595.jpg 166.1 KB
- VB 1993 Amsterdam/img003_595.jpg 165.0 KB
- VB 1993 Amsterdam/img002_595.jpg 159.4 KB
- VB 1993 Amsterdam/img006_595.jpg 157.8 KB
- VB 1993 Amsterdam/img008_595.jpg 152.4 KB
- VB 1993 Amsterdam/img007_595.jpg 149.8 KB
- VB 1993 Amsterdam/img001_595.jpg 146.5 KB
- VB 1993 Amsterdam/img005_595.jpg 139.0 KB
- VB 1991 Jersey/img003_595.jpg 123.3 KB
- VB 2023 London/VB 2023 London captions/Panel discussion Addressing the ransomware threat from outside the lab Chester Wisniewski et al.eng.srt 121.8 KB
- VB 1991 Jersey/img002_595.jpg 113.4 KB
- VB 1991 Jersey/img001_595.jpg 107.7 KB
- VB 2023 London/VB 2023 London captions/Applied one-to-many code similarity analysis using MCRIT - Daniel Plohmann (Fraunhofer FKIE).eng.srt 105.5 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Workshop Writing malware configuration parsers - Mark Lim & Zong Yu Wu (Palo Alto Networks).eng.srt 86.5 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Fireside Chat Comfortably Numb.eng.srt 86.3 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Adware is just malware with a legal department.eng.srt 78.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Ramsay A cyber-espionage toolkit tailored for air-gapped networks.eng.srt 76.5 KB
- VB 2021 Virtual/VB 2021 Virtual captions/STK, A-OK Stopping messaging attacks on vulnerable SIMs.eng.srt 75.2 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Advanced Pasta Threat mapping threat actor usage of open-source offensive security tools.eng.srt 74.5 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Unveiling shadows key tactics for tracking cyber threat actors, attribution, and infrastructure.eng.srt 73.2 KB
- VB 2019 London/VB 2019 London captions/Keynote address The security products we deserve.eng.srt 72.3 KB
- VB 2023 London/VB 2023 London captions/Keynote address The physics of information asymmetry - Juan Andrés Guerrero Saade (SentinelOne).eng.srt 72.0 KB
- VB 2022 Prague/VB 2022 Prague captions/Keynote address Why are you telling me this Hakan Tanriverdi Bayerischer Rundfunk.eng.srt 71.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Opening Keynote Collaborating with Competitors A Better Strategy to Beat Adversaries.eng.srt 70.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Creating Network Effects Intelligence Sharing for Supply Chain Security.eng.srt 68.3 KB
- VB 2024 Dublin/VB 2024 Dublin captions/VB2024 Closing keynote May you live in interesting times - Brian Honan (BH Consulting).eng.srt 66.7 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Compromising IOT C&C Panels for Unearthing Infections.eng.srt 66.0 KB
- VB 2022 Prague/VB 2022 Prague captions/Exploit archaeology a forensic history of in the wild NSO Group exploits Donncha Ó Cearbhaill Amnest.eng.srt 64.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Ransomware Evolution in LATAM.eng.srt 64.2 KB
- VB 2015 Prague/VB 2015 Prague captions/Keynote address One man's anti-malware researcher is.eng.srt 64.0 KB
- VB 2007 Vienna/VB 2007 Vienna captions/A different look at the VB2007 Conference in Vienna.eng.json 64.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Pay2Key - the newly discovered ransomware traced all the way to Iran.eng.srt 63.4 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Fake News, Inc.eng.srt 63.4 KB
- VB 2024 Dublin/VB 2024 Dublin captions/BEC and phishing targets local election candidate me - Andrew Brandt (Sophos).eng.srt 62.6 KB
- VB 2013 Berlin/VB 2013 Berlin captions/VB2013 Keynote - Ethics and the AV industry in the age of WikiLeaks.eng.srt 62.6 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Endpoint security checkbox a stealthy approach to cyberdefence.eng.srt 62.3 KB
- VB 2016 Denver/VB 2016 Denver captions/Wave Your False Flags Deception Tactics Muddying Attribution in Targeted Attacks.eng.srt 62.2 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Anatomy of an attack detecting and defeating CRASHOVERRIDE.eng.srt 61.9 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Getting cozy with milk and WARMCOOKIES - Daniel Stepanic (Elastic).eng.srt 61.9 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Walking in your enemy's shadow when fourth-party collection becomes attribution hell.eng.srt 61.9 KB
- VB 2023 London/VB 2023 London captions/SharpTongue pwning your foreign policy, one interview request at a time - Tom Lancaster (Volexity).eng.srt 61.5 KB
- VB 2019 London/VB 2019 London captions/TIPS Keynote Nexus between OT and IT threat intelligence.eng.srt 61.2 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Offensive malware analysis dissecting OSX FruitFly via a custom C&C server.eng.srt 60.9 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Where have all the good hires gone.eng.srt 60.2 KB
- VB 2016 Denver/VB 2016 Denver captions/Getting Duped Piggybacking on Webcam Streams for Surreptitious Recordings.eng.srt 59.9 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Foreverdays tracking and mitigating threats targeting civil society orgs.eng.srt 59.8 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Byteing back detection, dissection & protection against macOS stealers Patrick Wardle Objective-See.eng.srt 59.4 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Life & DEaTH building detection, forensics, & intelligence at scale Selena Larson & Konstan Klinger.eng.srt 59.4 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Reviewing 2022 KA SAT incident & implications for distributed communication environments -Joe Slowik.eng.srt 59.3 KB
- VB 2023 London/VB 2023 London captions/Keynote address Solving cyber insecurity - Martin Lee (Cisco Talos).eng.srt 59.2 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Project 0xA11C deoxidizing the Rust malware ecosystem - Nicole Fishbein & Juan Andrés Guerro-Saade.eng.srt 59.1 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Your five most critical M365 vulnerabilities revealed and how to fix them (Partner Content).eng.srt 59.1 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/Stuxnet demo in Virus Bulletin 2010 conference.eng.json 59.0 KB
- VB 2019 London/VB 2019 London captions/TIPS Keynote Building secure sharing systems that treat humans as features not bugs.eng.srt 59.0 KB
- VB 2023 London/VB 2023 London captions/Everything happens for a reason the choices made by ransomware operators - Jono Davis (PwC).eng.srt 58.8 KB
- VB 2019 London/VB 2019 London captions/Pulling the PKPLUG the adversary playbook for the long-standing espionage activity of.eng.srt 58.5 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Business Email Compromise - Scalable Attribution Powering Industry and Law Enforcement Collaboration.eng.srt 58.2 KB
- VB 2020 Virtual/VB 2020 Virtual captions/2030 backcasting the potential rise and fall of cyber threat intelligence.eng.srt 58.1 KB
- VB 2022 Prague/VB 2022 Prague captions/Zeroing in on XENOTIME analysis of the entities responsible for the Triton event Joe Slowik Gigamon.eng.srt 58.1 KB
- VB 2015 Prague/VB 2015 Prague captions/Breaking the bank(er) automated configuration data extraction for banking malware.eng.srt 57.3 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Arming WinRAR deep dive into APTs exploiting WinRAR's 0 day vulnerability - a SideCopy case study.eng.srt 57.1 KB
- VB 2019 London/VB 2019 London captions/Attribution is in the object using RTF object dimensions to track APT phishing weaponizers.eng.srt 57.0 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Modern reconnaissance phase on APT - protection layer.eng.srt 56.3 KB
- VB 2021 Virtual/VB 2021 Virtual captions/A deep dive into Water Roc, one of the most relentless ransomware groups.eng.srt 56.3 KB
- VB 2022 Prague/VB 2022 Prague captions/Hunting the AndroidBianLian botnet Axelle Apvrille Fortinet.eng.srt 56.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Bugs in malware - uncovering vulnerabilities found in malware payloads.eng.srt 55.9 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Leveraging AI to enhance the capabilities of SHAREM Shellcode Analysis Framework Bramwell Brizendine.eng.srt 55.7 KB
- VB 2022 Prague/VB 2022 Prague captions/Not Safe for Windows NSFW a China based threat with a lot to say Jono Davis PwC.eng.srt 55.5 KB
- VB 2015 Prague/VB 2015 Prague captions/POS fraud - trends and counter-actions to mass fraud.eng.srt 55.5 KB
- VB 2016 Denver/VB 2016 Denver captions/Neverquest Crime as a Service and On the Hunt for the Big Bucks.eng.srt 55.3 KB
- VB 2021 Virtual/VB 2021 Virtual captions/ShadowPad the masterpiece of privately sold malware in Chinese espionage.eng.srt 55.2 KB
- VB 2015 Prague/VB 2015 Prague captions/The Kobayashi Maru dilemma.eng.srt 55.2 KB
- VB 2024 Dublin/VB 2024 Dublin captions/VB2024 Opening keynote Solving puzzles protecting high risk communities - Runa Sandvik (Granitt).eng.srt 55.2 KB
- VB 2023 London/VB 2023 London captions/W3LL phishing kit - the tools, the criminal ecosystem, and the market impact - Martijn van den Berk.eng.srt 55.1 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Panel Flattening the Curve of Cyber-Risks.eng.srt 54.7 KB
- VB 2016 Denver/VB 2016 Denver captions/The Beginning of the End(point) Where we are now and where we'll be in five years.eng.srt 54.7 KB
- VB 2021 Virtual/VB 2021 Virtual captions/From match fixing to data exfiltration - a story of Messaging as a Service (MaaS).eng.srt 54.7 KB
- VB 2019 London/VB 2019 London captions/2,000 reactions to a malware attack - accidental study.eng.srt 54.6 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Modern-day witchcraft a new breed of hybrid attacks by ransomware operators -Vaibhav Deshmukh et al.eng.srt 54.5 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Your five most critical M365 vulnerabilities revealed and how to fix them (Partner Content).eng.txt 54.3 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Your five most critical M365 vulnerabilities revealed and how to fix them (Partner Content).eng.vtt 54.3 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Unveiling the kernel rootkit discovery using selective automated kernel memory differencing.eng.srt 54.0 KB
- VB 2019 London/VB 2019 London captions/A deep dive into iPhone exploit chains.eng.srt 54.0 KB
- VB 2023 London/VB 2023 London captions/Panel Securing the future the vital role of computer security vendors in an AI-driven world.eng.srt 54.0 KB
- VB 2023 London/VB 2023 London captions/DNS takeover the full journey and redemption - John Jensen (Silent Push).eng.srt 53.9 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Your five most critical M365 vulnerabilities revealed and how to fix them (Partner Content).eng.lrc 53.9 KB
- VB 2018 Montreal/VB 2018 Montreal captions/The Big Bang Theory by APT-C-23.eng.srt 53.9 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Attack surface analysis of Tizen devices.eng.srt 53.8 KB
- VB 2022 Prague/VB 2022 Prague captions/SHAREM shellcode analysis framework with emulation, a disassembler, and timeless debugging VERONA La.eng.srt 53.8 KB
- VB 2016 Denver/VB 2016 Denver captions/Great Crypto Failures.eng.srt 53.8 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Beyond lexical and PDNS using signals on graphs to uncover online threats at scale.eng.srt 53.8 KB
- VB 2023 London/VB 2023 London captions/Intent-based approach to detect email account compromise - Abhishek Singh & Fahim Abbasi (Cisco).eng.srt 53.1 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Now you see me, now you don’t.eng.txt 53.1 KB
- VB 2019 London/VB 2019 London captions/The Bagsu banker case.eng.txt 52.9 KB
- VB 2015 Prague/VB 2015 Prague captions/Ubiquity, security and you - malware, security and the Internet of Things.eng.srt 52.9 KB
- VB 2024 Dublin/VB 2024 Dublin captions/TIPS Fireside chat Achtung Baby Cybersecurity insights with U2 you too - Jeannette Jarvis et al.eng.srt 52.7 KB
- VB 2023 London/VB 2023 London captions/Generic script emulation - Kurt Natvig (Acronis).eng.srt 52.7 KB
- VB 2015 Prague/VB 2015 Prague captions/Modelling the network behaviour of malware to block malicious patterns.eng.srt 52.7 KB
- VB 2015 Prague/VB 2015 Prague captions/Dead and buried in their crypts defeating modern ransomware.eng.srt 52.6 KB
- VB 2016 Denver/VB 2016 Denver captions/APT Reports and OPSEC Evolution, or These Are Not the APT Reports You Are Looking For.eng.srt 52.6 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Exploring the virtual worlds of advergaming.eng.srt 52.6 KB
- VB 2024 Dublin/VB 2024 Dublin captions/TIPS Certified malware a case for industry TI sharing of DigSig metadata Samir Mody (K7).eng.srt 52.4 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Tracking FIN7 malware honeypots, new AI deepfake lures - Zach Edwards (Silent Push).eng.srt 52.3 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Now you see me, now you don’t.eng.lrc 52.3 KB
- VB 2019 London/VB 2019 London captions/The Bagsu banker case.eng.lrc 52.1 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Draw me like one of your French APTs - expanding our descriptive palette for digital threat actors.eng.srt 51.9 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Quantifying maliciousness in Alexa top-ranked domains.eng.srt 51.8 KB
- VB 2014 Seattle/VB 2014 Seattle captions/OPSEC for security researchers.eng.srt 51.6 KB
- VB 2015 Prague/VB 2015 Prague captions/Last-minute paper The mysterious case of Linux.Wifatch.eng.srt 51.5 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Under the hood - the automotive challenge.eng.srt 51.4 KB
- VB 2022 Prague/VB 2022 Prague captions/You OTA know combating malicious Android system updaters Łukasz Siewierski & Alec Guertin Google.eng.srt 51.0 KB
- VB 2024 Dublin/VB 2024 Dublin captions/TIPS Indicator wranglin’ - an approach to dynamically typing IOCs with poor data context -Noah Dunn.eng.srt 51.0 KB
- VB 2016 Denver/VB 2016 Denver captions/Anti-malware Testing Undercover.eng.srt 50.8 KB
- VB 2024 Dublin/VB 2024 Dublin captions/From code to crime exploring threats in GitHub Codespaces - Jaromir Horejsi & Nitesh Surana.eng.srt 50.8 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Take care, spyware is slipping into your phones through Operation Poisoned News.eng.srt 50.5 KB
- VB 2015 Prague/VB 2015 Prague captions/Building a malware lab in the age of Big Data.eng.srt 50.3 KB
- VB 2023 London/VB 2023 London captions/Dancing the night away with named pipes - Daniel Stepanic (Elastic).eng.srt 50.2 KB
- VB 2023 London/VB 2023 London captions/Abusing Electron based applications in targeted attacks Jaromir Horejsi (Trend Micro).eng.srt 50.2 KB
- VB 2023 London/VB 2023 London captions/Mac ing sense of the 3CX supply chain attack analysis of the macOS payloads - Patrick Wardle.eng.srt 49.9 KB
- VB 2024 Dublin/VB 2024 Dublin captions/TIPS Stix and stones enabling faster intelligence gathering with GenAI and OASIS - Kieran Hughes.eng.srt 49.9 KB
- VB 2022 Prague/VB 2022 Prague captions/Encryption time flies when you're having fun the case of the exotic BlackCat ransomware Aleksandar M.eng.srt 49.8 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Fireside chat Good times, bad times, you know I’ve had my share.eng.srt 49.7 KB
- VB 2014 Seattle/VB 2014 Seattle captions/The evolution of webinjects.eng.srt 49.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Another threat actor day.eng.srt 49.4 KB
- VB 2015 Prague/VB 2015 Prague captions/C&C-as-a-Service abusing third-party web services as C&C channels.eng.srt 49.3 KB
- VB 2015 Prague/VB 2015 Prague captions/Does prevalence matter Ranking anti-malware products by potential victim impact.eng.srt 49.3 KB
- VB 2023 London/VB 2023 London captions/The history & tactics of visa-centric scams in search, spam & social apps - Chris Boyd.eng.srt 49.2 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Your five most critical M365 vulnerabilities revealed and how to fix them (Partner Content).eng.tsv 49.0 KB
- VB 2022 Prague/VB 2022 Prague captions/The long arm of the prisoner social engineering from Kenyan prisons Patricia Musomba.eng.srt 49.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/German Angst - Cybercrime Ecosystem in the DACH Region.eng.srt 49.0 KB
- VB 2013 Berlin/VB 2013 Berlin captions/Back channels and bitcoins ZeroAccess' secret C&C communications.eng.srt 48.9 KB
- VB 2023 London/VB 2023 London captions/Possible supply chain attack targeting South Asian government delivers Shadowpad - Daniel Lunghi.eng.srt 48.7 KB
- VB 2020 Virtual/VB 2020 Virtual captions/A new open-source hypervisor-level malware monitoring and extraction system.eng.srt 48.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/TA505 attacking industries around the world.eng.srt 48.3 KB
- VB 2022 Prague/VB 2022 Prague captions/Sha Zhu Pan cocktail of cryptocurrency, social engineering and fake apps targeting Android and iPhon.eng.srt 48.2 KB
- VB 2015 Prague/VB 2015 Prague captions/Linux Moose endangered or extinct An update on this atypical embedded Linux botnet.eng.srt 48.2 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Turning Trickbot decoding an encrypted command-and-control channel.eng.srt 48.2 KB
- VB 2016 Denver/VB 2016 Denver captions/Modern Attacks on Russian Financial Institutions.eng.srt 48.1 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Behind the Black Mirror Simulating attacks with mock C2 servers.eng.srt 48.0 KB
- VB 2016 Denver/VB 2016 Denver captions/Defeating Sandbox Evasion How to Increase Successful Emulation Rate in your Virtualized Environment.eng.srt 47.7 KB
- VB 2023 London/VB 2023 London captions/Infostealers investigate the cybercrime threat in its ecosystem - Livia Tibirna & Pierre Le Bourhis.eng.srt 47.6 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Nine circles of Cerber.eng.srt 47.6 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Little Brother is watching - we know all your secrets.eng.srt 47.5 KB
- VB 2019 London/VB 2019 London captions/Webcam interception and protection in kernel mode in Windows.eng.srt 47.3 KB
- VB 2024 Dublin/VB 2024 Dublin captions/TIPS Keynote No more secrets in cybersecurity implementing ‘radical transparency’ Suzanne Spaulding.eng.srt 47.1 KB
- VB 2019 London/VB 2019 London captions/Cyber espionage in the Middle East unravelling OSX.WindTail.eng.srt 47.0 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Breaking boundaries investigating vulnerable drivers and mitigating risks - Jiří Vinopal.eng.srt 46.8 KB
- VB 2024 Dublin/VB 2024 Dublin captions/TA577 walked just past you indirect syscalls in Pikabot - Emre Güler (VMRay).eng.srt 46.6 KB
- VB 2024 Dublin/VB 2024 Dublin captions/CrackedCantil a malware symphony delivered by cracked software - - performed by loaders, infostealerseng.srt 46.5 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Evolution of Excel 4.0 Macro Weaponization.eng.txt 46.5 KB
- VB 2018 Montreal/VB 2018 Montreal captions/From drive-by download to drive-by mining understanding the new paradigm.eng.srt 46.5 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Shedding skin - Turla's fresh faces.eng.srt 46.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Like bees to a honeypot - a journey through honeypots.eng.srt 46.3 KB
- VB 2024 Dublin/VB 2024 Dublin captions/The Impersonators - Gabor Szappanos & Steeve Gaudreault (Sophos).eng.srt 46.2 KB
- VB 2023 London/VB 2023 London captions/MEGALO 414E DON uncovering data espionage, blackmailing and shell companies in mobile lending.eng.srt 46.2 KB
- VB 2021 Virtual/VB 2021 Virtual captions/The keksec botnets we observed in the past year.eng.srt 46.1 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Evolution after prosecution Psychedelic APT41.eng.srt 46.1 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Evolution of Excel 4.0 Macro Weaponization.eng.lrc 46.0 KB
- VB 2024 Dublin/VB 2024 Dublin captions/SO that looks suspicious leveraging process memory and kernel usermode probes to detect Shared.eng.srt 45.9 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Hospitals, airports and telcos - modern approach to attributing hacktivism attacks - Itay Cohen.eng.srt 45.8 KB
- VB 2023 London/VB 2023 London captions/Don't flatten yourself restoring malware with Control Flow Flattening obfuscation - Geri Revay.eng.srt 45.6 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Leaving our ZIP undone how to abuse ZIP to deliver malware apps.eng.srt 45.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Evolution of Excel 4.0 Macro Weaponization.eng.srt 45.5 KB
- VB 2022 Prague/VB 2022 Prague captions/Combating control flow flattening in - NET malware Georgy Kucherin Kaspersky.eng.srt 45.5 KB
- VB 2019 London/VB 2019 London captions/Abusing third-party cloud services in targeted attacks.eng.srt 45.5 KB
- VB 2021 Virtual/VB 2021 Virtual captions/When malware changed its mind an empirical study of variable program behaviours in the real world.eng.srt 45.4 KB
- VB 2023 London/VB 2023 London captions/Side loading is not dead the Chinese and the Korean way - Gabor Szappanos (Sophos).eng.srt 45.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Context Aware Detection The future of cybersecurity.eng.srt 45.4 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Internet balkanization why are we raising borders online.eng.srt 45.4 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Fireside chat Good times, bad times, you know I’ve had my share.eng.vtt 45.4 KB
- VB 2019 London/VB 2019 London captions/The Bagsu banker case.eng.srt 45.3 KB
- VB 2022 Prague/VB 2022 Prague captions/Russian wipers in the cyberwar against Ukraine Alexander Adamov NioGuard Security Lab.eng.srt 45.0 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Octopus Prime it didn't turn into a truck, but a widely spread Android botnet - Thibault Seret.eng.srt 44.8 KB
- VB 2015 Prague/VB 2015 Prague captions/DDoS trojan a malicious concept that conquered the ELF format.eng.srt 44.7 KB
- VB 2023 London/VB 2023 London captions/Look out Outlook's gonna get you Anurag Shandilya (K7 Computing).eng.srt 44.6 KB
- VB 2019 London/VB 2019 London captions/Static analysis methods for detection of Microsoft Office exploits.eng.srt 44.4 KB
- VB 2022 Prague/VB 2022 Prague captions/Lazarus & BYOVD evil to the Windows core Peter Kalnai & Matěj Havránek ESET.eng.srt 44.3 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Fireside chat Good times, bad times, you know I’ve had my share.eng.txt 44.3 KB
- VB 2015 Prague/VB 2015 Prague captions/Economic sanctions on malware.eng.srt 44.2 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Who wasn’t responsible for Olympic Destroyer (Paul Rascagnères & Warren Mercer).eng.srt 44.2 KB
- VB 2016 Denver/VB 2016 Denver captions/Open Source Malware Lab.eng.srt 44.2 KB
- VB 2024 Dublin/VB 2024 Dublin captions/TIPS Unveiling cybersecurity impact the role of published security findings in strengthening.eng.srt 44.1 KB
- VB 2015 Prague/VB 2015 Prague captions/A quantitative examination of the current state of corporate security practices.eng.srt 44.1 KB
- VB 2019 London/VB 2019 London captions/Exploring Emotet, an elaborate everyday enigma.eng.srt 44.0 KB
- VB 2015 Prague/VB 2015 Prague captions/Solving the (in)security of home networked devices.eng.srt 43.9 KB
- VB 2023 London/VB 2023 London captions/The global state of scams in 2023 - Jorij Abraham (GASA).eng.srt 43.9 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Fireside chat Good times, bad times, you know I’ve had my share.eng.lrc 43.9 KB
- VB 2015 Prague/VB 2015 Prague captions/The Unbearable Lightness of APTing.eng.srt 43.9 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Unpacking the packed unpacker reversing an Android anti-analysis library.eng.srt 43.9 KB
- VB 2014 Seattle/VB 2014 Seattle captions/We know it before you do predicting malicious domains.eng.srt 43.9 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Threat hunting from SolarWinds to Hafnium APT.eng.srt 43.8 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Android Flutter malware - Axelle Apvrille (Fortinet).eng.srt 43.6 KB
- VB 2016 Denver/VB 2016 Denver captions/Mobile Applications a Backdoor into Internet of Things.eng.srt 43.6 KB
- VB 2019 London/VB 2019 London captions/The Bagsu banker case.eng.tsv 43.5 KB
- VB 2016 Denver/VB 2016 Denver captions/Malicious Proxy auto-configs An Easy Way to Harvest Banking Credentials.eng.srt 43.5 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Now you see me, now you don’t.eng.tsv 43.4 KB
- VB 2016 Denver/VB 2016 Denver captions/Building a Local PassiveDNS Capability for Malware Incident Response.eng.srt 43.4 KB
- VB 2023 London/VB 2023 London captions/Hit the bullseye detecting browser exploits abusing the X memory in WebAssembly - Edouard Bochin.eng.srt 43.4 KB
- VB 2015 Prague/VB 2015 Prague captions/The elephant in the room.eng.srt 43.2 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Lazarus Group one mahjong game played with different sets of tiles.eng.srt 43.2 KB
- VB 2019 London/VB 2019 London captions/Never before had Stierlitz been so close to failure.eng.srt 43.1 KB
- VB 2022 Prague/VB 2022 Prague captions/Lessons learned from six Lapsus$ incident responses Gabriela Nicolao & Santiago Abastante Deloitte.eng.srt 43.1 KB
- VB 2015 Prague/VB 2015 Prague captions/Sizing cybercrime incidents and accidents, hints and allegations.eng.srt 43.1 KB
- VB 2023 London/VB 2023 London captions/R2R stomping - are you ready to run - Jiří Vinopal (Check Point Research).eng.srt 43.0 KB
- VB 2019 London/VB 2019 London captions/Rich headers leveraging the mysterious artifact of the PE format.eng.srt 43.0 KB
- VB 2022 Prague/VB 2022 Prague captions/Creepy things that glow in the dark a deep look @ POLONIUM's undocumented tools Robert Lipovsky ESET.eng.srt 42.9 KB
- VB 2023 London/VB 2023 London captions/Deobfuscating virtualized malware using Hex Rays Decompiler - Georgy Kucherin (Kaspersky).eng.srt 42.6 KB
- VB 2024 Dublin/VB 2024 Dublin captions/The Mask has been unmasked again - Georgy Kucherin & Marc Rivero López.eng.srt 42.3 KB
- VB 2019 London/VB 2019 London captions/Attor spy platform with curious GSM fingerprinting.eng.srt 42.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/GuLoader No, CloudEyE. Flattening the attack curve of the top malicious dropper.eng.srt 42.3 KB
- VB 2017 Madrid/VB 2017 Madrid captions/The life story of an IPT - Inept Persistent Threat actor.eng.srt 42.2 KB
- VB 2015 Prague/VB 2015 Prague captions/WaveAtlas surfing through the landscape of current malware packers.eng.srt 42.2 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Your five most critical M365 vulnerabilities revealed and how to fix them (Partner Content).eng.text 42.2 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Client Maximus raises the bar.eng.srt 42.1 KB
- VB 2016 Denver/VB 2016 Denver captions/Last-minute paper A Malicious OS X Cocktail Served from a Tain'ted Bottle.eng.srt 42.1 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Behind the scenes of the SamSam investigation.eng.srt 42.1 KB
- VB 2015 Prague/VB 2015 Prague captions/Anonymity is king.eng.srt 42.0 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Duping the machine - malware strategies, post sandbox detection.eng.txt 42.0 KB
- VB 2018 Montreal/VB 2018 Montreal captions/The modality of mortality in domain names.eng.srt 42.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Evolution of Excel 4.0 Macro Weaponization.eng.vtt 42.0 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Design to discover security analytics with 3D visualization engine.eng.srt 41.9 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Where’s your data Ransomware protecting your ICS environment.eng.txt 41.9 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Last-minute paper Spora the saga continues a.k.a. how to ruin your research in a week.eng.srt 41.9 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Triada the past, the present and the (hopefully not existing) future.eng.srt 41.7 KB
- VB 2015 Prague/VB 2015 Prague captions/Last-minute paper Operation Potao Express analysis of a cyber-espionage toolkit.eng.srt 41.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Emerging trends in malware downloaders.eng.srt 41.6 KB
- VB 2019 London/VB 2019 London captions/Buhtrap metamorphosis from cybercrime to cyber espionage.eng.srt 41.6 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Where is the cuckoo egg.eng.srt 41.5 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Sweeping the IP space the hunt for evil on the Internet.eng.txt 41.5 KB
- VB 2019 London/VB 2019 London captions/The Bagsu banker case.eng.vtt 41.5 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Duping the machine - malware strategies, post sandbox detection.eng.lrc 41.4 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Marketplace scams neanderthals hunting mammoths with Telekopye - Jakub Souček & Radek Jizba (ESET).eng.srt 41.3 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Where’s your data Ransomware protecting your ICS environment.eng.lrc 41.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Anchor, Bazar, and the Trickbot Connection.eng.srt 41.3 KB
- VB 2015 Prague/VB 2015 Prague captions/From Asia with love Smartphones with pre-installed malware.eng.srt 41.3 KB
- VB 2014 Seattle/VB 2014 Seattle captions/P0wned by a barcode stealing money from offline users.eng.srt 41.2 KB
- VB 2016 Denver/VB 2016 Denver captions/Wild Android Collusions.eng.srt 41.2 KB
- VB 2019 London/VB 2019 London captions/Thwarting Emotet email conversation thread hijacking with clustering.eng.srt 41.2 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Transparency, Trust and Intention What dismantling the heart of cyberattack public attribution.eng.srt 41.2 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Industroyer biggest threat to industrial control systems since Stuxnet.eng.srt 41.2 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Caphaw - the advanced persistent pluginer.eng.srt 41.2 KB
- VB 2019 London/VB 2019 London captions/Medical IoT for diabetes and cybercrime.eng.srt 41.1 KB
- VB 2023 London/VB 2023 London captions/TetrisPhantom targeted attacks using secure USB - Noushin Shabab (Kaspersky).eng.srt 41.1 KB
- VB 2023 London/VB 2023 London captions/The Dragon who sold his Camaro reversing a custom router implant - Itay Cohen (Check Point).eng.srt 41.1 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Sweeping the IP space the hunt for evil on the Internet.eng.lrc 40.9 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Methods of malware persistence on Mac OS X.eng.txt 40.8 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Now you see me, now you don’t.eng.srt 40.8 KB
- VB 2013 Berlin/VB 2013 Berlin captions/Hacking Team and Gamma International in 'business-to-government malware'.eng.srt 40.6 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Code blue energy - Righard Zwienenberg & Josep Albors (ESET).eng.srt 40.6 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Smart home appliance security & malware.eng.srt 40.5 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Evolution of Excel 4.0 Macro Weaponization.eng.tsv 40.4 KB
- VB 2013 Berlin/VB 2013 Berlin captions/Surviving 0-days - reducing the window of exposure.eng.srt 40.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Emissary (Pandas) in the Middle East.eng.srt 40.3 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Methods of malware persistence on Mac OS X.eng.lrc 40.3 KB
- VB 2022 Prague/VB 2022 Prague captions/Unmasking WindTape Patrick Wardle Objective See.eng.srt 40.2 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Fireside chat Good times, bad times, you know I’ve had my share.eng.tsv 39.9 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Now you see it, now you don't wipers in the wild.eng.srt 39.8 KB
- VB 2023 London/VB 2023 London captions/Web3 will bite you in the Web 2 0 exploring IPFS threats - Morton Swimmer (Trend Micro).eng.srt 39.8 KB
- VB 2023 London/VB 2023 London captions/Looking into TUT's tomb the universe of threats in LATAM - Camilo Gutiérrez Amaya & Fernando Tavella.eng.srt 39.8 KB
- VB 2022 Prague/VB 2022 Prague captions/Uncovering a broad criminal ecosystem powered by one of the largest botnets, Glupteba Luca Nagy Goog.eng.srt 39.7 KB
- VB 2024 Dublin/VB 2024 Dublin captions/A wild RAT appears reversing DinodasRAT on Linux - Anderson Leite.eng.srt 39.5 KB
- VB 2015 Prague/VB 2015 Prague captions/Doing more with less a study of file-less infection attacks.eng.srt 39.5 KB
- VB 2017 Madrid/VB 2017 Madrid captions/The sprawling market of consumer spyware.eng.srt 39.4 KB
- VB 2023 London/VB 2023 London captions/Exploring the efficacy of community-driven TI a real world approach - Samir Mody & Hariharan S (K7).eng.srt 39.4 KB
- VB 2013 Berlin/VB 2013 Berlin captions/PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file).eng.srt 39.3 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Sugarcoating KANDYKORN a sweet dive into a sophisticated MacOS backdoor - Salim Bitam (Elastic).eng.srt 38.9 KB
- VB 2013 Berlin/VB 2013 Berlin captions/Hypervisor-based, hardware-assisted system monitoring.eng.txt 38.9 KB
- VB 2015 Prague/VB 2015 Prague captions/We know what you did this summer Android banking trojan exposing its sins in the cloud.eng.srt 38.9 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Uncovering automatic Obfuscation-as-a-Service for malicious Android applications.eng.srt 38.8 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Emerging trends in malware downloaders.eng.txt 38.8 KB
- VB 2014 Seattle/VB 2014 Seattle captions/.NET malware dynamic instrumentation for automated and manual analysis.eng.srt 38.7 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Hidden risks of advertisements.eng.srt 38.6 KB
- VB 2019 London/VB 2019 London captions/Shinigami's revenge the long tail of Ryuk malware.eng.srt 38.6 KB
- VB 2013 Berlin/VB 2013 Berlin captions/Hypervisor-based, hardware-assisted system monitoring.eng.lrc 38.6 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Bootkits past, present & future.eng.srt 38.5 KB
- VB 2013 Berlin/VB 2013 Berlin captions/Hypervisor-based, hardware-assisted system monitoring.eng.srt 38.5 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Emerging trends in malware downloaders.eng.lrc 38.4 KB
- VB 2014 Seattle/VB 2014 Seattle captions/An in-depth analysis of abuse on Twitter.eng.srt 38.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Emerging trends in malware downloaders.eng.vtt 38.1 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Labelling spam through the analysis of protocol patterns.eng.srt 38.0 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Android app deobfuscation using static-dynamic cooperation.eng.srt 38.0 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Now you see me, now you don’t.eng.vtt 38.0 KB
- VB 2019 London/VB 2019 London captions/Geost botnet. The discovery story of a new Android banking trojan from an OpSec error.eng.srt 37.8 KB
- VB 2017 Madrid/VB 2017 Madrid captions/VB2017 paper VirusTotal tips, tricks and myths.eng.srt 37.8 KB
- VB 2023 London/VB 2023 London captions/When a botnet cries detecting botnet infection chains - Guillaume Couchard & Erwan Chevalier.eng.srt 37.8 KB
- VB 2024 Dublin/VB 2024 Dublin captions/A web of surveillance - Jurre van Bergen (Amnesty International).eng.srt 37.8 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Browser attack points still abused by banking trojans.eng.srt 37.7 KB
- VB 2019 London/VB 2019 London captions/The cake is a lie Uncovering the secret world of malware-like cheats in video games.eng.srt 37.7 KB
- VB 2019 London/VB 2019 London captions/Oops It happened again.eng.txt 37.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Standardized reporting with the Malware Behavior Catalog.eng.srt 37.4 KB
- VB 2015 Prague/VB 2015 Prague captions/The TAO of .NET and PowerShell malware analysis.eng.srt 37.2 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Attack points in health apps & wearable devices - how safe is your quantified self.eng.txt 37.0 KB
- VB 2019 London/VB 2019 London captions/Oops It happened again.eng.lrc 37.0 KB
- VB 2015 Prague/VB 2015 Prague captions/Dare 'DEVIL' beyond your senses with Dex Visualizer.eng.srt 37.0 KB
- VB 2023 London/VB 2023 London captions/RedStinger new APT discovered amid Russia Ukraine conflict - Roberto Santos & Hossein Jazi.eng.srt 36.9 KB
- VB 2023 London/VB 2023 London captions/Unveiling activities of Tropic Trooper 2023 deep analysis of Xiangoop Loader and EntryShell payload.eng.srt 36.9 KB
- VB 2022 Prague/VB 2022 Prague captions/Unmasking WindTape Patrick Wardle Objective See.eng.vtt 36.7 KB
- VB 2023 London/VB 2023 London captions/C2F2 a framework for detecting C2 frameworks at scale - Oleg Boyarchuk & Stefano Ortolani (VMware).eng.srt 36.5 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Attack points in health apps & wearable devices - how safe is your quantified self.eng.lrc 36.5 KB
- VB 2019 London/VB 2019 London captions/Oops It happened again.eng.srt 36.5 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Methods of malware persistence on Mac OS X.eng.srt 36.5 KB
- VB 2014 Seattle/VB 2014 Seattle captions/DNSSEC - how far have we come.eng.txt 36.5 KB
- VB 2023 London/VB 2023 London captions/Ransoming and clipping for illicit cryptocurrency gains - Chetan Raghuprasad (Cisco Talos).eng.srt 36.5 KB
- VB 2020 Virtual/VB 2020 Virtual captions/She sells root shells by the C() shore.eng.srt 36.4 KB
- VB 2019 London/VB 2019 London captions/Spoofing in the reeds with Rietspoof.eng.srt 36.4 KB
- VB 2013 Berlin/VB 2013 Berlin captions/Analysis of Android in-app advertisement kits.eng.srt 36.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Hidden risks of advertisements.eng.txt 36.3 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Open by default the hidden cost of convenience in network security - Aurelio Picon (CUJO AI).eng.srt 36.3 KB
- VB 2015 Prague/VB 2015 Prague captions/Will Android trojan, worm or rootkit survive in SEAndroid and containerization.eng.srt 36.2 KB
- VB 2022 Prague/VB 2022 Prague captions/Unmasking WindTape Patrick Wardle Objective See.eng.txt 36.2 KB
- VB 2013 Berlin/VB 2013 Berlin captions/Hypervisor-based, hardware-assisted system monitoring.eng.vtt 36.1 KB
- VB 2023 London/VB 2023 London captions/Tales from a cloud CSIRT - let's deep dive into a Kubernetes k8s infection - Santiago Abastante.eng.srt 36.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Hidden risks of advertisements.eng.lrc 36.0 KB
- VB 2023 London/VB 2023 London captions/May the Shadow Force be with Maggie - Shadow Force Group characteristics and relationship to Maggie.eng.srt 36.0 KB
- VB 2014 Seattle/VB 2014 Seattle captions/DNSSEC - how far have we come.eng.lrc 36.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/The rise of the info stealers.eng.srt 35.9 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Crypton - exposing malware's deepest secrets.eng.txt 35.9 KB
- VB 2022 Prague/VB 2022 Prague captions/Unmasking WindTape Patrick Wardle Objective See.eng.lrc 35.9 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists.eng.srt 35.8 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Back in BlackEnergy 2014 targeted attacks in the Ukraine and Poland.eng.srt 35.7 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Uncovering automatic Obfuscation-as-a-Service for malicious Android applications.eng.vtt 35.7 KB
- VB 2015 Prague/VB 2015 Prague captions/TurlaSat The Fault in our Stars.eng.srt 35.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Hidden risks of advertisements.eng.vtt 35.6 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Attack points in health apps & wearable devices - how safe is your quantified self.eng.srt 35.5 KB
- VB 2024 Dublin/VB 2024 Dublin captions/An open source cloud DFIR kit - Dredge - Santiago Abastante (Solidarity Labs).eng.srt 35.5 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Levelling up why sharing threat intelligence makes you more competitive.eng.srt 35.5 KB
- VB 2022 Prague/VB 2022 Prague captions/Tracking the entire iceberg - long term APT malware C2 protocol emulation and scanning Takahiro Haru.eng.srt 35.4 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Crypton - exposing malware's deepest secrets.eng.lrc 35.4 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Ghosts from the past become Gh0stbusters in 2024 - Hiroshi Takeuchi (MACNICA).eng.srt 35.2 KB
- VB 2021 Virtual/VB 2021 Virtual captions/UNC788 Iran’s decade of credential harvesting and surveillance operations.eng.srt 35.1 KB
- VB 2019 London/VB 2019 London captions/Exploring the Chinese DDoS landscape.eng.srt 35.1 KB
- VB 2023 London/VB 2023 London captions/South Korean Android banking menace FakeCalls - Raman Ladutska (Check Point).eng.srt 35.1 KB
- VB 2022 Prague/VB 2022 Prague captions/Operation Dragon Castling suspected APT group hijacks WPS Office updater to target East Asian bettin.eng.srt 35.0 KB
- VB 2024 Dublin/VB 2024 Dublin captions/P-wave of malicious code signing - Yuta Sawabe & Rintaro Koike (NTT Security Holdings).eng.srt 35.0 KB
- VB 2023 London/VB 2023 London captions/Teasing the secrets from threat actors malware configuration extractors - Mark Lim.eng.srt 35.0 KB
- VB 2013 Berlin/VB 2013 Berlin captions/Hypervisor-based, hardware-assisted system monitoring.eng.tsv 35.0 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Duping the machine - malware strategies, post sandbox detection.eng.tsv 34.8 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Who plays on AZORult An unknown attacker collects various data and spreads additional payloads.eng.srt 34.8 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Sweeping the IP space the hunt for evil on the Internet.eng.srt 34.7 KB
- VB 2020 Virtual/VB 2020 Virtual captions/She sells root shells by the C() shore.eng.txt 34.7 KB
- VB 2019 London/VB 2019 London captions/Absolutely routed Why routers are the new bullseye in cyber attacks.eng.txt 34.7 KB
- VB 2024 Dublin/VB 2024 Dublin captions/TIPS Wrap up - Michael Daniel (Cyber Threat Alliance).eng.srt 34.7 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Security the hidden cost of Android stalkerware.eng.srt 34.6 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Origins of a logger - Agent Tesla - Berk Albayrak & Utku Çorbacı (Malwation).eng.srt 34.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Emerging trends in malware downloaders.eng.tsv 34.6 KB
- VB 2016 Denver/VB 2016 Denver captions/Debugging and Monitoring Malware Network Activities with Haka.eng.srt 34.6 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Hide'n'Seek an adaptive peer-to-peer IoT botnet.eng.srt 34.6 KB
- VB 2023 London/VB 2023 London captions/Lazarus campaigns and backdoors in 2022 2023 - Peter Kálnai (ESET).eng.srt 34.5 KB
- VB 2020 Virtual/VB 2020 Virtual captions/She sells root shells by the C() shore.eng.lrc 34.5 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Fireside chat Good times, bad times, you know I’ve had my share.eng.text 34.4 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Methods of malware persistence on Mac OS X.eng.tsv 34.4 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Where’s your data Ransomware protecting your ICS environment.eng.tsv 34.2 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Duping the machine - malware strategies, post sandbox detection.eng.srt 34.2 KB
- VB 2019 London/VB 2019 London captions/Absolutely routed Why routers are the new bullseye in cyber attacks.eng.lrc 34.2 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Sweeping the IP space the hunt for evil on the Internet.eng.tsv 34.1 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Automatically detect and support against anti debug with IDAGhidra to streamline debugging process.eng.srt 34.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/SubCrawl - a framework for the analysis and clustering of hacking tools found using open directories.eng.srt 33.9 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Analysing compiled binaries using logic.eng.srt 33.9 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Android reverse engineering tools not the usual suspects.eng.srt 33.8 KB
- VB 2020 Virtual/VB 2020 Virtual captions/She sells root shells by the C() shore.eng.vtt 33.8 KB
- VB 2019 London/VB 2019 London captions/Play fuzzing machine - hunting iOS and macOS kernel vulnerabilities automatically and smartly.eng.srt 33.7 KB
- VB 2018 Montreal/VB 2018 Montreal captions/From Hacking Team to hacked team to.eng.srt 33.7 KB
- VB 2014 Seattle/VB 2014 Seattle captions/DMARC - how to use it to improve your email reputation.eng.srt 33.6 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Methods of malware persistence on Mac OS X.eng.vtt 33.6 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Office bugs on the rise.eng.srt 33.4 KB
- VB 2023 London/VB 2023 London captions/Magniber's missteps because even spiders trip over their own web Amata Anantaprayoon & Patrik Olson.eng.srt 33.4 KB
- VB 2019 London/VB 2019 London captions/APT cases exploiting vulnerabilities in region-specific software.eng.srt 33.4 KB
- VB 2023 London/VB 2023 London captions/FirePeony a ghost wandering around the Royal Road - Rintaro Koike & Shogo Hayashi.eng.srt 33.2 KB
- VB 2021 Virtual/VB 2021 Virtual captions/UNC788 Iran’s decade of credential harvesting and surveillance operations.eng.vtt 33.1 KB
- VB 2015 Prague/VB 2015 Prague captions/It's a file infector it's ransomware it's Virlock.eng.srt 33.1 KB
- VB 2017 Madrid/VB 2017 Madrid captions/The router of all evil more than just default passwords and silly scripts.eng.srt 33.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Evolution of Excel 4.0 Macro Weaponization.eng.text 33.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/LazyScripter from Empire to double RAT.eng.srt 32.9 KB
- VB 2015 Prague/VB 2015 Prague captions/The evolution of ransomware from CryptoLocker to CryptoWall.eng.srt 32.9 KB
- VB 2014 Seattle/VB 2014 Seattle captions/DNSSEC - how far have we come.eng.srt 32.8 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Multimodal AI the sixth sense for cyber defence - Younghoo Lee (Sophos).eng.srt 32.8 KB
- VB 2021 Virtual/VB 2021 Virtual captions/UNC788 Iran’s decade of credential harvesting and surveillance operations.eng.txt 32.7 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Uncovering automatic Obfuscation-as-a-Service for malicious Android applications.eng.txt 32.7 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Attack points in health apps & wearable devices - how safe is your quantified self.eng.vtt 32.6 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Where’s your data Ransomware protecting your ICS environment.eng.srt 32.6 KB
- VB 2021 Virtual/VB 2021 Virtual captions/UNC788 Iran’s decade of credential harvesting and surveillance operations.eng.lrc 32.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Hidden risks of advertisements.eng.tsv 32.5 KB
- VB 2022 Prague/VB 2022 Prague captions/Unmasking WindTape Patrick Wardle Objective See.eng.tsv 32.5 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Uncovering automatic Obfuscation-as-a-Service for malicious Android applications.eng.lrc 32.5 KB
- VB 2015 Prague/VB 2015 Prague captions/Labeless - no more.eng.srt 32.5 KB
- VB 2015 Prague/VB 2015 Prague captions/ROSCO Repository Of Signed COde.eng.txt 32.3 KB
- VB 2023 London/VB 2023 London captions/USB flows in the Great River classic tradecraft is still alive - Hiroshi Takeuchi (MACNICA).eng.srt 32.3 KB
- VB 2019 London/VB 2019 London captions/Oops It happened again.eng.vtt 32.2 KB
- VB 2019 London/VB 2019 London captions/The Bagsu banker case.eng.text 32.1 KB
- VB 2015 Prague/VB 2015 Prague captions/ROSCO Repository Of Signed COde.eng.lrc 32.0 KB
- VB 2013 Berlin/VB 2013 Berlin captions/Statistically effective protection against APT attacks.eng.srt 32.0 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Sweeping the IP space the hunt for evil on the Internet.eng.vtt 32.0 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Duping the machine - malware strategies, post sandbox detection.eng.vtt 31.9 KB
- VB 2015 Prague/VB 2015 Prague captions/ROSCO Repository Of Signed COde.eng.srt 31.8 KB
- VB 2013 Berlin/VB 2013 Berlin captions/Statistically effective protection against APT attacks.eng.txt 31.8 KB
- VB 2018 Montreal/VB 2018 Montreal captions/The wolf in sheep's clothing - undressed.eng.srt 31.7 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Last-minute paper FinFisher New techniques and infection vectors revealed.eng.srt 31.7 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Attack points in health apps & wearable devices - how safe is your quantified self.eng.tsv 31.7 KB
- VB 2014 Seattle/VB 2014 Seattle captions/DMARC - how to use it to improve your email reputation.eng.txt 31.7 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Confronting the surge of macOS stealers in 2024 - Kseniia Yamburh (MacPaw (Moonlock Lab)).eng.srt 31.6 KB
- VB 2019 London/VB 2019 London captions/A vine climbing over the Great Firewall a long-term attack against China.eng.srt 31.6 KB
- VB 2021 Virtual/VB 2021 Virtual captions/SubCrawl - a framework for the analysis and clustering of hacking tools found using open directories.eng.vtt 31.5 KB
- VB 2013 Berlin/VB 2013 Berlin captions/Statistically effective protection against APT attacks.eng.lrc 31.4 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Now you see me, now you don’t.eng.text 31.4 KB
- VB 2023 London/VB 2023 London captions/Silent whispers of malware unveiling hidden threats in legitimate network traffic - Royce Lu.eng.srt 31.4 KB
- VB 2014 Seattle/VB 2014 Seattle captions/DMARC - how to use it to improve your email reputation.eng.lrc 31.3 KB
- VB 2016 Denver/VB 2016 Denver captions/Nymaim the Untold Story.eng.txt 31.3 KB
- VB 2021 Virtual/VB 2021 Virtual captions/SubCrawl - a framework for the analysis and clustering of hacking tools found using open directories.eng.txt 31.3 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Shadow play WildCard's malware campaigns amidst Israel Hamas conflict - NicoleFishbein, RyanRobinson.eng.srt 31.2 KB
- VB 2020 Virtual/VB 2020 Virtual captions/She sells root shells by the C() shore.eng.tsv 31.2 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Panel A tale of two companies.eng.txt 31.1 KB
- VB 2021 Virtual/VB 2021 Virtual captions/SubCrawl - a framework for the analysis and clustering of hacking tools found using open directories.eng.lrc 31.0 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Crypton - exposing malware's deepest secrets.eng.srt 30.9 KB
- VB 2016 Denver/VB 2016 Denver captions/Nymaim the Untold Story.eng.lrc 30.8 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Consequences of bad security in health care.eng.txt 30.8 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Proactively hunting for low reputed infrastructure used by large cybercrimes and APTs - Janos Szurdi.eng.srt 30.7 KB
- VB 2024 Dublin/VB 2024 Dublin captions/CrackedCantil a malware symphony delivered by cracked software - - performed by loaders, infostealers..eng.srt 30.7 KB
- VB 2015 Prague/VB 2015 Prague captions/Android ransomware turning CryptoLocker into CryptoUnlocker.eng.txt 30.7 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Panel A tale of two companies.eng.lrc 30.6 KB
- VB 2021 Virtual/VB 2021 Virtual captions/UNC788 Iran’s decade of credential harvesting and surveillance operations.eng.tsv 30.6 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Office bugs on the rise.eng.vtt 30.5 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/New PlugX Fingerprint-THOR.eng.srt 30.5 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Office bugs on the rise.eng.txt 30.5 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Where’s your data Ransomware protecting your ICS environment.eng.vtt 30.4 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Consequences of bad security in health care.eng.lrc 30.4 KB
- VB 2024 Dublin/VB 2024 Dublin captions/IcePeony with the '996' work culture - Rintaro Koike & Shota Nakajima.eng.srt 30.4 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Uncovering automatic Obfuscation-as-a-Service for malicious Android applications.eng.tsv 30.3 KB
- VB 2019 London/VB 2019 London captions/Oops It happened again.eng.tsv 30.3 KB
- VB 2014 Seattle/VB 2014 Seattle captions/DMARC - how to use it to improve your email reputation.eng.vtt 30.2 KB
- VB 2013 Berlin/VB 2013 Berlin captions/Hypervisor-based, hardware-assisted system monitoring.eng.text 30.2 KB
- VB 2015 Prague/VB 2015 Prague captions/Android ransomware turning CryptoLocker into CryptoUnlocker.eng.lrc 30.2 KB
- VB 2014 Seattle/VB 2014 Seattle captions/DNSSEC - how far have we come.eng.tsv 30.2 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Office bugs on the rise.eng.lrc 30.2 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Hunting web skimmers with VirusTotal and YARA.eng.srt 30.1 KB
- VB 2020 Virtual/VB 2020 Virtual captions/NetWalking on Sunshine.eng.srt 30.0 KB
- VB 2014 Seattle/VB 2014 Seattle captions/DNSSEC - how far have we come.eng.vtt 29.9 KB
- VB 2020 Virtual/VB 2020 Virtual captions/The (f)utility of indicators.eng.srt 29.9 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Consequences of bad security in health care.eng.srt 29.7 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Dark deals unveiling the underground market of exploits - Anna Pavlovskaia (Kaspersky).eng.srt 29.7 KB
- VB 2015 Prague/VB 2015 Prague captions/ROSCO Repository Of Signed COde.eng.vtt 29.6 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Crypton - exposing malware's deepest secrets.eng.tsv 29.5 KB
- VB 2013 Berlin/VB 2013 Berlin captions/Statistically effective protection against APT attacks.eng.vtt 29.5 KB
- VB 2016 Denver/VB 2016 Denver captions/On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users.eng.srt 29.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Payment required rare HTTP statuses and air-gaps avoidance from the authors of COMPFun.eng.srt 29.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Emerging trends in malware downloaders.eng.text 29.3 KB
- VB 2024 Dublin/VB 2024 Dublin captions/CrackedCantil a malware symphony delivered by cracked software - - performed by loaders, infostealers..eng.txt 29.3 KB
- VB 2023 London/VB 2023 London captions/The Dropping Elephant never dropped - Ye Jin (Kaspersky).eng.srt 29.3 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Operation Newton Hi Kimsuky Did an Apple(seed) really fall on Newton’s head.eng.srt 29.2 KB
- VB 2021 Virtual/VB 2021 Virtual captions/The baffling Berserk Bear a decade’s activity targeting critical infrastructure.eng.txt 29.1 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Hunting web skimmers with VirusTotal and YARA.eng.txt 29.0 KB
- VB 2024 Dublin/VB 2024 Dublin captions/CrackedCantil a malware symphony delivered by cracked software - - performed by loaders, infostealers..eng.lrc 29.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/The baffling Berserk Bear a decade’s activity targeting critical infrastructure.eng.lrc 28.9 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Hunting web skimmers with VirusTotal and YARA.eng.lrc 28.8 KB
- VB 2015 Prague/VB 2015 Prague captions/Android ransomware turning CryptoLocker into CryptoUnlocker.eng.srt 28.7 KB
- VB 2013 Berlin/VB 2013 Berlin captions/An automatic analysis and detection tool for Java exploits.eng.txt 28.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Just in time, deception to detect Credential Stuffing Bot.eng.srt 28.6 KB
- VB 2023 London/VB 2023 London captions/Building a cybersecurity AI dataset for a secure digital society - Bomin Choi (KISA).eng.srt 28.6 KB
- VB 2021 Virtual/VB 2021 Virtual captions/SubCrawl - a framework for the analysis and clustering of hacking tools found using open directories.eng.tsv 28.6 KB
- VB 2015 Prague/VB 2015 Prague captions/ROSCO Repository Of Signed COde.eng.tsv 28.6 KB
- VB 2015 Prague/VB 2015 Prague captions/Inside recent FQDN (Fully Qualified Domain Name) surges on the Internet.eng.srt 28.5 KB
- VB 2024 Dublin/VB 2024 Dublin captions/CrackedCantil a malware symphony delivered by cracked software - - performed by loaders, infostealers..eng.vtt 28.5 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Crypton - exposing malware's deepest secrets.eng.vtt 28.5 KB
- VB 2015 Prague/VB 2015 Prague captions/Attack on the drones security vulnerabilities of unmanned aerial vehicles.eng.srt 28.3 KB
- VB 2013 Berlin/VB 2013 Berlin captions/An automatic analysis and detection tool for Java exploits.eng.lrc 28.2 KB
- VB 2019 London/VB 2019 London captions/Absolutely routed Why routers are the new bullseye in cyber attacks.eng.tsv 28.1 KB
- VB 2022 Prague/VB 2022 Prague captions/Unmasking WindTape Patrick Wardle Objective See.eng.text 28.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/The (f)utility of indicators.eng.vtt 28.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/UNC788 Iran’s decade of credential harvesting and surveillance operations.eng.text 27.9 KB
- VB 2019 London/VB 2019 London captions/Absolutely routed Why routers are the new bullseye in cyber attacks.eng.srt 27.9 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Hunting web skimmers with VirusTotal and YARA.eng.vtt 27.9 KB
- VB 2013 Berlin/VB 2013 Berlin captions/Statistically effective protection against APT attacks.eng.tsv 27.9 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Hidden risks of advertisements.eng.text 27.8 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Botception hire a botnet to spread one's own botnet.eng.srt 27.8 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Swipe away, we're watching you.eng.txt 27.7 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Swipe away, we're watching you.eng.srt 27.6 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Ransomware a correlation between infection vectors and victims.eng.txt 27.6 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/New PlugX Fingerprint-THOR.eng.vtt 27.5 KB
- VB 2023 London/VB 2023 London captions/AI-based digital evidence enhancement technology for profiling attack groups and techniques.eng.srt 27.5 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Peak Analyzer an automated malware campaign detector.eng.txt 27.5 KB
- VB 2020 Virtual/VB 2020 Virtual captions/NetWalking on Sunshine.eng.vtt 27.5 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/New PlugX Fingerprint-THOR.eng.txt 27.5 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Uncovering automatic Obfuscation-as-a-Service for malicious Android applications.eng.text 27.4 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Swipe away, we're watching you.eng.lrc 27.4 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Ransomware a correlation between infection vectors and victims.eng.lrc 27.3 KB
- VB 2023 London/VB 2023 London captions/Turla and Sandworm come filelessly - Alexander Adamov (NioGuard Security Lab).eng.srt 27.3 KB
- VB 2021 Virtual/VB 2021 Virtual captions/The baffling Berserk Bear a decade’s activity targeting critical infrastructure.eng.srt 27.2 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Office bugs on the rise.eng.tsv 27.2 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/New PlugX Fingerprint-THOR.eng.lrc 27.2 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Consequences of bad security in health care.eng.vtt 27.1 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Peak Analyzer an automated malware campaign detector.eng.lrc 27.1 KB
- VB 2021 Virtual/VB 2021 Virtual captions/CTO (Call Tree Overviewer) yet another function call tree viewer.eng.srt 27.1 KB
- VB 2014 Seattle/VB 2014 Seattle captions/DMARC - how to use it to improve your email reputation.eng.tsv 27.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/The (f)utility of indicators.eng.txt 27.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Android stalkerware hunting automation, analysis and detection.eng.srt 26.9 KB
- VB 2020 Virtual/VB 2020 Virtual captions/She sells root shells by the C() shore.eng.text 26.9 KB
- VB 2020 Virtual/VB 2020 Virtual captions/The (f)utility of indicators.eng.lrc 26.8 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Panel A tale of two companies.eng.srt 26.8 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Dissecting fleeceware apps the million-dollar money-making machine in Android and iOS.eng.srt 26.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Closing Keynote Threatscaping like a CERT.eng.txt 26.5 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Optimized mal-ops. Hack the ad network like a boss.eng.srt 26.5 KB
- VB 2015 Prague/VB 2015 Prague captions/Attack on the drones security vulnerabilities of unmanned aerial vehicles.eng.txt 26.5 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Closing Keynote Threatscaping like a CERT.eng.srt 26.5 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Methods of malware persistence on Mac OS X.eng.text 26.4 KB
- VB 2024 Dublin/VB 2024 Dublin captions/CrackedCantil a malware symphony delivered by cracked software - - performed by loaders, infostealers..eng.tsv 26.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Closing Keynote Threatscaping like a CERT.eng.lrc 26.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Payment required rare HTTP statuses and air-gaps avoidance from the authors of COMPFun.eng.vtt 26.3 KB
- VB 2015 Prague/VB 2015 Prague captions/Attack on the drones security vulnerabilities of unmanned aerial vehicles.eng.lrc 26.3 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Duping the machine - malware strategies, post sandbox detection.eng.text 26.2 KB
- VB 2021 Virtual/VB 2021 Virtual captions/The baffling Berserk Bear a decade’s activity targeting critical infrastructure.eng.tsv 26.1 KB
- VB 2016 Denver/VB 2016 Denver captions/One-Click Fileless Infection.eng.srt 26.1 KB
- VB 2016 Denver/VB 2016 Denver captions/Nymaim the Untold Story.eng.srt 26.1 KB
- VB 2013 Berlin/VB 2013 Berlin captions/An automatic analysis and detection tool for Java exploits.eng.srt 26.0 KB
- VB 2015 Prague/VB 2015 Prague captions/Attack on the drones security vulnerabilities of unmanned aerial vehicles.eng.vtt 26.0 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Consequences of bad security in health care.eng.tsv 26.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Hunting web skimmers with VirusTotal and YARA.eng.tsv 26.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Payment required rare HTTP statuses and air-gaps avoidance from the authors of COMPFun.eng.txt 26.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/The baffling Berserk Bear a decade’s activity targeting critical infrastructure.eng.vtt 25.9 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Operation LagTime IT colourful Panda footprint.eng.srt 25.8 KB
- VB 2020 Virtual/VB 2020 Virtual captions/NetWalking on Sunshine.eng.txt 25.8 KB
- VB 2021 Virtual/VB 2021 Virtual captions/The ‘Ghost Hand’ attack.eng.srt 25.8 KB
- VB 2015 Prague/VB 2015 Prague captions/Android ransomware turning CryptoLocker into CryptoUnlocker.eng.vtt 25.7 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Payment required rare HTTP statuses and air-gaps avoidance from the authors of COMPFun.eng.lrc 25.7 KB
- VB 2020 Virtual/VB 2020 Virtual captions/NetWalking on Sunshine.eng.lrc 25.6 KB
- VB 2019 London/VB 2019 London captions/Absolutely routed Why routers are the new bullseye in cyber attacks.eng.vtt 25.6 KB
- VB 2021 Virtual/VB 2021 Virtual captions/SubCrawl - a framework for the analysis and clustering of hacking tools found using open directories.eng.text 25.4 KB
- VB 2016 Denver/VB 2016 Denver captions/Nymaim the Untold Story.eng.tsv 25.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Ghost Mach-O an analysis of Lazarus’ Mac-malware innovations.eng.srt 25.3 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Swipe away, we're watching you.eng.vtt 25.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/The (f)utility of indicators.eng.tsv 25.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Tracking Rapid Evolution Copycat of An APT RAT in Asia.eng.srt 25.3 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Sweeping the IP space the hunt for evil on the Internet.eng.text 25.2 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Panel A tale of two companies.eng.tsv 25.2 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Attack points in health apps & wearable devices - how safe is your quantified self.eng.text 25.2 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Where’s your data Ransomware protecting your ICS environment.eng.text 25.1 KB
- VB 2015 Prague/VB 2015 Prague captions/Android ransomware turning CryptoLocker into CryptoUnlocker.eng.tsv 25.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Closing Keynote Threatscaping like a CERT.eng.vtt 24.8 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Ransomware a correlation between infection vectors and victims.eng.srt 24.6 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Reverse Android malware like a Jedi Master.eng.srt 24.6 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Panel A tale of two companies.eng.vtt 24.5 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Dissecting fleeceware apps the million-dollar money-making machine in Android and iOS.eng.txt 24.5 KB
- VB 2021 Virtual/VB 2021 Virtual captions/CTO (Call Tree Overviewer) yet another function call tree viewer.eng.vtt 24.3 KB
- VB 2015 Prague/VB 2015 Prague captions/Speaking Dyreza protocol. Advantages of 'learning' a new language.eng.txt 24.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Dissecting fleeceware apps the million-dollar money-making machine in Android and iOS.eng.lrc 24.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Dissecting fleeceware apps the million-dollar money-making machine in Android and iOS.eng.vtt 24.2 KB
- VB 2021 Virtual/VB 2021 Virtual captions/CTO (Call Tree Overviewer) yet another function call tree viewer.eng.txt 24.1 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Ransomware a correlation between infection vectors and victims.eng.tsv 24.1 KB
- VB 2015 Prague/VB 2015 Prague captions/Speaking Dyreza protocol. Advantages of 'learning' a new language.eng.srt 24.1 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Operation Bookcodes - targeting South Korea.eng.srt 24.0 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/New PlugX Fingerprint-THOR.eng.tsv 24.0 KB
- VB 2015 Prague/VB 2015 Prague captions/Speaking Dyreza protocol. Advantages of 'learning' a new language.eng.lrc 24.0 KB
- VB 2015 Prague/VB 2015 Prague captions/ROSCO Repository Of Signed COde.eng.text 24.0 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Optimized mal-ops. Hack the ad network like a boss.eng.vtt 23.9 KB
- VB 2021 Virtual/VB 2021 Virtual captions/CTO (Call Tree Overviewer) yet another function call tree viewer.eng.lrc 23.9 KB
- VB 2016 Denver/VB 2016 Denver captions/Nymaim the Untold Story.eng.vtt 23.8 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Unveiling the CryptoMimic.eng.srt 23.8 KB
- VB 2016 Denver/VB 2016 Denver captions/One-Click Fileless Infection.eng.txt 23.8 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Swipe away, we're watching you.eng.tsv 23.8 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Optimized mal-ops. Hack the ad network like a boss.eng.txt 23.7 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Closing Keynote Threatscaping like a CERT.eng.tsv 23.7 KB
- VB 2015 Prague/VB 2015 Prague captions/Attack on the drones security vulnerabilities of unmanned aerial vehicles.eng.tsv 23.7 KB
- VB 2021 Virtual/VB 2021 Virtual captions/The ‘Ghost Hand’ attack.eng.vtt 23.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/One year later Challenges for young anti-malware products today.eng.txt 23.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/NetWalking on Sunshine.eng.tsv 23.6 KB
- VB 2016 Denver/VB 2016 Denver captions/One-Click Fileless Infection.eng.lrc 23.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Operation LagTime IT colourful Panda footprint.eng.vtt 23.5 KB
- VB 2013 Berlin/VB 2013 Berlin captions/An automatic analysis and detection tool for Java exploits.eng.vtt 23.5 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Operation LagTime IT colourful Panda footprint.eng.txt 23.5 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Optimized mal-ops. Hack the ad network like a boss.eng.lrc 23.5 KB
- VB 2016 Denver/VB 2016 Denver captions/One-Click Fileless Infection.eng.vtt 23.4 KB
- VB 2013 Berlin/VB 2013 Berlin captions/An automatic analysis and detection tool for Java exploits.eng.tsv 23.3 KB
- VB 2021 Virtual/VB 2021 Virtual captions/The ‘Ghost Hand’ attack.eng.txt 23.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/One year later Challenges for young anti-malware products today.eng.lrc 23.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Ghost Mach-O an analysis of Lazarus’ Mac-malware innovations.eng.txt 23.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Operation LagTime IT colourful Panda footprint.eng.lrc 23.3 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Ransomware a correlation between infection vectors and victims.eng.vtt 23.3 KB
- VB 2013 Berlin/VB 2013 Berlin captions/Statistically effective protection against APT attacks.eng.text 23.2 KB
- VB 2018 Montreal/VB 2018 Montreal captions/Office bugs on the rise.eng.text 23.2 KB
- VB 2020 Virtual/VB 2020 Virtual captions/The (f)utility of indicators.eng.text 23.1 KB
- VB 2021 Virtual/VB 2021 Virtual captions/The ‘Ghost Hand’ attack.eng.lrc 23.1 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Tracking Rapid Evolution Copycat of An APT RAT in Asia.eng.txt 23.1 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Ghost Mach-O an analysis of Lazarus’ Mac-malware innovations.eng.lrc 23.1 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Ghost Mach-O an analysis of Lazarus’ Mac-malware innovations.eng.vtt 23.0 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Peak Analyzer an automated malware campaign detector.eng.srt 23.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Tracking Rapid Evolution Copycat of An APT RAT in Asia.eng.lrc 22.9 KB
- VB 2020 Virtual/VB 2020 Virtual captions/One year later Challenges for young anti-malware products today.eng.srt 22.8 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Tracking Rapid Evolution Copycat of An APT RAT in Asia.eng.vtt 22.8 KB
- VB 2024 Dublin/VB 2024 Dublin captions/CrackedCantil a malware symphony delivered by cracked software - - performed by loaders, infostealers..eng.text 22.8 KB
- VB 2014 Seattle/VB 2014 Seattle captions/DNSSEC - how far have we come.eng.text 22.8 KB
- VB 2021 Virtual/VB 2021 Virtual captions/All roads lead to Rome the Conti manual leak dissection.eng.srt 22.7 KB
- VB 2021 Virtual/VB 2021 Virtual captions/The baffling Berserk Bear a decade’s activity targeting critical infrastructure.eng.text 22.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Payment required rare HTTP statuses and air-gaps avoidance from the authors of COMPFun.eng.tsv 22.6 KB
- VB 2017 Madrid/VB 2017 Madrid captions/The state of cybersecurity in Africa Kenya.eng.txt 22.4 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Peak Analyzer an automated malware campaign detector.eng.tsv 22.4 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Crypton - exposing malware's deepest secrets.eng.text 22.4 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Reverse Android malware like a Jedi Master.eng.vtt 22.3 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Hunting web skimmers with VirusTotal and YARA.eng.text 22.2 KB
- VB 2017 Madrid/VB 2017 Madrid captions/The state of cybersecurity in Africa Kenya.eng.lrc 22.2 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Operation Diànxùn a cyberespionage campaign targeting telecommunication companies.eng.txt 22.1 KB
- VB 2019 London/VB 2019 London captions/Catch me if you can detection of injection exploitation by validating query and API integrity.eng.srt 22.0 KB
- VB 2019 London/VB 2019 London captions/Finding drive-by rookies using an automated active observation platform.eng.srt 22.0 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Keynote Learning from failure ransomware and future conflicts.eng.srt 22.0 KB
- VB 2015 Prague/VB 2015 Prague captions/Speaking Dyreza protocol. Advantages of 'learning' a new language.eng.vtt 21.9 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Operation Diànxùn a cyberespionage campaign targeting telecommunication companies.eng.lrc 21.9 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Operation Diànxùn a cyberespionage campaign targeting telecommunication companies.eng.srt 21.8 KB
- VB 2014 Seattle/VB 2014 Seattle captions/DMARC - how to use it to improve your email reputation.eng.text 21.7 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Unveiling the CryptoMimic.eng.vtt 21.7 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Keynote Learning from failure ransomware and future conflicts.eng.txt 21.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Dissecting fleeceware apps the million-dollar money-making machine in Android and iOS.eng.tsv 21.6 KB
- VB 2019 London/VB 2019 London captions/Oops It happened again.eng.text 21.5 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Keynote Learning from failure ransomware and future conflicts.eng.lrc 21.4 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Reverse Android malware like a Jedi Master.eng.txt 21.2 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Peak Analyzer an automated malware campaign detector.eng.vtt 21.2 KB
- VB 2021 Virtual/VB 2021 Virtual captions/All roads lead to Rome the Conti manual leak dissection.eng.vtt 21.1 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Reverse Android malware like a Jedi Master.eng.lrc 21.1 KB
- VB 2020 Virtual/VB 2020 Virtual captions/NetWalking on Sunshine.eng.text 21.1 KB
- VB 2021 Virtual/VB 2021 Virtual captions/CTO (Call Tree Overviewer) yet another function call tree viewer.eng.tsv 21.1 KB
- VB 2020 Virtual/VB 2020 Virtual captions/One year later Challenges for young anti-malware products today.eng.vtt 21.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/All roads lead to Rome the Conti manual leak dissection.eng.txt 21.0 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Battlefield Ukraine finding patterns behind summer cyber attacks.eng.srt 21.0 KB
- VB 2019 London/VB 2019 London captions/Catch me if you can detection of injection exploitation by validating query and API integrity.eng.txt 20.9 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Operation LagTime IT colourful Panda footprint.eng.tsv 20.9 KB
- VB 2021 Virtual/VB 2021 Virtual captions/The ‘Ghost Hand’ attack.eng.tsv 20.9 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Hiding the network behind the network. Botnet proxy business model.eng.txt 20.9 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Chasing the Digital Pirates Unveiling the Container Threats.eng.srt 20.8 KB
- VB 2015 Prague/VB 2015 Prague captions/Speaking Dyreza protocol. Advantages of 'learning' a new language.eng.tsv 20.8 KB
- VB 2021 Virtual/VB 2021 Virtual captions/All roads lead to Rome the Conti manual leak dissection.eng.lrc 20.8 KB
- VB 2019 London/VB 2019 London captions/Catch me if you can detection of injection exploitation by validating query and API integrity.eng.lrc 20.8 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Unveiling the CryptoMimic.eng.txt 20.7 KB
- VB 2017 Madrid/VB 2017 Madrid captions/The state of cybersecurity in Africa Kenya.eng.srt 20.7 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Optimized mal-ops. Hack the ad network like a boss.eng.tsv 20.7 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Chasing the Digital Pirates Unveiling the Container Threats.eng.txt 20.6 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Hiding the network behind the network. Botnet proxy business model.eng.lrc 20.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Unveiling the CryptoMimic.eng.lrc 20.6 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Consequences of bad security in health care.eng.text 20.5 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Keynote Learning from failure ransomware and future conflicts.eng.vtt 20.5 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Operation Diànxùn a cyberespionage campaign targeting telecommunication companies.eng.vtt 20.5 KB
- VB 2016 Denver/VB 2016 Denver captions/One-Click Fileless Infection.eng.tsv 20.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Chasing the Digital Pirates Unveiling the Container Threats.eng.lrc 20.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Ghost Mach-O an analysis of Lazarus’ Mac-malware innovations.eng.tsv 20.4 KB
- VB 2019 London/VB 2019 London captions/Catch me if you can detection of injection exploitation by validating query and API integrity.eng.vtt 20.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Closing Keynote Threatscaping like a CERT.eng.text 20.4 KB
- VB 2009 Geneva/VB 2009 Geneva captions/The Virus Bulletin yodelling competition.eng.json 20.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/One year later Challenges for young anti-malware products today.eng.tsv 20.2 KB
- VB 2015 Prague/VB 2015 Prague captions/Attack on the drones security vulnerabilities of unmanned aerial vehicles.eng.text 20.2 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Tracking Rapid Evolution Copycat of An APT RAT in Asia.eng.tsv 20.1 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/New PlugX Fingerprint-THOR.eng.text 20.0 KB
- VB 2019 London/VB 2019 London captions/Absolutely routed Why routers are the new bullseye in cyber attacks.eng.text 20.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Ransomware a correlation between infection vectors and victims.eng.text 19.8 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Operation Diànxùn a cyberespionage campaign targeting telecommunication companies.eng.tsv 19.7 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Lightweight emulation based IoC extraction for Gafgyt botnets.eng.srt 19.5 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Chasing the Digital Pirates Unveiling the Container Threats.eng.vtt 19.4 KB
- VB 2012 Dallas/VB 2012 Dallas captions/Virus Bulletin 2012 Conference Overview.eng.json 19.3 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Swipe away, we're watching you.eng.text 19.3 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Keynote Learning from failure ransomware and future conflicts.eng.tsv 19.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Dancing samba with Dolphins tracking a Brazilian threat actor moving to Europe.eng.srt 19.3 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/The use of dark patterns and psychological tricks in Android malware.eng.srt 19.1 KB
- VB 2021 Virtual/VB 2021 Virtual captions/All roads lead to Rome the Conti manual leak dissection.eng.tsv 19.1 KB
- VB 2017 Madrid/VB 2017 Madrid captions/The state of cybersecurity in Africa Kenya.eng.vtt 19.1 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Reverse Android malware like a Jedi Master.eng.tsv 19.0 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Battlefield Ukraine finding patterns behind summer cyber attacks.eng.vtt 18.8 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Panel A tale of two companies.eng.text 18.7 KB
- VB 2019 London/VB 2019 London captions/Catch me if you can detection of injection exploitation by validating query and API integrity.eng.tsv 18.7 KB
- VB 2017 Madrid/VB 2017 Madrid captions/The state of cybersecurity in Africa Kenya.eng.tsv 18.7 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Battlefield Ukraine finding patterns behind summer cyber attacks.eng.txt 18.7 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Unveiling the CryptoMimic.eng.tsv 18.6 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Battlefield Ukraine finding patterns behind summer cyber attacks.eng.lrc 18.5 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Payment required rare HTTP statuses and air-gaps avoidance from the authors of COMPFun.eng.text 18.4 KB
- VB 2016 Denver/VB 2016 Denver captions/Nymaim the Untold Story.eng.text 18.4 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Hiding the network behind the network. Botnet proxy business model.eng.srt 18.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Chasing the Digital Pirates Unveiling the Container Threats.eng.tsv 18.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Dancing samba with Dolphins tracking a Brazilian threat actor moving to Europe.eng.txt 18.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Clandestine hunter two strategies for supply chain attack.eng.srt 18.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Dissecting fleeceware apps the million-dollar money-making machine in Android and iOS.eng.text 18.2 KB
- VB 2015 Prague/VB 2015 Prague captions/Android ransomware turning CryptoLocker into CryptoUnlocker.eng.text 18.2 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Dancing samba with Dolphins tracking a Brazilian threat actor moving to Europe.eng.lrc 18.1 KB
- VB 2021 Virtual/VB 2021 Virtual captions/The ‘Ghost Hand’ attack.eng.text 17.9 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Lightweight emulation based IoC extraction for Gafgyt botnets.eng.vtt 17.9 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Dancing samba with Dolphins tracking a Brazilian threat actor moving to Europe.eng.vtt 17.9 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/The use of dark patterns and psychological tricks in Android malware.eng.txt 17.9 KB
- VB 2019 London/VB 2019 London captions/Defeating APT10 compiler-level obfuscations.eng.srt 17.8 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Shades of Red RedXOR Linux backdoor and its Chinese origins.eng.srt 17.8 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/The use of dark patterns and psychological tricks in Android malware.eng.lrc 17.7 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Operation LagTime IT colourful Panda footprint.eng.text 17.7 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/The use of dark patterns and psychological tricks in Android malware.eng.vtt 17.6 KB
- VB 2021 Virtual/VB 2021 Virtual captions/CTO (Call Tree Overviewer) yet another function call tree viewer.eng.text 17.3 KB
- VB 2015 Prague/VB 2015 Prague captions/The Volatility Bot-Excavator.eng.srt 17.3 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Hiding the network behind the network. Botnet proxy business model.eng.tsv 17.1 KB
- VB 2013 Berlin/VB 2013 Berlin captions/An automatic analysis and detection tool for Java exploits.eng.text 17.1 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Clandestine hunter two strategies for supply chain attack.eng.txt 17.1 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Optimized mal-ops. Hack the ad network like a boss.eng.text 17.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Most sophisticated technique of the year goes to.eng.srt 17.0 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Operation Diànxùn a cyberespionage campaign targeting telecommunication companies.eng.text 17.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Ghost Mach-O an analysis of Lazarus’ Mac-malware innovations.eng.text 17.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/All roads lead to Rome the Conti manual leak dissection.eng.text 16.9 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Clandestine hunter two strategies for supply chain attack.eng.lrc 16.9 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Hiding the network behind the network. Botnet proxy business model.eng.vtt 16.8 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Keynote Learning from failure ransomware and future conflicts.eng.text 16.8 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Clandestine hunter two strategies for supply chain attack.eng.vtt 16.8 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Peak Analyzer an automated malware campaign detector.eng.text 16.7 KB
- VB 2015 Prague/VB 2015 Prague captions/Speaking Dyreza protocol. Advantages of 'learning' a new language.eng.text 16.5 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Tracking Rapid Evolution Copycat of An APT RAT in Asia.eng.text 16.5 KB
- VB 2016 Denver/VB 2016 Denver captions/One-Click Fileless Infection.eng.text 16.5 KB
- VB 2020 Virtual/VB 2020 Virtual captions/One year later Challenges for young anti-malware products today.eng.text 16.5 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Reverse Android malware like a Jedi Master.eng.text 16.4 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Dancing samba with Dolphins tracking a Brazilian threat actor moving to Europe.eng.tsv 16.3 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Shades of Red RedXOR Linux backdoor and its Chinese origins.eng.txt 16.3 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Incident response with an XDR.eng.srt 16.3 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Shades of Red RedXOR Linux backdoor and its Chinese origins.eng.vtt 16.2 KB
- VB 2019 London/VB 2019 London captions/Defeating APT10 compiler-level obfuscations.eng.vtt 16.2 KB
- VB 2019 London/VB 2019 London captions/Catch me if you can detection of injection exploitation by validating query and API integrity.eng.text 16.2 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Shades of Red RedXOR Linux backdoor and its Chinese origins.eng.lrc 16.2 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Stealthy WastedLocker eluding behavior blockers, but not only.eng.srt 16.1 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Lightweight emulation based IoC extraction for Gafgyt botnets.eng.txt 16.1 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Battlefield Ukraine finding patterns behind summer cyber attacks.eng.tsv 16.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Unveiling the CryptoMimic.eng.text 16.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Sandworm reading the indictment between the lines.eng.srt 16.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Lightweight emulation based IoC extraction for Gafgyt botnets.eng.lrc 16.0 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/The use of dark patterns and psychological tricks in Android malware.eng.tsv 15.8 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Most sophisticated technique of the year goes to.eng.txt 15.8 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Chasing the Digital Pirates Unveiling the Container Threats.eng.text 15.7 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Most sophisticated technique of the year goes to.eng.vtt 15.7 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Most sophisticated technique of the year goes to.eng.lrc 15.7 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Sandworm reading the indictment between the lines.eng.txt 15.7 KB
- VB 2015 Prague/VB 2015 Prague captions/The Volatility Bot-Excavator.eng.vtt 15.6 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Sandworm reading the indictment between the lines.eng.lrc 15.5 KB
- VB 2019 London/VB 2019 London captions/Defeating APT10 compiler-level obfuscations.eng.txt 15.3 KB
- VB 2019 London/VB 2019 London captions/Defeating APT10 compiler-level obfuscations.eng.lrc 15.2 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Incident response with an XDR.eng.txt 15.2 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Clandestine hunter two strategies for supply chain attack.eng.tsv 15.1 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Incident response with an XDR.eng.lrc 15.0 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Incident response with an XDR.eng.vtt 15.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Lightweight emulation based IoC extraction for Gafgyt botnets.eng.tsv 15.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Sandworm reading the indictment between the lines.eng.vtt 14.9 KB
- VB 2017 Madrid/VB 2017 Madrid captions/The state of cybersecurity in Africa Kenya.eng.text 14.8 KB
- VB 2015 Prague/VB 2015 Prague captions/The Volatility Bot-Excavator.eng.txt 14.5 KB
- VB 2015 Prague/VB 2015 Prague captions/The Volatility Bot-Excavator.eng.lrc 14.4 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/VB2010 Social Network and Computer Security Panel Discussion.eng.txt 14.3 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Shades of Red RedXOR Linux backdoor and its Chinese origins.eng.tsv 14.3 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Dancing samba with Dolphins tracking a Brazilian threat actor moving to Europe.eng.text 14.2 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/VB2010 Social Network and Computer Security Panel Discussion.eng.lrc 14.1 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Most sophisticated technique of the year goes to.eng.tsv 14.1 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Sandworm reading the indictment between the lines.eng.tsv 13.9 KB
- VB 2019 London/VB 2019 London captions/Defeating APT10 compiler-level obfuscations.eng.tsv 13.8 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Lightweight emulation based IoC extraction for Gafgyt botnets.eng.text 13.7 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/The use of dark patterns and psychological tricks in Android malware.eng.text 13.6 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/VB2010 Social Network and Computer Security Panel Discussion.eng.srt 13.5 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Incident response with an XDR.eng.tsv 13.5 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Gábor Szappanos wins fourth Peter Szőr Award.eng.srt 13.3 KB
- VB 2017 Madrid/VB 2017 Madrid captions/Battlefield Ukraine finding patterns behind summer cyber attacks.eng.text 13.1 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Keynote The Community Effect.eng.srt 12.9 KB
- VB 2015 Prague/VB 2015 Prague captions/The Volatility Bot-Excavator.eng.tsv 12.9 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Hiding the network behind the network. Botnet proxy business model.eng.text 12.9 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Clandestine hunter two strategies for supply chain attack.eng.text 12.8 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/VB2010 Social Network and Computer Security Panel Discussion.eng.vtt 12.5 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Keynote The Community Effect.eng.txt 12.3 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Keynote The Community Effect.eng.lrc 12.2 KB
- VB 2020 Virtual/VB 2020 Virtual captions/Most sophisticated technique of the year goes to.eng.text 12.2 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Shades of Red RedXOR Linux backdoor and its Chinese origins.eng.text 12.1 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/VB2010 Social Network and Computer Security Panel Discussion.eng.tsv 12.1 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Keynote The Community Effect.eng.vtt 12.0 KB
- VB 2021 Virtual/VB 2021 Virtual captions/Sandworm reading the indictment between the lines.eng.text 12.0 KB
- VB 2019 London/VB 2019 London captions/Defeating APT10 compiler-level obfuscations.eng.text 11.9 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Incident response with an XDR.eng.text 11.6 KB
- VB 2015 Prague/VB 2015 Prague captions/The Volatility Bot-Excavator.eng.text 11.2 KB
- VB 2021 Virtual/VB 2021 Virtual captions/A detailed analysis of a new version of Darkside Ransomware (V. 2.1.2.3).eng.srt 11.1 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Keynote The Community Effect.eng.tsv 11.0 KB
- Virus Bulletin logo.png 10.4 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/Costin Raiu on Virus Bulletin 2010.eng.srt 10.4 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/Costin Raiu on Virus Bulletin 2010.eng.txt 10.4 KB
- VB 2021 Virtual/VB 2021 Virtual captions/A detailed analysis of a new version of Darkside Ransomware (V. 2.1.2.3).eng.txt 10.3 KB
- VB 2021 Virtual/VB 2021 Virtual captions/A detailed analysis of a new version of Darkside Ransomware (V. 2.1.2.3).eng.vtt 10.3 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/Costin Raiu on Virus Bulletin 2010.eng.lrc 10.3 KB
- VB 2021 Virtual/VB 2021 Virtual captions/A detailed analysis of a new version of Darkside Ransomware (V. 2.1.2.3).eng.lrc 10.2 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/VB2010 Social Network and Computer Security Panel Discussion.eng.text 9.7 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/Costin Raiu on Virus Bulletin 2010.eng.vtt 9.7 KB
- VB 2021 Threat Intelligence Practitioner Summit/VB 2021 Threat Intelligence Practitioner Summit captions/Keynote The Community Effect.eng.text 9.5 KB
- VB 2021 Virtual/VB 2021 Virtual captions/A detailed analysis of a new version of Darkside Ransomware (V. 2.1.2.3).eng.tsv 9.2 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/Costin Raiu on Virus Bulletin 2010.eng.tsv 9.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/The NExt Big Sur(ge) on macOS.eng.srt 8.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/The NExt Big Sur(ge) on macOS.eng.txt 8.1 KB
- VB 2021 Virtual/VB 2021 Virtual captions/A detailed analysis of a new version of Darkside Ransomware (V. 2.1.2.3).eng.text 8.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/The NExt Big Sur(ge) on macOS.eng.lrc 8.0 KB
- VB 2020 Virtual/VB 2020 Virtual captions/The NExt Big Sur(ge) on macOS.eng.vtt 8.0 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/Costin Raiu on Virus Bulletin 2010.eng.text 7.6 KB
- VB 2020 Virtual/VB 2020 Virtual captions/The NExt Big Sur(ge) on macOS.eng.tsv 7.2 KB
- VB 2008 Ottawa/VB 2008 Ottawa captions/Interview with John Hawes of Virus Bulletin.eng.srt 6.2 KB
- VB 2020 Virtual/VB 2020 Virtual captions/The NExt Big Sur(ge) on macOS.eng.text 6.2 KB
- VB 2008 Ottawa/VB 2008 Ottawa captions/Security experts answer key questions at Virus Bulletin 2008.eng.srt 3.6 KB
- VB 2024 Dublin/VB 2024 Dublin captions/Inside the VB Conference (VB2024).eng.srt 3.3 KB
- VB 2007 Vienna/VB 2007 Vienna captions/A different look at the VB2007 Conference in Vienna.eng.srt 2.2 KB
- VB 2007 Vienna/VB 2007 Vienna captions/A different look at the VB2007 Conference in Vienna.eng.vtt 1.9 KB
- VB 2007 Vienna/VB 2007 Vienna captions/A different look at the VB2007 Conference in Vienna.eng.txt 1.7 KB
- VB 2007 Vienna/VB 2007 Vienna captions/A different look at the VB2007 Conference in Vienna.eng.lrc 1.7 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/Stuxnet demo in Virus Bulletin 2010 conference.eng.srt 1.6 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/Stuxnet demo in Virus Bulletin 2010 conference.eng.vtt 1.4 KB
- VB 2007 Vienna/VB 2007 Vienna captions/A different look at the VB2007 Conference in Vienna.eng.tsv 1.4 KB
- VB 2014 Seattle/VB 2014 Seattle captions/Early launch Android malware your phone is 0wned.eng.json 1.4 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/Stuxnet demo in Virus Bulletin 2010 conference.eng.txt 1.4 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/Stuxnet demo in Virus Bulletin 2010 conference.eng.lrc 1.4 KB
- VB 2010 Vancouver/VB 2010 Vancouver captions/Stuxnet demo in Virus Bulletin 2010 conference.eng.tsv 1.2 KB
- VB 2007 Vienna/VB 2007 Vienna captions/A different look at the VB2007 Conference in Vienna.eng.text 1.1 KB
- Virus Bulletin thank you.txt 1022 bytes
- VB 2010 Vancouver/VB 2010 Vancouver captions/Stuxnet demo in Virus Bulletin 2010 conference.eng.text 995 bytes
- VB 2009 Geneva/VB 2009 Geneva captions/The Virus Bulletin yodelling competition.eng.srt 874 bytes
- VB 2012 Dallas/VB 2012 Dallas captions/Virus Bulletin 2012 Conference Overview.eng.srt 767 bytes
- VB 2009 Geneva/VB 2009 Geneva captions/The Virus Bulletin yodelling competition.eng.vtt 743 bytes
- VB 2012 Dallas/VB 2012 Dallas captions/Virus Bulletin 2012 Conference Overview.eng.vtt 656 bytes
- HEADER.md 580 bytes
- VB 2012 Dallas/VB 2012 Dallas captions/Virus Bulletin 2012 Conference Overview.eng.txt 534 bytes
- VB 2012 Dallas/VB 2012 Dallas captions/Virus Bulletin 2012 Conference Overview.eng.lrc 525 bytes
- VB 2009 Geneva/VB 2009 Geneva captions/The Virus Bulletin yodelling competition.eng.txt 509 bytes
- VB 2009 Geneva/VB 2009 Geneva captions/The Virus Bulletin yodelling competition.eng.lrc 502 bytes
- VB 2009 Geneva/VB 2009 Geneva captions/The Virus Bulletin yodelling competition.eng.tsv 420 bytes
- VB 2012 Dallas/VB 2012 Dallas captions/Virus Bulletin 2012 Conference Overview.eng.tsv 418 bytes
- VB 2009 Geneva/VB 2009 Geneva captions/The Virus Bulletin yodelling competition.eng.text 320 bytes
- VB 2012 Dallas/VB 2012 Dallas captions/Virus Bulletin 2012 Conference Overview.eng.text 291 bytes
- VB 2014 Seattle/VB 2014 Seattle captions/Early launch Android malware your phone is 0wned.eng.vtt 59 bytes
- VB 2014 Seattle/VB 2014 Seattle captions/Early launch Android malware your phone is 0wned.eng.srt 58 bytes
- VB 2014 Seattle/VB 2014 Seattle captions/Early launch Android malware your phone is 0wned.eng.tsv 50 bytes
- VB 2014 Seattle/VB 2014 Seattle captions/Early launch Android malware your phone is 0wned.eng.txt 49 bytes
- VB 2014 Seattle/VB 2014 Seattle captions/Early launch Android malware your phone is 0wned.eng.lrc 48 bytes
- VB 2014 Seattle/VB 2014 Seattle captions/Early launch Android malware your phone is 0wned (demo).eng.json 41 bytes
- VB 2014 Seattle/VB 2014 Seattle captions/Early launch Android malware your phone is 0wned.eng.text 22 bytes
- VB 2014 Seattle/VB 2014 Seattle captions/Early launch Android malware your phone is 0wned (demo).eng.tsv 16 bytes
- VB 2014 Seattle/VB 2014 Seattle captions/Early launch Android malware your phone is 0wned (demo).eng.vtt 10 bytes
- VB 2014 Seattle/VB 2014 Seattle captions/Early launch Android malware your phone is 0wned (demo).eng.lrc 0 bytes
- VB 2014 Seattle/VB 2014 Seattle captions/Early launch Android malware your phone is 0wned (demo).eng.srt 0 bytes
- VB 2014 Seattle/VB 2014 Seattle captions/Early launch Android malware your phone is 0wned (demo).eng.text 0 bytes
- VB 2014 Seattle/VB 2014 Seattle captions/Early launch Android malware your phone is 0wned (demo).eng.txt 0 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.