Virus Bulletin

mp4   Hot:31   Size:6.78 GB   Created:2022-09-03 17:51:27   Update:2022-12-17 14:24:57  

Download link

File List

  • VB 1991 Jersey/1991-conferencereport.pdf 1.53 MB
    VB 1991 Jersey/img001_595.jpg 107.68 KB
    VB 1991 Jersey/img002_595.jpg 113.45 KB
    VB 1991 Jersey/img003_595.jpg 123.26 KB
    VB 1992 Edinburgh/VB92report.pdf 2.33 MB
    VB 1993 Amsterdam/VB93report.pdf 1.96 MB
    VB 1993 Amsterdam/img001_595.jpg 146.47 KB
    VB 1993 Amsterdam/img002_595.jpg 159.44 KB
    VB 1993 Amsterdam/img003_595.jpg 165 KB
    VB 1993 Amsterdam/img004_595.jpg 166.06 KB
    VB 1993 Amsterdam/img005_595.jpg 139.02 KB
    VB 1993 Amsterdam/img006_595.jpg 157.78 KB
    VB 1993 Amsterdam/img007_595.jpg 149.84 KB
    VB 1993 Amsterdam/img008_595.jpg 152.37 KB
    VB 2007 Vienna/A different look at the VB2007 Conference in Vienna !.mp4 13.32 MB
    VB 2008 Ottawa/Interview with John Hawes of Virus Bulletin.mp4 4.46 MB
    VB 2008 Ottawa/Security experts answer key questions at Virus Bulletin 2008.mp4 3.56 MB
    VB 2009 Geneva/The Virus Bulletin yodelling competition.mp4 1.78 MB
    VB 2010 Vancouver/Costin Raiu on Virus Bulletin 2010.mp4 9.08 MB
    VB 2010 Vancouver/Stuxnet demo in Virus Bulletin 2010 conference.mp4 3.46 MB
    VB 2010 Vancouver/VB2010 Social Network and Computer Security Panel Discussion.mp4 24.24 MB
    VB 2012 Dallas/Flashback OS X malware - VB2012 presentation by Broderick Aquilino (F-Secure).mp4 19.21 MB
    VB 2012 Dallas/Virus Bulletin 2012 Conference Overview.mp4 22.78 MB
    VB 2013 Berlin/An automatic analysis and detection tool for Java exploits.mp4 19.36 MB
    VB 2013 Berlin/Analysis of Android in-app advertisement kits.mp4 34.04 MB
    VB 2013 Berlin/Back channels and bitcoins ZeroAccess' secret C&C communications.mp4 22.47 MB
    VB 2013 Berlin/Hacking Team and Gamma International in 'business-to-government malware'.mp4 25.63 MB
    VB 2013 Berlin/How to test properly comparative web filter tests.mp4 23.68 MB
    VB 2013 Berlin/Hypervisor-based, hardware-assisted system monitoring.mp4 23.78 MB
    VB 2013 Berlin/PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file).mp4 24.88 MB
    VB 2013 Berlin/Statistically effective protection against APT attacks.mp4 42.59 MB
    VB 2013 Berlin/Surviving 0-days - reducing the window of exposure.mp4 28.6 MB
    VB 2013 Berlin/VB2013 Keynote Ethics and the AV industry in the age of WikiLeaks.mp4 55.02 MB
    VB 2014 Seattle/.NET malware dynamic instrumentation for automated and manual analysis.mp4 27.69 MB
    VB 2014 Seattle/An in-depth analysis of abuse on Twitter.mp4 27.07 MB
    VB 2014 Seattle/Android packer facing the challenges, building solutions.mp4 28.22 MB
    VB 2014 Seattle/Attack points in health apps & wearable devices - how safe is your quantified self.mp4 38.33 MB
    VB 2014 Seattle/Attack surface analysis of Tizen devices.mp4 23.78 MB
    VB 2014 Seattle/Back in BlackEnergy 2014 targeted attacks in the Ukraine and Poland.mp4 22.8 MB
    VB 2014 Seattle/Bootkits past, present & future.mp4 32 MB
    VB 2014 Seattle/Caphaw - the advanced persistent pluginer.mp4 24.41 MB
    VB 2014 Seattle/DMARC - how to use it to improve your email reputation.mp4 17.01 MB
    VB 2014 Seattle/DNSSEC - how far have we come.mp4 23.68 MB
    VB 2014 Seattle/Design to discover security analytics with 3D visualization engine.mp4 42.81 MB
    VB 2014 Seattle/Duping the machine - malware strategies, post sandbox detection.mp4 23.52 MB
    VB 2014 Seattle/Early launch Android malware your phone is 0wned (demo).mp4 2.08 MB
    VB 2014 Seattle/Early launch Android malware your phone is 0wned.mp4 1.19 MB
    VB 2014 Seattle/Hiding the network behind the network. Botnet proxy business model.mp4 21.11 MB
    VB 2014 Seattle/Labelling spam through the analysis of protocol patterns.mp4 25.92 MB
    VB 2014 Seattle/Leaving our ZIP undone how to abuse ZIP to deliver malware apps.avi 40.2 MB
    VB 2014 Seattle/Methods of malware persistence on Mac OS X.avi 45.75 MB
    VB 2014 Seattle/OPSEC for security researchers.avi 95.9 MB
    VB 2014 Seattle/Optimized mal-ops. Hack the ad network like a boss.avi 40.98 MB
    VB 2014 Seattle/P0wned by a barcode stealing money from offline users.avi 78.23 MB
    VB 2014 Seattle/Presentation of the 1st Peter Szor Award.avi 13.63 MB
    VB 2014 Seattle/Protecting financial institutions from banking malware's man-in-the-browser attacks.avi 58.46 MB
    VB 2014 Seattle/Quantifying maliciousness in Alexa top-ranked domains.avi 48.7 MB
    VB 2014 Seattle/Smart home appliance security & malware.avi 88.4 MB
    VB 2014 Seattle/Sweeping the IP space the hunt for evil on the Internet.avi 45.75 MB
    VB 2014 Seattle/Swipe away, we're watching you.avi 65.39 MB
    VB 2014 Seattle/The evolution of webinjects.avi 44.82 MB
    VB 2014 Seattle/Unveiling the kernel rootkit discovery using selective automated kernel memory differencing.avi 52.81 MB
    VB 2014 Seattle/We know it before you do predicting malicious domains.avi 41.15 MB
    VB 2014 Seattle/Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists.avi 35.61 MB
    VB 2015 Prague/A quantitative examination of the current state of corporate security practices.avi 56.1 MB
    VB 2015 Prague/Android ransomware turning CryptoLocker into CryptoUnlocker.avi 52.65 MB
    VB 2015 Prague/Anonymity is king.avi 66.56 MB
    VB 2015 Prague/Attack on the drones security vulnerabilities of unmanned aerial vehicles.avi 62.01 MB
    VB 2015 Prague/Breaking the bank(er) automated configuration data extraction for banking malware.avi 68.43 MB
    VB 2015 Prague/Building a malware lab in the age of Big Data.avi 65.35 MB
    VB 2015 Prague/C&C-as-a-Service abusing third-party web services as C&C channels.avi 53.9 MB
    VB 2015 Prague/Can we trust a trustee An in-depth look into the digitally signed malware industry.avi 44.58 MB
    VB 2015 Prague/DDoS trojan a malicious concept that conquered the ELF format.avi 62.55 MB
    VB 2015 Prague/Dare 'DEVIL' beyond your senses with Dex Visualizer.avi 63.8 MB
    VB 2015 Prague/Dead and buried in their crypts defeating modern ransomware.avi 64.91 MB
    VB 2015 Prague/Digital 'Bian Lian' (face changing) the skeleton key malware.avi 69.01 MB
    VB 2015 Prague/Does prevalence matter Ranking anti-malware products by potential victim impact.avi 65.06 MB
    VB 2015 Prague/Doing more with less a study of file-less infection attacks.avi 62.08 MB
    VB 2015 Prague/Economic sanctions on malware.avi 91.04 MB
    VB 2015 Prague/Effectively testing APT defences.avi 56.44 MB
    VB 2015 Prague/Evolution of Android exploits from a static analysis tools perspective.avi 43.98 MB
    VB 2015 Prague/From Asia with love Smartphones with pre-installed malware.avi 70.83 MB
    VB 2015 Prague/How they're getting the data out of your network.avi 22.74 MB
    VB 2015 Prague/It has a EULA, it must be legit.avi 37.33 MB
    VB 2015 Prague/It's a file infector... it's ransomware... it's Virlock.avi 54.85 MB
    VB 2015 Prague/Keynote address One man's anti-malware researcher is....avi 96.24 MB
    VB 2015 Prague/Labeless - no more.avi 45.09 MB
    VB 2015 Prague/Last-minute paper Operation Potao Express analysis of a cyber-espionage toolkit.avi 63.88 MB
    VB 2015 Prague/Last-minute paper The mysterious case of Linux.Wifatch.avi 72.84 MB
    VB 2015 Prague/Linux Moose endangered or extinct An update on this atypical embedded Linux botnet.avi 57.88 MB
    VB 2015 Prague/Making a dent in Russian mobile banking phishing.avi 54.4 MB
    VB 2015 Prague/Mobile banking fraud via SMS in North America who's doing it and how.avi 67.2 MB
    VB 2015 Prague/Modelling the network behaviour of malware to block malicious patterns.avi 69.46 MB
    VB 2015 Prague/Notes on click fraud American story.avi 41.33 MB
    VB 2015 Prague/POS fraud - trends and counter-actions to mass fraud.avi 67.65 MB
    VB 2015 Prague/ROSCO Repository Of Signed COde.avi 75.69 MB
    VB 2015 Prague/Sizing cybercrime incidents and accidents, hints and allegations.avi 62.2 MB
    VB 2015 Prague/Solving the (in)security of home networked devices.avi 63.85 MB
    VB 2015 Prague/Speaking Dyreza protocol. Advantages of 'learning' a new language.avi 59.27 MB
    VB 2015 Prague/Tech Support Scams 2.0 an inside look into the evolution of the classic Microsoft tech support scam.avi 43.38 MB
    VB 2015 Prague/The Internet of Bad Things, Observed.avi 75.57 MB
    VB 2015 Prague/The Kobayashi Maru dilemma.avi 89.7 MB
    VB 2015 Prague/The TAO of .NET and PowerShell malware analysis.avi 71.01 MB
    VB 2015 Prague/The Unbearable Lightness of APTing.avi 70.53 MB
    VB 2015 Prague/The Volatility Bot-Excavator.avi 29.77 MB
    VB 2015 Prague/The elephant in the room.avi 71.8 MB
    VB 2015 Prague/The ethics and perils of APT research an unexpected transition into intelligence brokerage.avi 78.17 MB
    VB 2015 Prague/TurlaSat The Fault in our Stars.avi 61.01 MB
    VB 2015 Prague/Ubiquity, security and you - malware, security and the Internet of Things.avi 43.28 MB
    VB 2015 Prague/WaveAtlas surfing through the landscape of current malware packers.avi 61.63 MB
    VB 2015 Prague/We know what you did this summer Android banking trojan exposing its sins in the cloud.avi 55.94 MB
    VB 2015 Prague/Will Android trojan, worm or rootkit survive in SEAndroid and containerization.avi 48.87 MB
    VB 2016 Denver/APT Reports and OPSEC Evolution, or These Are Not the APT Reports You Are Looking For.avi 59.62 MB
    VB 2016 Denver/Defeating Sandbox Evasion How to Increase Successful Emulation Rate in your Virtualized Environment.avi 48.32 MB
    VB 2016 Denver/Getting Duped Piggybacking on Webcam Streams for Surreptitious Recordings.avi 51.78 MB
    VB 2016 Denver/Great Crypto Failures.avi 58.67 MB
    VB 2016 Denver/Mobile Applications a Backdoor into Internet of Things.avi 39.52 MB
    VB 2016 Denver/Modern Attacks on Russian Financial Institutions.avi 51.32 MB
    VB 2016 Denver/Neverquest Crime as a Service and On the Hunt for the Big Bucks.avi 53.51 MB
    VB 2016 Denver/Nymaim the Untold Story.avi 45.18 MB
    VB 2016 Denver/On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users.avi 40.32 MB
    VB 2016 Denver/One-Click Fileless Infection.avi 33.75 MB
    VB 2016 Denver/Open Source Malware Lab.avi 40.23 MB
    VB 2016 Denver/Wave Your False Flags! Deception Tactics Muddying Attribution in Targeted Attacks.avi 58.29 MB
    VB 2017 Madrid/Battlefield Ukraine finding patterns behind summer cyber attacks.en.transcribed.srt 42.12 KB
    VB 2017 Madrid/Battlefield Ukraine finding patterns behind summer cyber attacks.mp4 55.6 MB
    VB 2017 Madrid/Beyond lexical and PDNS using signals on graphs to uncover online threats at scale.en.transcribed.srt 83.07 KB
    VB 2017 Madrid/Beyond lexical and PDNS using signals on graphs to uncover online threats at scale.mp4 43.65 MB
    VB 2017 Madrid/Consequences of bad security in health care.mp4 86.72 MB
    VB 2017 Madrid/Crypton - exposing malware's deepest secrets.mp4 112.01 MB
    VB 2017 Madrid/Gabor Szappanos wins fourth Peter Szor Award.en.transcribed.srt 21.07 KB
    VB 2017 Madrid/Gabor Szappanos wins fourth Peter Szor Award.mp4 34.64 MB
    VB 2017 Madrid/Industroyer biggest threat to industrial control systems since Stuxnet.en.transcribed.srt 61.53 KB
    VB 2017 Madrid/Industroyer biggest threat to industrial control systems since Stuxnet.mp4 81.17 MB
    VB 2017 Madrid/Last-minute paper FinFisher New techniques and infection vectors revealed.en.transcribed.srt 48.1 KB
    VB 2017 Madrid/Last-minute paper FinFisher New techniques and infection vectors revealed.mp4 66.12 MB
    VB 2017 Madrid/Last-minute paper Spora the saga continues a.k.a. how to ruin your research in a week.en.transcribed.srt 65.2 KB
    VB 2017 Madrid/Last-minute paper Spora the saga continues a.k.a. how to ruin your research in a week.mp4 78.99 MB
    VB 2017 Madrid/Modern reconnaissance phase on APT – protection layer.en.transcribed.srt 89.33 KB
    VB 2017 Madrid/Modern reconnaissance phase on APT – protection layer.mp4 80.89 MB
    VB 2017 Madrid/Nine circles of Cerber.en.transcribed.srt 72.28 KB
    VB 2017 Madrid/Nine circles of Cerber.mp4 92.78 MB
    VB 2017 Madrid/Offensive malware analysis dissecting OSX FruitFly via a custom C&C server.en.transcribed.srt 92.58 KB
    VB 2017 Madrid/Offensive malware analysis dissecting OSX FruitFly via a custom C&C server.mp4 70.03 MB
    VB 2017 Madrid/The router of all evil more than just default passwords and silly scripts.en.transcribed.srt 49.43 KB
    VB 2017 Madrid/The router of all evil more than just default passwords and silly scripts.mp4 57.75 MB
    VB 2017 Madrid/The sprawling market of consumer spyware.en.transcribed.srt 60.68 KB
    VB 2017 Madrid/The sprawling market of consumer spyware.mp4 87.55 MB
    VB 2017 Madrid/The state of cybersecurity in Africa Kenya.mp4 22.62 MB
    VB 2017 Madrid/Turning Trickbot decoding an encrypted command-and-control channel.en.transcribed.srt 75.09 KB
    VB 2017 Madrid/Turning Trickbot decoding an encrypted command-and-control channel.mp4 71.52 MB
    VB 2017 Madrid/VB2017 paper VirusTotal tips, tricks and myths.en.transcribed.srt 56.81 KB
    VB 2017 Madrid/VB2017 paper VirusTotal tips, tricks and myths.mp4 58.7 MB
    VB 2017 Madrid/Walking in your enemy's shadow when fourth-party collection becomes attribution hell.en.transcribed.srt 96.29 KB
    VB 2017 Madrid/Walking in your enemy's shadow when fourth-party collection becomes attribution hell.mp4 127.76 MB
    VB 2018 Montreal/Behind the scenes of the SamSam investigation.en.transcribed.srt 65.23 KB
    VB 2018 Montreal/Behind the scenes of the SamSam investigation.mp4 53.58 MB
    VB 2018 Montreal/Botception hire a botnet to spread one's own botnet.en.transcribed.srt 43.36 KB
    VB 2018 Montreal/Botception hire a botnet to spread one's own botnet.mp4 26.7 MB
    VB 2018 Montreal/Foreverdays tracking and mitigating threats targeting civil society orgs.en.transcribed.srt 91.89 KB
    VB 2018 Montreal/Foreverdays tracking and mitigating threats targeting civil society orgs.mp4 85.52 MB
    VB 2018 Montreal/From drive-by download to drive-by mining understanding the new paradigm.en.transcribed.srt 71.67 KB
    VB 2018 Montreal/From drive-by download to drive-by mining understanding the new paradigm.mp4 48.75 MB
    VB 2018 Montreal/Hide'n'Seek an adaptive peer-to-peer IoT botnet.en.transcribed.srt 52.6 KB
    VB 2018 Montreal/Hide'n'Seek an adaptive peer-to-peer IoT botnet.mp4 32.04 MB
    VB 2018 Montreal/Now you see it, now you don't wipers in the wild.en.transcribed.srt 61.89 KB
    VB 2018 Montreal/Now you see it, now you don't wipers in the wild.mp4 46.2 MB
    VB 2018 Montreal/Office bugs on the rise.mp4 67.74 MB
    VB 2018 Montreal/Shedding skin - Turla's fresh faces.en.transcribed.srt 71.25 KB
    VB 2018 Montreal/Shedding skin - Turla's fresh faces.mp4 69.13 MB
    VB 2018 Montreal/The Big Bang Theory by APT-C-23.en.transcribed.srt 74.04 KB
    VB 2018 Montreal/The Big Bang Theory by APT-C-23.mp4 42.89 MB
    VB 2018 Montreal/The wolf in sheep's clothing - undressed.en.transcribed.srt 48.98 KB
    VB 2018 Montreal/The wolf in sheep's clothing - undressed.mp4 46.33 MB
    VB 2018 Montreal/Triada the past, the present and the (hopefully not existing) future.en.transcribed.srt 63.13 KB
    VB 2018 Montreal/Triada the past, the present and the (hopefully not existing) future.mp4 41.73 MB
    VB 2018 Montreal/Who wasn't responsible for Olympic Destroyer (Paul Rascagneres & Warren Mercer).en.transcribed.srt 67.93 KB
    VB 2018 Montreal/Who wasn't responsible for Olympic Destroyer (Paul Rascagneres & Warren Mercer).mp4 53.22 MB
    Virus Bulletin thank you.txt 954 B
    VirusBulletin logo.png 10.45 KB

Download Info

  • Tips

    “Virus Bulletin” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.